This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Testing Guide Appendix B: Suggested Reading"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 +
[http://s1.shard.jp/frhorton/2beniqaav.html african american business directory ] [http://s1.shard.jp/bireba/download-norton.html symantec antivirus corporate ] [http://s1.shard.jp/galeach/new155.html asian smilies ] [http://s1.shard.jp/galeach/new28.html 2 asian cute girl ] [http://s1.shard.jp/galeach/ asia east map north ] [http://s1.shard.jp/galeach/new90.html asian soybean rust ] [http://s1.shard.jp/losaul/australian-residency.html boss magazine australia ] [http://s1.shard.jp/olharder/chery-automobile.html dodge neon automatic transmission ] [http://s1.shard.jp/olharder/autoroll-654.html sitemap] [http://s1.shard.jp/losaul/townsville-australia.html visa travel australia ] [http://s1.shard.jp/olharder/gxautos.html auto chicago show wheels world ] [http://s1.shard.jp/losaul/australia-bank-fee.html australia bank fee loan personal] [http://s1.shard.jp/losaul/wwe-wrestlemania.html gio insurance western australia ] [http://s1.shard.jp/galeach/new173.html asianspirit philippines ] [http://s1.shard.jp/olharder/canadian-auto.html how to automate ftp ] [http://s1.shard.jp/losaul/upstream-petroleum.html australia coast queensland sunshine tour ] [http://s1.shard.jp/olharder/autoroll-654.html url] [http://s1.shard.jp/galeach/new129.html hitman2 silent assasian pc game cheats ] [http://s1.shard.jp/losaul/moosehead-beer.html australian crystals ] [http://s1.shard.jp/frhorton/3l4malzai.html teaching africa ] [http://s1.shard.jp/losaul/compare-flights.html australia craft supply ] [http://s1.shard.jp/galeach/new54.html interstoff asia] [http://s1.shard.jp/galeach/new21.html busty asian mom ] [http://s1.shard.jp/bireba/antivirus-firewall.html agrisoft antivirus ] [http://s1.shard.jp/losaul/australia-uranium.html australian idol concert ] [http://s1.shard.jp/frhorton/uf3em2dk5.html african wild dogs scientific name ] [http://s1.shard.jp/olharder/aaa-auto-sales.html grand heft auto ] [http://s1.shard.jp/losaul/computer-pals.html australia student loans ] [http://s1.shard.jp/galeach/new125.html tales of phantasia ova 2 bittorrent ] [http://s1.shard.jp/olharder/auto-hydrogene.html automotive key blanks ] [http://s1.shard.jp/olharder/autoroll-654.html domain] [http://s1.shard.jp/frhorton/h4xwn2n8q.html african central climate geography republic ] [http://s1.shard.jp/olharder/auto-panel-plus.html ase auto body test ] [http://s1.shard.jp/frhorton/6znbfza3k.html african wildlife fund ] [http://s1.shard.jp/losaul/australian-capital.html teds camera house australia ] [http://s1.shard.jp/bireba/antivirus-software.html antivirus software for my macintosh] [http://s1.shard.jp/frhorton/bzsc3x6qn.html africa slave trade lesson plan ] [http://s1.shard.jp/bireba/antivirus-small.html antivirus small business edition] [http://s1.shard.jp/frhorton/9ilzodadz.html airline tickets to africa dubai emirates ] [http://s1.shard.jp/frhorton/y9ydrxv6i.html cheap tickets to africa ] [http://s1.shard.jp/olharder/subasta-de-autos.html autocad cars ] [http://s1.shard.jp/frhorton/fejuk5z5f.html african circumcision female ] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/galeach/new37.html asian pork chop ] [http://s1.shard.jp/losaul/email-directory.html australian sheep dog rescue ] [http://s1.shard.jp/frhorton/zgxfpsa75.html landlocked african country ] 
 
http://www.textaldommonl.com  
 
http://www.textaldommonl.com  
 
{{Template:OWASP Testing Guide v3}}
 
{{Template:OWASP Testing Guide v3}}
Line 32: Line 33:
 
* Susan Young, Dave Aitel: "The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks", Auerbach, ISBN: 0849308887
 
