 | Building Resilient Distributed Systems: Patterns and Practices for Stable Software (2026) by Newman, Sam |
 | Modern Concurrency in Java: A Deep Dive into Virtual Threads, Structured Concurrency, and Scoped Values (2025) by Rahman, A N M Bazlur |
 | Think Distributed Systems (2025) by Tornow, Dominik |
 | Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025) by Archer, Gary, Kahrer, Judith, Trojanowski, Michał |
 | OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025) by Relington, James |
 | Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Systems Using Kubernetes (2025) by Burns, Brendan |
 | Java Concurrency Patterns: Mastering Multithreading and Asynchronous Techniques (2024) by Jones, Peter |
 | Mastering Java Concurrency: Threads, Synchronization, and Parallel Processing (2024) by Jones, Peter |
 | Virtual Threads, Structured Concurrency, and Scoped Values: Explore Java’s New Threading Model (Apress Pocket Guides) (2024) by Veen, Ron, Vlijmincx, David |
 | Java Concurrency and Parallelism: Master advanced Java techniques for cloud-based applications through concurrency and parallelism (2024) by Wang, Jay |
 | Patterns of Distributed Systems (Addison-Wesley Signature Series (Fowler)) (2023) by Joshi, Unmesh |
 | Patterns of Distributed Systems (Addison-Wesley Signature Series (Fowler)) (2023) by Joshi, Unmesh |
 | Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023) by Dash, Sambit Kumar |
 | Akka in Action, Second Edition (2023) by Abraham, Francisco Lopez-Sancho |
 | Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023) by Thorgersen, Stian, Silva, Pedro Igor |
 | Akka in Action, Second Edition (2023) by Abraham, Francisco Lopez-Sancho |
 | Distributed Systems (2023) by van Steen, Maarten, Tanenbaum, Andrew S. |
 | Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022) by Wilson, Yvonne, Hingnikar, Abhishek |
 | Foundations of Scalable Systems: Designing Distributed Architectures (2022) by Gorton, Ian |
 | Understanding Distributed Systems, Second Edition: What every developer should know about large distributed applications (2022) by Vitillo, Roberto |
 | Advanced API Security: OAuth 2.0 and Beyond (2019) by Siriwardena, Prabath |
 | Reactive Streams in Java: Concurrency with RxJava, Reactor, and Akka Streams (2018) by Davis, Adam L. |
 | Scala Programming Projects: Build real world projects using popular Scala frameworks like Play, Akka, and Spark (2018) by Valot, Mikael, Jorand, Nicolas |
 | OAuth 2.0 Simplified (2018) by Parecki, Aaron |
 | Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services (2018) by Burns, Brendan |
 | Concurrent Application Development using Akka with Scala (2017) by Maltiar, Meetu, Hazrati, Vikas |
 | Akka Cookbook: Recipes for concurrent, fast, and reactive applications (2017) by Ortiz, Hector Veiga, Mishra, Piyush |
 | Akka Cookbook: Recipes for concurrent, fast, and reactive applications (2017) by Ortiz, Hector Veiga, Mishra, Piyush |
 | OAuth 2 in Action (2017) by Richer, Justin, Sanso, Antonio |
 | Distributed Systems (2017) by van Steen, Maarten, Tanenbaum, Andrew S. |
 | Applied Akka Patterns: A Hands-On Guide to Designing Distributed Applications (2017) by Nash, Michael, Waldron, Wade |
 | Mastering Akka (2016) by Baxter, Christian |
 | Akka in Action (2016) by Roestenburg, Raymond, Bakker, Rob, Williams, Rob |
 | Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka (2016) by Estrada, Raul, Ruiz, Isaac |
 | Reactive Web Applications: Covers Play, Akka, and Reactive Streams (2016) by Bernhardt, Manuel |
 | OAuth 2.0: Learn OAuth in a simple way (2016) by Warnock, Dan |
 | OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016) by Moore, Joseph |
 | Distributed Systems: Principles and Paradigms (2016) by Tanenbaum, Andrew S., van Steen, Maarten |
 | Learning Akka (2015) by Goodwin, Jason |
 | Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015) by Bihis, Charles |
 | Reactive Messaging Patterns with the Actor Model: Applications and Integration in Scala and Akka (2015) by Vernon, Vaughn |
 | OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015) by Biehl, Matthias |
 | Reactive Messaging Patterns With the Actor Model: Applications and Integration in Scala and Akka (2014) by Vernon, Vaughn |
 | OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014) by Biehl, Matthias |
 | Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014) by Siriwardena, Prabath |
 | Distributed Systems: An Algorithmic Approach, Second Edition (Chapman & Hall/CRC Computer and Information Science Series) (2014) by Ghosh, Sukumar |
 | Developing an Akka Edge (2014) by Lockney, Thomas, Tay, Raymond |
 | OAuth 2.0 Identity and Access Management Patterns (2013) by Spasovski, Martin |
 | Effective Akka: Patterns and Best Practices (2013) by Allen, Jamie |
 | Akka Concurrency (2013) by Wyatt, Derek, Kuhn, Roland, Dr. |