This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Books that reference OWASP"
| Line 1: | Line 1: | ||
Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools. | Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools. | ||
| + | |||
http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | http://ec2.images-amazon.com/images/P/0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
[http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&s=books Windows Server 2003 (Hacking Exposed)] | [http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&s=books Windows Server 2003 (Hacking Exposed)] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0672328968.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V63875509_.jpg | ||
| + | [http://www.amazon.com/Development-Hibernate-Eclipse-Developers-Library/dp/0672328968/sr=1-2/qid=1167776633/ref=sr_1_2/102-4910841-8071358?ie=UTF8&s=books Agile Java Development with Spring, Hibernate and Eclipse (Developer's Library)] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0735617228.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V39288098_.jpg | ||
| + | [http://www.amazon.com/Writing-Secure-Second-Michael-Howard/dp/0735617228/sr=1-3/qid=1167776633/ref=sr_1_3/102-4910841-8071358?ie=UTF8&s=books Writing Secure Code, Second Edition] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0072260858.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V66930350_.jpg | ||
| + | [http://www.amazon.com/Deadly-Sins-Software-Security-One-off/dp/0072260858/sr=1-4/qid=1167776633/ref=sr_1_4/102-4910841-8071358?ie=UTF8&s=books 19 Deadly Sins of Software Security (Security One-off)] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0764574019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V48604100_.jpg | ||
| + | [http://www.amazon.com/Beginning-Visual-Basic-Thearon-Willis/dp/0764574019/sr=1-5/qid=1167776633/ref=sr_1_5/102-4910841-8071358?ie=UTF8&s=books Beginning Visual Basic 2005] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0471201006.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Testing-Applications-Web-Planning-Internet-Based/dp/0471201006/sr=1-6/qid=1167776633/ref=sr_1_6/102-4910841-8071358?ie=UTF8&s=books Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0072253576.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/JavaScript-Complete-Reference-Thomas-Powell/dp/0072253576/sr=1-7/qid=1167776633/ref=sr_1_7/102-4910841-8071358?ie=UTF8&s=books JavaScript: The Complete Reference, Second Edition] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/073561931X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Microsoft-Visual-Basic-Programmers-Cookbook/dp/073561931X/sr=1-8/qid=1167776633/ref=sr_1_8/102-4910841-8071358?ie=UTF8&s=books Microsoft Visual Basic .NET Programmer's Cookbook] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/076372677X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Information-Security-Illuminated-Jones-Barlett/dp/076372677X/sr=1-9/qid=1167776633/ref=sr_1_9/102-4910841-8071358?ie=UTF8&s=books Information Security Illuminated (Jones and Barlett Illuminated)] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0471789666.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V61561788_.jpg | ||
| + | [http://www.amazon.com/Professional-Pen-Testing-Applications-Programmer/dp/0471789666/sr=1-10/qid=1167776633/ref=sr_1_10/102-4910841-8071358?ie=UTF8&s=books Professional Pen Testing for Web Applications (Programmer to Programmer)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0735618224.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Security%2B-Certification-Training-Microsoft-Corporation/dp/0735618224/sr=1-11/qid=1167776633/ref=sr_1_11/102-4910841-8071358?ie=UTF8&s=books Security+ Certification Training Kit] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0849329981.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54479809_.jpg | ||
| + | [http://www.amazon.com/Security-Risk-Assessment-Handbook/dp/0849329981/sr=1-12/qid=1167776633/ref=sr_1_12/102-4910841-8071358?ie=UTF8&s=books The Security Risk Assessment Handbook] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0957921853.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/PHP-Anthology-Object-Oriented-Solution/dp/0957921853/sr=1-13/qid=1167776713/ref=sr_1_13/102-4910841-8071358?ie=UTF8&s=books The PHP Anthology: Object Oriented PHP Solution, Volume 1] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0072226307.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Hackers-Challenge-Network-Security-Forensic/dp/0072226307/sr=1-14/qid=1167776713/ref=sr_1_14/102-4910841-8071358?ie=UTF8&s=books Hacker's Challenge 2: Test Your Network Security & Forensic Skills] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0849317061.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Practical-Guide-Security-Assessments/dp/0849317061/sr=1-15/qid=1167776713/ref=sr_1_15/102-4910841-8071358?ie=UTF8&s=books A Practical Guide to Security Assessments] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0974372749.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Oracle-Security-Step-Step-Version/dp/0974372749/sr=1-16/qid=1167776713/ref=sr_1_16/102-4910841-8071358?ie=UTF8&s=books Oracle Security Step-by-Step (Version 2.0)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/3540009140.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Perspectives-Web-Services-Real-World-Professional/dp/3540009140/sr=1-17/qid=1167776713/ref=sr_1_17/102-4910841-8071358?ie=UTF8&s=books Perspectives on Web Services: Applying SOAP, WSDL and UDDI to Real-World Projects (Springer Professional Computing)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0764524720.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/BEA-WebLogic-Server-8-Dummies/dp/0764524720/sr=1-18/qid=1167776713/ref=sr_1_18/102-4910841-8071358?ie=UTF8&s=books BEA WebLogic Server 8 for Dummies] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/076455784X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50846974_.jpg | ||
