This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Books that reference OWASP

From OWASP
Revision as of 02:14, 3 January 2007 by OWASP (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Leading Security Books that Reference OWASP

Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.


<a href="http://www.amazon.com/Windows-Server-2003-Hacking-Exposed/dp/0072230614/sr=1-1/qid=1167776633/ref=pd_bbs_1/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Windows Server 2003 (Hacking Exposed)" src="0072230614.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Development-Hibernate-Eclipse-Developers-Library/dp/0672328968/sr=1-2/qid=1167776633/ref=sr_1_2/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Agile Java Development with Spring, Hibernate and Eclipse (Developer's Library)" src="0672328968.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V63875509_.jpg" ></a>

<a href="http://www.amazon.com/Writing-Secure-Second-Michael-Howard/dp/0735617228/sr=1-3/qid=1167776633/ref=sr_1_3/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Writing Secure Code, Second Edition" src="0735617228.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V39288098_.jpg" ></a>

<a href="http://www.amazon.com/Deadly-Sins-Software-Security-One-off/dp/0072260858/sr=1-4/qid=1167776633/ref=sr_1_4/102-4910841-8071358?ie=UTF8&s=books"> <img alt="19 Deadly Sins of Software Security (Security One-off)" src="0072260858.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V66930350_.jpg" ></a>

<a href="http://www.amazon.com/Beginning-Visual-Basic-Thearon-Willis/dp/0764574019/sr=1-5/qid=1167776633/ref=sr_1_5/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Beginning Visual Basic 2005" src="0764574019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V48604100_.jpg" ></a>

<a href="http://www.amazon.com/Testing-Applications-Web-Planning-Internet-Based/dp/0471201006/sr=1-6/qid=1167776633/ref=sr_1_6/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition" src="0471201006.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/JavaScript-Complete-Reference-Thomas-Powell/dp/0072253576/sr=1-7/qid=1167776633/ref=sr_1_7/102-4910841-8071358?ie=UTF8&s=books"> <img alt="JavaScript: The Complete Reference, Second Edition" src="0072253576.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Microsoft-Visual-Basic-Programmers-Cookbook/dp/073561931X/sr=1-8/qid=1167776633/ref=sr_1_8/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Microsoft Visual Basic .NET Programmer's Cookbook" src="073561931X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Information-Security-Illuminated-Jones-Barlett/dp/076372677X/sr=1-9/qid=1167776633/ref=sr_1_9/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Information Security Illuminated (Jones and Barlett Illuminated)" src="076372677X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Professional-Pen-Testing-Applications-Programmer/dp/0471789666/sr=1-10/qid=1167776633/ref=sr_1_10/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Professional Pen Testing for Web Applications (Programmer to Programmer)" src="0471789666.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V61561788_.jpg" ></a>

<a href="http://www.amazon.com/Security%2B-Certification-Training-Microsoft-Corporation/dp/0735618224/sr=1-11/qid=1167776633/ref=sr_1_11/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Security+ Certification Training Kit" src="0735618224.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Security-Risk-Assessment-Handbook/dp/0849329981/sr=1-12/qid=1167776633/ref=sr_1_12/102-4910841-8071358?ie=UTF8&s=books"> <img alt="The Security Risk Assessment Handbook" src="0849329981.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54479809_.jpg" ></a>

<a href="http://www.amazon.com/PHP-Anthology-Object-Oriented-Solution/dp/0957921853/sr=1-13/qid=1167776713/ref=sr_1_13/102-4910841-8071358?ie=UTF8&s=books"> <img alt="The PHP Anthology: Object Oriented PHP Solution, Volume 1" src="0957921853.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Hackers-Challenge-Network-Security-Forensic/dp/0072226307/sr=1-14/qid=1167776713/ref=sr_1_14/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Hacker's Challenge 2: Test Your Network Security & Forensic Skills" src="0072226307.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Practical-Guide-Security-Assessments/dp/0849317061/sr=1-15/qid=1167776713/ref=sr_1_15/102-4910841-8071358?ie=UTF8&s=books"> <img alt="A Practical Guide to Security Assessments" src="0849317061.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Oracle-Security-Step-Step-Version/dp/0974372749/sr=1-16/qid=1167776713/ref=sr_1_16/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Oracle Security Step-by-Step (Version 2.0)" src="0974372749.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Perspectives-Web-Services-Real-World-Professional/dp/3540009140/sr=1-17/qid=1167776713/ref=sr_1_17/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Perspectives on Web Services: Applying SOAP, WSDL and UDDI to Real-World Projects (Springer Professional Computing)" src="3540009140.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/BEA-WebLogic-Server-8-Dummies/dp/0764524720/sr=1-18/qid=1167776713/ref=sr_1_18/102-4910841-8071358?ie=UTF8&s=books"> <img alt="BEA WebLogic Server 8 for Dummies" src="0764524720.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Hacking-Dummies-Kevin-Beaver/dp/076455784X/sr=1-19/qid=1167776713/ref=sr_1_19/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Hacking for Dummies" src="076455784X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50846974_.jpg" ></a>

<a href="http://www.amazon.com/Software-Vulnerability-Guide-Programming/dp/1584503580/sr=1-20/qid=1167776713/ref=sr_1_20/102-4910841-8071358?ie=UTF8&s=books"> <img alt="The Software Vulnerability Guide (Programming Series) (Programming Series)" src="1584503580.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Oracle-Security-Handbook-Implement-Environment/dp/0072133252/sr=1-21/qid=1167776713/ref=sr_1_21/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment" src="0072133252.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Special-Ops-Network-Security-Microsoft/dp/1931836698/sr=1-22/qid=1167776713/ref=sr_1_22/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle" src="1931836698.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Hacker-Boot-Camp-Gerald-Quakenbush/dp/097684091X/sr=1-23/qid=1167776713/ref=sr_1_23/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Web Hacker Boot Camp" src="097684091X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66856900_.jpg" ></a>

