This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Application Security Guide For CISOs"
(Licensing text added) |
m (Link correction) |
||
Line 26: | Line 26: | ||
** [[CISO AppSec Guide: Online Data Breach Cost Calculator|Appendix I-C: Online Data Breach Cost Calculator]] | ** [[CISO AppSec Guide: Online Data Breach Cost Calculator|Appendix I-C: Online Data Breach Cost Calculator]] | ||
** [[CISO AppSec Guide: Quick Reference to OWASP Guides & Projects|Appendix I-D: Quick Reference to OWASP Guides & Projects]] | ** [[CISO AppSec Guide: Quick Reference to OWASP Guides & Projects|Appendix I-D: Quick Reference to OWASP Guides & Projects]] | ||
+ | |||
== Licensing == | == Licensing == | ||
− | The OWASP Application Security Guide For CISOs is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | + | The OWASP Application Security Guide For CISOs is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
| width="1%" style="background:#ffffff" | | | width="1%" style="background:#ffffff" | | ||
Line 40: | Line 41: | ||
* Marco Marona | * Marco Marona | ||
+ | |||
== Other authors and contributors == | == Other authors and contributors == | ||
Line 49: | Line 51: | ||
* Stephanie Tan | * Stephanie Tan | ||
* Colin Watson | * Colin Watson | ||
+ | |||
+ | |||
+ | == Related projects == | ||
The contributors to the [[OWASP CISO Survey]] also provided invaluable data for this guide. | The contributors to the [[OWASP CISO Survey]] also provided invaluable data for this guide. | ||
+ | |||
== Further details == | == Further details == |
Revision as of 22:12, 20 September 2013
The GuideContents
LicensingThe OWASP Application Security Guide For CISOs is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
CreditsPrimary author and editor
Other authors and contributors
Related projectsThe contributors to the OWASP CISO Survey also provided invaluable data for this guide.
Further detailsFor further information about the Application Security Guide For CISOs see the project page.
|