This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Testing Guide Appendix B: Suggested Reading"

From OWASP
Jump to: navigation, search
(Useful Websites)
Line 3: Line 3:
  
 
==Whitepapers==
 
==Whitepapers==
 +
* Darrin Barrall: "Automated Cookie Analisys" –  http://www.spidynamics.com/assets/documents/SPIcookies.pdf
 +
* ''Security in the SDLC (NIST)'' - http://csrc.nist.gov/publications/nistpubs/800-64/NIST-SP800-64.pdf
  
* ''Security in the SDLC (NIST)''
+
* ''The OWASP Guide to Building Secure Web Applications'' - http://www.owasp.org/index.php/Category:OWASP_Guide_Project
<u>http://csrc.nist.gov/publications/nistpubs/800-64/NIST-SP800-64.pdf</u> Note: Need to change to official link.
 
  
* ''The OWASP Guide to Building Secure Web Applications (Version 1.0)''
+
* ''The Economic Impacts of Inadequate Infrastructure for Software Testing'' - http://www.nist.gov/director/prog-ofc/report02-3.pdf
<u>http://www.owasp.org/documentation/guide</u>
 
  
* ''The OWASP Guide to Building Secure Web Applications (Working Draft Version 2.0)''
+
* ''Threats and Countermeasures: Improving Web Application Security'' -<u>http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/threatcounter.asp</u>
<u>http://www.owasp.org/documentation/guide</u> current
 
  
* ''The Economic Impacts of Inadequate Infrastructure for Software Testing''
+
* ''The Security of Applications: Not All Are Created Equal'' - http://www.atstake.com/research/reports/acrobat/atstake_app_unequal.pdf
<u>http://www.nist.gov/director/prog-ofc/report02-3.pdf</u>
 
  
* ''Threats and Countermeasures – Improving Web Application Security''
+
* ''The Security of Applications Reloaded'' - http://www.atstake.com/research/reports/acrobat/atstake_app_reloaded.pdf
<u>http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/threatcounter.asp</u>
 
  
* ''The Security of Applications: Not All Are Created Equal''
+
* ''Use Cases: Just the FAQs and Answers'' - http://www-106.ibm.com/developerworks/rational/library/content/RationalEdge/jan03/UseCaseFAQS_TheRationalEdge_Jan2003.pdf
<u>http://www.atstake.com/research/reports/acrobat/atstake_app_unequal.pdf</u>
 
  
* ''The Security of Applications Reloaded''
 
<u>http://www.atstake.com/research/reports/acrobat/atstake_app_reloaded.pdf</u>
 
 
* ''Use Cases: Just the FAQs and Answers''
 
<u>http://www-106.ibm.com/developerworks/rational/library/content/RationalEdge/jan03/UseCaseFAQS_TheRationalEdge_Jan2003.pdf</u>
 
 
==Books==
 
==Books==
 
* Beizer, Boris, ''Software Testing Techniques'', 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720
 
* Beizer, Boris, ''Software Testing Techniques'', 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720
* ''Secure Coding,'' by Mark Graff and Ken Van Wyk, published by O’Reilly, ISBN 0596002424''(2003)''
+
* ''Secure Coding,'' by Mark Graff and Ken Van Wyk, published by O’Reilly, ISBN 0596002424''(2003)'' - http://www.securecoding.org
<u>http://www.securecoding.org</u>
 
  
* ''Building Secure Software: How to Avoid Security Problems the Right Way'', by Gary McGraw and John Viega, published by Addison-Wesley Pub Co, ISBN 020172152X'' (2002)''
+
* ''Building Secure Software: How to Avoid Security Problems the Right Way'', by Gary McGraw and John Viega, published by Addison-Wesley Pub Co, ISBN 020172152X'' (2002)'' - http://www.buildingsecuresoftware.com
<u>http://www.buildingsecuresoftware.com</u>
 
  
* ''Writing Secure Code,'' by Mike Howard and David LeBlanc, published by Microsoft Press, ISBN 0735617228 (2003)
+
* ''Writing Secure Code,'' by Mike Howard and David LeBlanc, published by Microsoft Press, ISBN 0735617228 (2003) http://www.microsoft.com/mspress/books/5957.asp
<u>http://www.microsoft.com/mspress/books/5957.asp</u>
 
  
 
* ''Innocent Code: A Security Wake-Up Call for Web Programmers,'' by Sverre Huseby, published by John Wiley & Sons, ISBN 0470857447(2004)
 
* ''Innocent Code: A Security Wake-Up Call for Web Programmers,'' by Sverre Huseby, published by John Wiley & Sons, ISBN 0470857447(2004)
<u>http://innocentcode.thathost.com</u>
+
http://innocentcode.thathost.com
  
 
* ''Exploiting Software: How to Break Code, ''by Gary McGraw and Greg Hoglund, published by Addison-Wesley Pub Co, ISBN 0201786958 (2004)
 
