This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Books that reference OWASP
Many of the leading security authors rely on OWASP tools and materials. Many of these authors contribute to OWASP, speak at our conferences, and participate in our local chapters. Some of these books simply reference our materials, but others are structured around OWASP, and some even have whole chapters dedicated to our tools.
Windows Server 2003 (Hacking Exposed)
Agile Java Development with Spring, Hibernate and Eclipse (Developer's Library)
Writing Secure Code, Second Edition
19 Deadly Sins of Software Security (Security One-off)
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
JavaScript: The Complete Reference, Second Edition
Microsoft Visual Basic .NET Programmer's Cookbook
Information Security Illuminated (Jones and Barlett Illuminated)
Professional Pen Testing for Web Applications (Programmer to Programmer)
Security+ Certification Training Kit
The Security Risk Assessment Handbook
The PHP Anthology: Object Oriented PHP Solution, Volume 1
Hacker's Challenge 2: Test Your Network Security & Forensic Skills
A Practical Guide to Security Assessments
Oracle Security Step-by-Step (Version 2.0)
BEA WebLogic Server 8 for Dummies
The Software Vulnerability Guide (Programming Series)
Oracle Security Handbook : Implement a Sound Security Plan in Your Oracle Environment
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
Innocent Code: A Security Wake-Up Call for Web Programmers
Building DMZs for Enterprise Networks
Web Applications (Hacking Exposed)
Computer Security in the 21st Century
.NET Development Security Solutions
Information Security Management Handbook, Fifth Edition
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Web Security Pocket Reference
The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
A Business Guide to Information Security
Security Sage's Guide to Hardening the Network Infrastructure