<a href="http://www.amazon.com/Innocent-Code-Security-Wake-Up-Programmers/dp/0470857447/sr=1-24/qid=1167776713/ref=sr_1_24/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Innocent Code: A Security Wake-Up Call for Web Programmers" src="0470857447.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50842243_.jpg" ></a>

<a href="http://www.amazon.com/Hardening-Network-Security-John-Mallery/dp/0072257032/sr=1-25/qid=1167776734/ref=sr_1_25/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Hardening Network Security" src="0072257032.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Building-Enterprise-Networks-Robert-Shimonski/dp/1931836884/sr=1-26/qid=1167776734/ref=sr_1_26/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Building DMZs for Enterprise Networks" src="1931836884.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Applications-Hacking-Exposed-Joel-Scambray/dp/007222438X/sr=1-27/qid=1167776734/ref=sr_1_27/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Web Applications (Hacking Exposed)" src="007222438X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Computer-Security-21st-Century-D-T/dp/0387240055/sr=1-28/qid=1167776734/ref=sr_1_28/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Computer Security in the 21st Century" src="0387240055.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/NET-Development-Security-Solutions-Mueller/dp/0782142664/sr=1-29/qid=1167776734/ref=sr_1_29/102-4910841-8071358?ie=UTF8&s=books"> <img alt=".NET Development Security Solutions" src="0782142664.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Information-Security-Management-Handbook-Fifth/dp/0849319978/sr=1-30/qid=1167776734/ref=sr_1_30/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Information Security Management Handbook, Fifth Edition" src="0849319978.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/HackNotes-Network-Security-Portable-Reference/dp/0072227834/sr=1-31/qid=1167776734/ref=sr_1_31/102-4910841-8071358?ie=UTF8&s=books"> <img alt="HackNotes(tm) Network Security Portable Reference" src="0072227834.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Computer-Systems-Validation-Management-Pharmaceutical/dp/0849318718/sr=1-32/qid=1167776734/ref=sr_1_32/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Computer Systems Validation: Quality Assurance, Risk Management, and Regulatory Compliance for Pharmaceutical and Healt" src="0849318718.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/HackNotes-Web-Security-Pocket-Reference/dp/0072227842/sr=1-33/qid=1167776734/ref=sr_1_33/102-4910841-8071358?ie=UTF8&s=books"> <img alt="HackNotes(tm) Web Security Pocket Reference" src="0072227842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Secure-Online-Business-Handbook-Management/dp/0749446420/sr=1-34/qid=1167776734/ref=sr_1_34/102-4910841-8071358?ie=UTF8&s=books"> <img alt="The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity" src="0749446420.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V37016241_.jpg" ></a>

<a href="http://www.amazon.com/Advances-Computer-Science-Management-Proceedings/dp/3540307672/sr=1-35/qid=1167776734/ref=sr_1_35/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Advances in Computer Science - ASIAN 2005. Data Management on the Web: 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings ... (Lecture Notes in Computer Science)" src="3540307672.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Applied-Cryptography-Network-Security-International/dp/3540202080/sr=1-36/qid=1167776734/ref=sr_1_36/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings (Lecture Notes in Computer Science)" src="3540202080.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V53966271_.jpg" ></a>

<a href="http://www.amazon.com/Information-Security-Practice-Experience-International/dp/3540255842/sr=1-37/qid=1167776753/ref=sr_1_37/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Lecture Notes in Computer Science)" src="3540255842.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Information-Security-Practice-Experience-International/dp/3540330526/sr=1-38/qid=1167776753/ref=sr_1_38/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Information Security Practice and Experience: Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Lecture Notes in Computer Science)" src="3540330526.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V54147362_.jpg" ></a>

<a href="http://www.amazon.com/Business-Guide-Information-Security/dp/0749443952/sr=1-39/qid=1167776753/ref=sr_1_39/102-4910841-8071358?ie=UTF8&s=books"> <img alt="A Business Guide to Information Security" src="0749443952.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V50358246_.jpg" ></a>

<a href="http://www.amazon.com/Security-Sages-Hardening-Network-Infrastructure/dp/1931836019/sr=1-40/qid=1167776753/ref=sr_1_40/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Security Sage's Guide to Hardening the Network Infrastructure" src="1931836019.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Detection-Intrusions-Malware-Vulnerability-Assessment/dp/354036014X/sr=1-41/qid=1167776753/ref=sr_1_41/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings (Lecture Notes in Computer Science)" src="354036014X.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_V60787098_.jpg" ></a>

<a href="http://www.amazon.com/Miller-Information-Technology-Audits-2005/dp/0808089668/sr=1-42/qid=1167776753/ref=sr_1_42/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Miller Information Technology Audits, 2005" src="0808089668.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_V66859364_.jpg" ></a>

<a href="http://www.amazon.com/Technologies-Advanced-Heterogeneous-Networks-Engineering/dp/3540308849/sr=1-43/qid=1167776753/ref=sr_1_43/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Technologies for Advanced Heterogeneous Networks: First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings (Lecture Notes in Computer Science)" src="3540308849.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_SCTHUMBZZZ_.jpg" ></a>

<a href="http://www.amazon.com/Frontiers-Research-Development-APWeb-2006/dp/3540311424/sr=1-44/qid=1167776753/ref=sr_1_44/102-4910841-8071358?ie=UTF8&s=books"> <img alt="Frontiers of WWW Research and Development -- APWeb 2006: 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings (Lecture Notes in Computer Science)" src="3540311424.01._PIsitb-st-arrow,TopLeft,-1,-14_OU01_AA100_SCTHUMBZZZ_.jpg" ></a>