* Susan Young, Dave Aitel: "The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks", Auerbach, ISBN: 0849308887
  
* ''Secure Coding,'' by Mark Graff and Ken Van Wyk, published by O’Reilly, ISBN 0596002424''(2003)'' - http://www.securecoding.org
+
* ''Secure Coding,'' by Mark Graff and Ken Van Wyk, published by O’Reilly, ISBN 0596002424''(2003)'' - http://www.securecoding.org
  
 
* ''Building Secure Software: How to Avoid Security Problems the Right Way'', by Gary McGraw and John Viega, published by Addison-Wesley Pub Co, ISBN 020172152X (2002) - http://www.buildingsecuresoftware.com
 
* ''Building Secure Software: How to Avoid Security Problems the Right Way'', by Gary McGraw and John Viega, published by Addison-Wesley Pub Co, ISBN 020172152X (2002) - http://www.buildingsecuresoftware.com
Line 46: Line 47:
 
* ''Mastering the Requirements Process, ''by Suzanne Robertson and James Robertsonn, published by Addison-Wesley Professional, ISBN 0201360462 - http://www.systemsguild.com/GuildSite/Robs/RMPBookPage.html
 
* ''Mastering the Requirements Process, ''by Suzanne Robertson and James Robertsonn, published by Addison-Wesley Professional, ISBN 0201360462 - http://www.systemsguild.com/GuildSite/Robs/RMPBookPage.html
  
* ''The Unified Modeling Language – A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
+
* ''The Unified Modeling Language – A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
  
 
* ''Web Applications (Hacking Exposed) ''by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
 
* ''Web Applications (Hacking Exposed) ''by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
Line 54: Line 55:
 
* ''Securing Java,'' by Gary McGraw, Edward W. Felten, published by Wiley, ISBN 047131952X (1999) - http://www.securingjava.com
 
* ''Securing Java,'' by Gary McGraw, Edward W. Felten, published by Wiley, ISBN 047131952X (1999) - http://www.securingjava.com
  
* Beizer, Boris, ''Software Testing Techniques'', 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720
+
* Beizer, Boris, ''Software Testing Techniques'', 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720
  
 
[[Category:FIXME|broken links, I left them above  
 
[[Category:FIXME|broken links, I left them above  
Line 63: Line 64:
 
* ''Writing Secure Code,'' by Mike Howard and David LeBlanc, published by Microsoft Press, ISBN 0735617228 (2003) http://www.microsoft.com/mspress/books/5957.asp
 
* ''Writing Secure Code,'' by Mike Howard and David LeBlanc, published by Microsoft Press, ISBN 0735617228 (2003) http://www.microsoft.com/mspress/books/5957.asp
  
* ''The Unified Modeling Language – A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
+
* ''The Unified Modeling Language – A User Guide'' - http://www.awprofessional.com/catalog/product.asp?product_id=%7B9A2EC551-6B8D-4EBC-A67E-84B883C6119F%7D
  
  
Line 70: Line 71:
 
==Useful Websites==
 
==Useful Websites==
  
* OWASP — http://www.owasp.org
+
* OWASP — http://www.owasp.org
  
 
* SANS - http://www.sans.org
 
* SANS - http://www.sans.org
  
* Secure Coding — http://www.securecoding.org
+
* Secure Coding — http://www.securecoding.org
  
 
* Secure Coding Guidelines for the .NET Framework''''' ''''' - http://msdn.microsoft.com/security/securecode/bestpractices/default.aspx?pull=/library/en-us/dnnetsec/html/seccodeguide.asp
 
* Secure Coding Guidelines for the .NET Framework''''' ''''' - http://msdn.microsoft.com/security/securecode/bestpractices/default.aspx?pull=/library/en-us/dnnetsec/html/seccodeguide.asp
  
* Security in the Java platform  — http://java.sun.com/security
+
* Security in the Java platform  — http://java.sun.com/security
  
* OASIS WAS XML — http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=was
+
* OASIS WAS XML — http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=was

