Diplomski rad br. 1783
Penetracijsko ispitivanje sigurnosti Web primjenskih programa
Ivan Tomić 0036399500 | FER | ZEMRIS | HOME |

7. Literatura

[1] JAMES S. TILLER: The Ethical Hack (A Framework for Business Value Penetration Testing)

[2] Oreilly: Network Security Assessment 2nd Edition

[3] Syngress: Penetration Testers Open Source Toolkit Volume 2

[4] McGraw Hill: Gray Hat Hacking 2nd Edition

[5] Penetration Testing – A Systematic Approach by Manish Saindane

[6] Penetration Testing Model - Federal Office for Information Security

[7] John Wack, Miles Tracy, Murugiah Souppaya: Guideline on Network Security Testing

[8] Northcutt, S.; Shenk, J.; Shackleford, D.; Rosenberg, T.; Siles, R.; Manchini, S: Penetration Testing: Assessing Your Overall Security Before Attackers Do - SANS Institute

[9] Conducting a Penetration Test on an Organization – SANS Institute

[10] Dafydd Stuttard, Marcus Pinto: The Web Application Hacker’s Handbook

[11] OWASP Top Ten Project

[12] Web Application Security Consortium: Threat Classification

[13] OWASP Guide Project

[14] Andres Andreu: Professional Pen Testing for Web Applications

[15] Joel Scambray, Mike Shema and Caleb Sima: Hacking Exposed Web Applications, Second Edition

[16] AUTOMATED TESTING OF PRIVILEGE ESCALATION IN WEB APPLICATIONS

[17] Mario Kozina: Automatizirano određivanje vrste web aplikacije

Prethodna
Gore
Sljedeca
© 2009 Ivan Tomić