pág. 1575
NewZealandDay/assets/presentations/Manico--Keynote-Abridged_History_of_AppSec--
20200221.pdf
McGraw, G. (2018). Software Security: Building Security In. Addison-Wesley Professional.
OWASP Foundation (2008), Guías de Pruebas OWASP, Attribution-ShareAlike 3.0,
https://owasp.org/www-pdf-archive/Gu%C3%ADa_de_pruebas_de_OWASP_ver_3.0.pdf
OWASP Foundation (2021), OWASP TOP 10 “Bienvenidos al OWASP Top 10 2021”,
https://owasp.org/Top10/es/A00_2021_Introduction/
Rault, R., Schalkwijk, L., Agé, M., Crocfer, N., Crocfer, R., Dumas, D., Lasson, S. (2015), Seguridad
informática - Hacking Ético. Barcelona: Ediciones ENI.
Rojas, Jorge (2018), Vulnerabilidades De Aplicaciones Web Según OWASP, Universidad Piloto de
Colombia, http://repository.unipiloto.edu.co/handle/20.500.12277/8654
SANS Institute (2019), Cybersecurity Training and Certifications 2019 Catalog, chrome-
extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.sans.org/media/security-
training/course-catalog-2019.pdf
Sreenivasa, R., & Kuman, N. (2012). Web Application Vulnerability Detection Using Dynamic
Analysis, International Journal of Enterprise Computing and Business Systems, ISSN (Online):
2230-8849.
Steven, John (Chief Technology Officer in ZeroNorth) (2019), The Impact of Digital Transformation on
Enterprise Security, https://es.slideshare.net/slideshow/the-impact-of-digital-transformation-
on-enterprise-security/188195513
Stock, A., Glas B., Smithline N., Gigler T., OWASP Top 10 (2017). The Ten Most Critical
WebApplication Security Risks. Edtion ed. EE.UU: The OWASP Foundation, 2017.
Tamayo Veintimilla, Oswaldo Alejandro (2016). Desarrollo de una Guía Técnica Estándar para Aplicar
Herramientas de Ethical Hacking en Redes de Datos, Dirigido A Pymes,
https://repositorioslatinoamericanos.uchile.cl/handle/2250/2968320