Web application security - the fast guide 1.1 | Page 190

Refereces: 1. AKAMAI. (2014). A Guide to multilayer web securty. 2. Bryan Sullivan, V. L. (2012). MC Graw Hill. 3. Chandra, P. Software Assurance maturity model. 4. Christian S. Fötinger, W. Z. Understanding a hacker’s mind –A psychological insight into the hijacking of identities. 5. Dafydd Stuttard, M. P. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Second Edition. 2011: Wiley. 6. Gary McGraw, P. S.BSIMM7. 7. JOEL SCAMBRAY, V. L. (2011). Hacking exposed web application. MC Graw Hill. 8. Mark Curphey, J. S. (2003). Improving Web Application Security: Threats and Countermeasures. 9. OWASP. (2013). OWASP top 10. 10. Roger Meyer, C. C. (2008). Detecting attacks on web application from log files. 11. sheama, M. (2011). Web application security for dummies. Wiley. 12. Tom Brennan, J. J. (2015). Top 10 Considerations For Incident Response. 13. Xue, X. L. (2013). A Survey on Web Application Security.