This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

OWASP Testing Guide Appendix B: Suggested Reading

Revision as of 16:06, 21 November 2012 by David Fern (talk | contribs)

Jump to: navigation, search
This article is part of the new OWASP Testing Guide v4.
Back to the OWASP Testing Guide v4 ToC: Back to the OWASP Testing Guide Project:


  • Improving Web Application Security: Threats and Countermeasures-

  • The Open Web Application Security Project (OWASP) Guide Project -

  • Security Considerations in the System Development Life Cycle (NIST) -

  • The Security of Applications: Not All Are Created Equal -

  • Use Cases: Just the FAQs and Answers –


  • James S. Tiller: "The Ethical Hack: A Framework for Business Value Penetration Testing", Auerbach, ISBN: 084931609X
  • Susan Young, Dave Aitel: "The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks", Auerbach, ISBN: 0849308887
  • Web Applications (Hacking Exposed) by Joel Scambray and Mike Shema, published by McGraw-Hill Osborne Media, ISBN 007222438X
  • Software Testing In The Real World (Acm Press Books) by Edward Kit, published by Addison-Wesley Professional, ISBN 0201877562 (1995)
  • Beizer, Boris, Software Testing Techniques, 2nd Edition, © 1990 International Thomson Computer Press, ISBN 0442206720

Useful Websites


Deliberately Insecure Web Applications

  • Hacme Series from McAfee: