This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Category:OWASP Papers"

From OWASP
Jump to: navigation, search
(Papers)
 
(6 intermediate revisions by 4 users not shown)
Line 5: Line 5:
 
== A note on plagiarism ==
 
== A note on plagiarism ==
  
Plagiarism is representing another person's work as one's own. According to [http://www.dianahacker.com/ Diana Hacker], "Three acts are plagiarism: (1) failing to cite quotations and borrowed ideas, (2) failing to enclose borrowed language in quotation marks and (3) failing to put summaries and paraphrases in your own words." Plagiarism is inconsistent with OWASP's goals and will result in permanent removal of your material from our site. Please report suspected plagiarism to [mailto:[email protected] [email protected]] with as many details as possible
+
Plagiarism is representing another person's work as one's own. According to [http://www.dianahacker.com/ Diana Hacker], "Three acts are plagiarism: (1) failing to cite quotations and borrowed ideas, (2) failing to enclose borrowed language in quotation marks and (3) failing to put summaries and paraphrases in your own words." Plagiarism is inconsistent with OWASP's goals and will result in permanent removal of your material from our site.  
 +
<br><br>
 +
To check content there are many ways - if you suspect it try [http://www.articlechecker.com Articlechecker.com]
 +
<br><br>
 +
Please report suspected plagiarism to [mailto:[email protected] [email protected]] with as many details as possible and we will take action 
 
      
 
      
 
== Submitting a paper ==
 
== Submitting a paper ==
Line 17: Line 21:
 
: Brief description   
 
: Brief description   
 
-->   
 
-->   
 +
 +
; [https://www.owasp.org/index.php/Image:Software_Development_And_Information_Security-Tom_Neaves.pdf Software Development and Information Security] (Tom Neaves)
 +
: An analysis, investigation and experiment into what happens when security is treated as an add-on during development.
 +
 +
; [https://www.owasp.org/images/2/28/Effective_Software_Security_Management.pdf Effective Software Security Management PDF Version] (Dharmesh Mehta) 
 +
: Discusses practical, flexible and understandable approach to aligning application security in SDLC.   
  
 
; [http://www.owasp.org/images/b/b6/Jeopardy_in_Web_2.0_-_The_Next_Generation_Web_Applications.pdf Jeopardy in Web 2.0 - The Next Generation Web PDF Version] (Dharmesh Mehta)   
 
; [http://www.owasp.org/images/b/b6/Jeopardy_in_Web_2.0_-_The_Next_Generation_Web_Applications.pdf Jeopardy in Web 2.0 - The Next Generation Web PDF Version] (Dharmesh Mehta)   
Line 24: Line 34:
 
: Discusses attacks against Web 2.0 - The Next Generation Web   
 
: Discusses attacks against Web 2.0 - The Next Generation Web   
 
      
 
      
; [http://www.owasp.org/images/1/16/Document_Security_in_Web_Applications.doc Document Security in Web Applications] (Andres Desa) + http://img520.imageshack.us/img520/5647/hacked2orwf1.gif
+
; [http://www.owasp.org/images/1/16/Document_Security_in_Web_Applications.doc Document Security in Web Applications] (Andres Desa)
 
: Discusses issues with protecting data in document form, such as Word, Excel, and PDF.
 
: Discusses issues with protecting data in document form, such as Word, Excel, and PDF.

Latest revision as of 15:08, 9 February 2009

Welcome to the OWASP Papers Program

In an effort to promote more in-depth work in application security, the OWASP Papers program is now accepting paper submissions. Papers submitted to the OWASP Papers program will be reviewed by a team of senior application security experts. These reviewers will provide constructive feedback on submissions in the hopes of achieving a publishable quality paper. Papers that are approved by the review team will be published on the OWASP website and will be candidates for presentation at the next OWASP AppSec conference.

A note on plagiarism

Plagiarism is representing another person's work as one's own. According to Diana Hacker, "Three acts are plagiarism: (1) failing to cite quotations and borrowed ideas, (2) failing to enclose borrowed language in quotation marks and (3) failing to put summaries and paraphrases in your own words." Plagiarism is inconsistent with OWASP's goals and will result in permanent removal of your material from our site.

To check content there are many ways - if you suspect it try Articlechecker.com

Please report suspected plagiarism to [email protected] with as many details as possible and we will take action

Submitting a paper

To submit a paper, please use the following template for Microsoft Word / Open Office documents. All submissions should be sent to [email protected]. By submitting a paper, you agree to having OWASP publish the paper on the OWASP website and that you will not distribute the paper via other channels. Your paper will be made available under the Creative Commons Share-Alike Attribution license.

Papers

Software Development and Information Security (Tom Neaves)
An analysis, investigation and experiment into what happens when security is treated as an add-on during development.
Effective Software Security Management PDF Version (Dharmesh Mehta)
Discusses practical, flexible and understandable approach to aligning application security in SDLC.
Jeopardy in Web 2.0 - The Next Generation Web PDF Version (Dharmesh Mehta)
Discusses attacks against Web 2.0 - The Next Generation Web
Jeopardy in Web 2.0 - The Next Generation Web HTML Version (Dharmesh Mehta)
Discusses attacks against Web 2.0 - The Next Generation Web
Document Security in Web Applications (Andres Desa)
Discusses issues with protecting data in document form, such as Word, Excel, and PDF.

Pages in category "OWASP Papers"

This category contains only the following page.