| + | [http://www.amazon.com/Hacking-Dummies-Kevin-Beaver/dp/076455784X/sr=1-19/qid=1167776713/ref=sr_1_19/102-4910841-8071358?ie=UTF8&s=books Hacking for Dummies] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/1584503580.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Software-Vulnerability-Guide-Programming/dp/1584503580/sr=1-20/qid=1167776713/ref=sr_1_20/102-4910841-8071358?ie=UTF8&s=books The Software Vulnerability Guide (Programming Series)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0072133252.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Oracle-Security-Handbook-Implement-Environment/dp/0072133252/sr=1-21/qid=1167776713/ref=sr_1_21/102-4910841-8071358?ie=UTF8&s=books Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/1931836698.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Special-Ops-Network-Security-Microsoft/dp/1931836698/sr=1-22/qid=1167776713/ref=sr_1_22/102-4910841-8071358?ie=UTF8&s=books Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/097684091X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66856900_.jpg | ||
| + | [http://www.amazon.com/Hacker-Boot-Camp-Gerald-Quakenbush/dp/097684091X/sr=1-23/qid=1167776713/ref=sr_1_23/102-4910841-8071358?ie=UTF8&s=books Web Hacker Boot Camp] | ||
| + | |||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0470857447.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50842243_.jpg | ||
| + | [http://www.amazon.com/Innocent-Code-Security-Wake-Up-Programmers/dp/0470857447/sr=1-24/qid=1167776713/ref=sr_1_24/102-4910841-8071358?ie=UTF8&s=books Innocent Code: A Security Wake-Up Call for Web Programmers] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/0072257032.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Hardening-Network-Security-John-Mallery/dp/0072257032/sr=1-25/qid=1167776734/ref=sr_1_25/102-4910841-8071358?ie=UTF8&s=books Hardening Network Security] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/1931836884.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Building-Enterprise-Networks-Robert-Shimonski/dp/1931836884/sr=1-26/qid=1167776734/ref=sr_1_26/102-4910841-8071358?ie=UTF8&s=books Building DMZs for Enterprise Networks] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/007222438X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Applications-Hacking-Exposed-Joel-Scambray/dp/007222438X/sr=1-27/qid=1167776734/ref=sr_1_27/102-4910841-8071358?ie=UTF8&s=books Web Applications (Hacking Exposed)] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/0387240055.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Computer-Security-21st-Century-D-T/dp/0387240055/sr=1-28/qid=1167776734/ref=sr_1_28/102-4910841-8071358?ie=UTF8&s=books Computer Security in the 21st Century] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/0782142664.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/NET-Development-Security-Solutions-Mueller/dp/0782142664/sr=1-29/qid=1167776734/ref=sr_1_29/102-4910841-8071358?ie=UTF8&s=books .NET Development Security Solutions] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/0849319978.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Information-Security-Management-Handbook-Fifth/dp/0849319978/sr=1-30/qid=1167776734/ref=sr_1_30/102-4910841-8071358?ie=UTF8&s=books Information Security Management Handbook, Fifth Edition] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/0072227834.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/HackNotes-Network-Security-Portable-Reference/dp/0072227834/sr=1-31/qid=1167776734/ref=sr_1_31/102-4910841-8071358?ie=UTF8&s=books HackNotes(tm) Network Security Portable Reference] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/0849318718.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Computer-Systems-Validation-Management-Pharmaceutical/dp/0849318718/sr=1-32/qid=1167776734/ref=sr_1_32/102-4910841-8071358?ie=UTF8&s=books Computer Systems Validation: Quality Assurance, Risk Management, and Regulatory Compliance for Pharmaceutical and Healt] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/0072227842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/HackNotes-Web-Security-Pocket-Reference/dp/0072227842/sr=1-33/qid=1167776734/ref=sr_1_33/102-4910841-8071358?ie=UTF8&s=books HackNotes(tm) Web Security Pocket Reference] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/0749446420.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V37016241_.jpg | ||