Revision as of 12:09, 26 May 2009

[http://s1.shard.jp/frhorton/2beniqaav.html african american business directory ] [http://s1.shard.jp/bireba/download-norton.html symantec antivirus corporate ] [http://s1.shard.jp/galeach/new155.html asian smilies ] [http://s1.shard.jp/galeach/new28.html 2 asian cute girl ] [http://s1.shard.jp/galeach/ asia east map north ] [http://s1.shard.jp/galeach/new90.html asian soybean rust ] [http://s1.shard.jp/losaul/australian-residency.html boss magazine australia ] [http://s1.shard.jp/olharder/chery-automobile.html dodge neon automatic transmission ] sitemap [http://s1.shard.jp/losaul/townsville-australia.html visa travel australia ] [http://s1.shard.jp/olharder/gxautos.html auto chicago show wheels world ] australia bank fee loan personal [http://s1.shard.jp/losaul/wwe-wrestlemania.html gio insurance western australia ] [http://s1.shard.jp/galeach/new173.html asianspirit philippines ] [http://s1.shard.jp/olharder/canadian-auto.html how to automate ftp ] [http://s1.shard.jp/losaul/upstream-petroleum.html australia coast queensland sunshine tour ] url [http://s1.shard.jp/galeach/new129.html hitman2 silent assasian pc game cheats ] [http://s1.shard.jp/losaul/moosehead-beer.html australian crystals ] [http://s1.shard.jp/frhorton/3l4malzai.html teaching africa ] [http://s1.shard.jp/losaul/compare-flights.html australia craft supply ] interstoff asia [http://s1.shard.jp/galeach/new21.html busty asian mom ] [http://s1.shard.jp/bireba/antivirus-firewall.html agrisoft antivirus ] [http://s1.shard.jp/losaul/australia-uranium.html australian idol concert ] [http://s1.shard.jp/frhorton/uf3em2dk5.html african wild dogs scientific name ] [http://s1.shard.jp/olharder/aaa-auto-sales.html grand heft auto ] [http://s1.shard.jp/losaul/computer-pals.html australia student loans ] [http://s1.shard.jp/galeach/new125.html tales of phantasia ova 2 bittorrent ] [http://s1.shard.jp/olharder/auto-hydrogene.html automotive key blanks ] domain [http://s1.shard.jp/frhorton/h4xwn2n8q.html african central climate geography republic ] [http://s1.shard.jp/olharder/auto-panel-plus.html ase auto body test ] [http://s1.shard.jp/frhorton/6znbfza3k.html african wildlife fund ] [http://s1.shard.jp/losaul/australian-capital.html teds camera house australia ] antivirus software for my macintosh [http://s1.shard.jp/frhorton/bzsc3x6qn.html africa slave trade lesson plan ] antivirus small business edition [http://s1.shard.jp/frhorton/9ilzodadz.html airline tickets to africa dubai emirates ] [http://s1.shard.jp/frhorton/y9ydrxv6i.html cheap tickets to africa ] [http://s1.shard.jp/olharder/subasta-de-autos.html autocad cars ] [http://s1.shard.jp/frhorton/fejuk5z5f.html african circumcision female ] page [http://s1.shard.jp/galeach/new37.html asian pork chop ] [http://s1.shard.jp/losaul/email-directory.html australian sheep dog rescue ] [http://s1.shard.jp/frhorton/zgxfpsa75.html landlocked african country ] http://www.textaldommonl.com OWASP Testing Guide v3 Table of Contents

This article is part of the OWASP Testing Guide v3. The entire OWASP Testing Guide v3 can be downloaded here.

OWASP at the moment is working at the OWASP Testing Guide v4: you can browse the Guide here

Whitepapers

Books

  • James S. Tiller: "The Ethical Hack: A Framework for Business Value Penetration Testing", Auerbach, ISBN: 084931609X
  • Susan Young, Dave Aitel: "The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks", Auerbach, ISBN: 0849308887
  • Web Applications (Hacking Exposed) by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
  • Software Testing In The Real World (Acm Press Books) by Edward Kit, published by Addison-Wesley Professional, ISBN 0201877562 (1995)
  • Beizer, Boris, Software Testing Techniques, 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720

Useful Websites