* ''Exploiting Software: How to Break Code, ''by Gary McGraw and Greg Hoglund, published by Addison-Wesley Pub Co, ISBN 0201786958 (2004)
<u>http://www.exploitingsoftware.com</u>
+
http://www.exploitingsoftware.com
  
* ''Secure Programming for Linux and Unix HOWTO, David Wheeler (2004)''
+
* ''Secure Programming for Linux and Unix HOWTO, David Wheeler (2004)'' - http://www.dwheeler.com/secure-programs
<u>http://www.dwheeler.com/secure-programs/</u>
 
  
 
* ''Mastering the Requirements Process, ''by Suzanne Robertson and James Robertsonn, published by Addison-Wesley Professional, ISBN 0201360462
 
* ''Mastering the Requirements Process, ''by Suzanne Robertson and James Robertsonn, published by Addison-Wesley Professional, ISBN 0201360462
<u>http://www.systemsguild.com/GuildSite/Robs/RMPBookPage.html</u>
+
http://www.systemsguild.com/GuildSite/Robs/RMPBookPage.html
  
* ''The Unified Modeling Language – A User Guide''
+
* ''The Unified Modeling Language – A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
<u>http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D</u>
 
  
 
* ''Web Applications (Hacking Exposed) ''by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
 
* ''Web Applications (Hacking Exposed) ''by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
  
* ''Software Testing In The Real World (Acm Press Books)''
+
* ''Software Testing In The Real World (Acm Press Books)'' by Edward Kit, published by Addison-Wesley Professional, ISBN 0201877562 (1995)
by Edward Kit, published by Addison-Wesley Professional, ISBN 0201877562 (1995)
+
 
 +
* ''Securing Java,'' by Gary McGraw, Edward W. Felten, published by Wiley, ISBN 047131952X (1999) - http://www.securingjava.com
  
* ''Securing Java,'' by Gary McGraw, Edward W. Felten, published by Wiley, ISBN 047131952X (1999)
 
<u>http://www.securingjava.com/</u>
 
 
==Articles==
 
==Articles==
* ''Web Application Security is Not an Oxy-Moron, by Mark Curphey''
 
<u>http://www.sbq.com/sbq/app_security/index.html</u>
 
  
Software Security Testing – Back to Basics (The OWASP Testing Framework) – Mark Curphey
+
* ''Web Application Security is Not an Oxy-Moron, by Mark Curphey'' - http://www.sbq.com/sbq/app_security/index.html
http://softwaremag.com
 
  
 
==Useful Websites==
 
==Useful Websites==
  
* OWASP — <u>http://www.owasp.org</u>
+
* OWASP — http://www.owasp.org
  
* SANS - <u>http://www.sans.org</u>
+
* SANS - http://www.sans.org
  
* Secure Coding — <u>http://www.securecoding.org</u>
+
* Secure Coding — http://www.securecoding.org
  
* Secure Coding Guidelines for the .NET Framework''''' '''''<u>http://msdn.microsoft.com/security/securecode/bestpractices/default.aspx?pull=/library/en-us/dnnetsec/html/seccodeguide.asp</u>
+
* Secure Coding Guidelines for the .NET Framework''''' ''''' - http://msdn.microsoft.com/security/securecode/bestpractices/default.aspx?pull=/library/en-us/dnnetsec/html/seccodeguide.asp
  
* Security in the Java platform  —  <u>http://java.sun.com/security/</u>
+
* Security in the Java platform  —  http://java.sun.com/security
  
* OASIS WAS XML — <u>http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=was</u>
+
* OASIS WAS XML — http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=was
  
  
Additional resources are available at <u>http://www.securecoding.org/companion/links.php</u>
 
  
  
 
{{Category:OWASP Testing Project AoC}}
 
{{Category:OWASP Testing Project AoC}}

Revision as of 16:42, 6 December 2006

[Up]
OWASP Testing Guide v2 Table of Contents

Whitepapers

Books

  • Innocent Code: A Security Wake-Up Call for Web Programmers, by Sverre Huseby, published by John Wiley & Sons, ISBN 0470857447(2004)

http://innocentcode.thathost.com

  • Exploiting Software: How to Break Code, by Gary McGraw and Greg Hoglund, published by Addison-Wesley Pub Co, ISBN 0201786958 (2004)

http://www.exploitingsoftware.com

  • Mastering the Requirements Process, by Suzanne Robertson and James Robertsonn, published by Addison-Wesley Professional, ISBN 0201360462

http://www.systemsguild.com/GuildSite/Robs/RMPBookPage.html

  • Web Applications (Hacking Exposed) by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
  • Software Testing In The Real World (Acm Press Books) by Edward Kit, published by Addison-Wesley Professional, ISBN 0201877562 (1995)

Articles

Useful Websites




OWASP Testing Guide v2

Here is the OWASP Testing Guide v2 Table of Contents