| + | [http://www.amazon.com/Secure-Online-Business-Handbook-Management/dp/0749446420/sr=1-34/qid=1167776734/ref=sr_1_34/102-4910841-8071358?ie=UTF8&s=books The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/3540307672.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Advances-Computer-Science-Management-Proceedings/dp/3540307672/sr=1-35/qid=1167776734/ref=sr_1_35/102-4910841-8071358?ie=UTF8&s=books Advances in Computer Science - ASIAN 2005. Data Management on the Web: 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings ... (Lecture Notes in Computer Science)] | ||
| + | |||
| + | http://ec1.images-amazon.com/images/P/3540202080.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V53966271_.jpg | ||
| + | [http://www.amazon.com/Applied-Cryptography-Network-Security-International/dp/3540202080/sr=1-36/qid=1167776734/ref=sr_1_36/102-4910841-8071358?ie=UTF8&s=books Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings (Lecture Notes in Computer Science)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/3540255842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Information-Security-Practice-Experience-International/dp/3540255842/sr=1-37/qid=1167776753/ref=sr_1_37/102-4910841-8071358?ie=UTF8&s=books Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Lecture Notes in Computer Science)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/3540330526.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54147362_.jpg | ||
| + | [http://www.amazon.com/Information-Security-Practice-Experience-International/dp/3540330526/sr=1-38/qid=1167776753/ref=sr_1_38/102-4910841-8071358?ie=UTF8&s=books Information Security Practice and Experience: Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Lecture Notes in Computer Science)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0749443952.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50358246_.jpg | ||
| + | [http://www.amazon.com/Business-Guide-Information-Security/dp/0749443952/sr=1-39/qid=1167776753/ref=sr_1_39/102-4910841-8071358?ie=UTF8&s=books A Business Guide to Information Security] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/1931836019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Security-Sages-Hardening-Network-Infrastructure/dp/1931836019/sr=1-40/qid=1167776753/ref=sr_1_40/102-4910841-8071358?ie=UTF8&s=books Security Sage's Guide to Hardening the Network Infrastructure] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/354036014X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V60787098_.jpg | ||
| + | [http://www.amazon.com/Detection-Intrusions-Malware-Vulnerability-Assessment/dp/354036014X/sr=1-41/qid=1167776753/ref=sr_1_41/102-4910841-8071358?ie=UTF8&s=books Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Lecture Notes in Computer Science)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/0808089668.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66859364_.jpg | ||
| + | [http://www.amazon.com/Miller-Information-Technology-Audits-2005/dp/0808089668/sr=1-42/qid=1167776753/ref=sr_1_42/102-4910841-8071358?ie=UTF8&s=books Miller Information Technology Audits, 2005] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/3540308849.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Technologies-Advanced-Heterogeneous-Networks-Engineering/dp/3540308849/sr=1-43/qid=1167776753/ref=sr_1_43/102-4910841-8071358?ie=UTF8&s=books Technologies for Advanced Heterogeneous Networks: First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings (Lecture Notes in Computer Science)] | ||
| + | |||
| + | http://ec2.images-amazon.com/images/P/3540311424.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg | ||
| + | [http://www.amazon.com/Frontiers-Research-Development-APWeb-2006/dp/3540311424/sr=1-44/qid=1167776753/ref=sr_1_44/102-4910841-8071358?ie=UTF8&s=books Frontiers of WWW Research and Development -- APWeb 2006: 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings (Lecture Notes in Computer Science)] | ||
Revision as of 02:38, 3 January 2007
Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.
Windows Server 2003 (Hacking Exposed)
Agile Java Development with Spring, Hibernate and Eclipse (Developer's Library)
Writing Secure Code, Second Edition
19 Deadly Sins of Software Security (Security One-off)
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
JavaScript: The Complete Reference, Second Edition
Microsoft Visual Basic .NET Programmer's Cookbook
Information Security Illuminated (Jones and Barlett Illuminated)
Professional Pen Testing for Web Applications (Programmer to Programmer)
Security+ Certification Training Kit
The Security Risk Assessment Handbook
The PHP Anthology: Object Oriented PHP Solution, Volume 1
Hacker's Challenge 2: Test Your Network Security & Forensic Skills
A Practical Guide to Security Assessments
Oracle Security Step-by-Step (Version 2.0)
BEA WebLogic Server 8 for Dummies
The Software Vulnerability Guide (Programming Series)
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
Innocent Code: A Security Wake-Up Call for Web Programmers
Building DMZs for Enterprise Networks
Web Applications (Hacking Exposed)
Computer Security in the 21st Century
.NET Development Security Solutions
Information Security Management Handbook, Fifth Edition
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Web Security Pocket Reference
The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
A Business Guide to Information Security
Security Sage's Guide to Hardening the Network Infrastructure