This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Books that reference OWASP"
From OWASP
| Line 2: | Line 2: | ||
http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| − | + | [http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&s=books Windows Server 2003 (Hacking Exposed)] | |
| − | Windows Server 2003 (Hacking Exposed) | ||
Revision as of 02:25, 3 January 2007
Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.