 | Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025) by Archer, Gary, Kahrer, Judith, Trojanowski, Michał |
 | OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025) by Relington, James |
 | Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023) by Dash, Sambit Kumar |
 | Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023) by Thorgersen, Stian, Silva, Pedro Igor |
 | Java Persistence with Spring Data and Hibernate (2023) by Tudose, Catalin |
 | Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022) by Wilson, Yvonne, Hingnikar, Abhishek |
 | Mastering Java Persistence API (JPA): Realize Java's Capabilities Spanning RDBMS, ORM, JDBC, Caching, Locking, Transaction Management, and JPQL (English Edition) (2022) by Kurur, Nisha Parameswaran |
 | Advanced API Security: OAuth 2.0 and Beyond (2019) by Siriwardena, Prabath |
 | Understanding JPA 2.2: Java Persistence API (agoncal fascicles) (2019) by Goncalves, Antonio |
 | OAuth 2.0 Simplified (2018) by Parecki, Aaron |
 | Pro JPA 2 in Java EE 8: An In-Depth Guide to Java Persistence APIs (2018) by Keith, Mike, Schincariol, Merrick, Nardone, Massimo |
 | Java EE 8 Application Development: Develop Enterprise applications using the latest versions of CDI, JAX-RS, JSON-B, JPA, Security, and more (2017) by Heffelfinger, David R. |
 | OAuth 2 in Action (2017) by Richer, Justin, Sanso, Antonio |
 | OAuth 2.0: Learn OAuth in a simple way (2016) by Warnock, Dan |
 | OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016) by Moore, Joseph |
 | Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015) by Bihis, Charles |
 | OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015) by Biehl, Matthias |
 | OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014) by Biehl, Matthias |
 | Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014) by Siriwardena, Prabath |
 | OAuth 2.0 Identity and Access Management Patterns (2013) by Spasovski, Martin |
 | Java Persistence with Jpa 2.1 (2013) by DaoqiYang |
 | Comparison of JPA providers and issues with migration (2013) by Kumar, Mr. Anil, Singh, Mr. Ran Vijay, Kumar, Mr. Anil |
 | Pro JPA 2 (2012) by Mike Keith, Merrick Schincariol |
 | Just Spring Data Access: Covers JDBC, Hibernate, JPA and JDO (2012) by Konda, Madhusudhan, Turnquist, Greg L. |
 | Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012) by Boyd, Ryan |
 | Java Persistence with Jpa (2010) by Daoqi Yang |
 | Java EE Project using EJB 3, JPA and Struts 2 for Beginners, (Book/CD-Rom) (2009) by Sharanam Shah, Vaishali Shah |
 | Getting Started With the Feature Pack for Osgi Applications and Jpa 2.0 (2009) by IBM Redbooks |
 | Pro JPA 2: Mastering the Java™ Persistence API (Expert's Voice in Java Technology) (2009) by Keith, Mike, Schincariol, Merrick |
 | Hibernate Made Easy: Simplified Data Persistence With Hibernate and Jpa Java Persistence Api Annotations (2008) by Mckenzie, Cameron Wallace, Sheehan, Kerri |
 | OAuth 2.0 Servers by Parecki, Aaron |