 | Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025) by Archer, Gary, Kahrer, Judith, Trojanowski, Michał |
 | OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025) by Relington, James |
 | Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025) by Snoke, Nancy |
 | Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024) by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam |
 | Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023) by Dash, Sambit Kumar |
 | Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023) by Thorgersen, Stian, Silva, Pedro Igor |
 | Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022) by Wilson, Yvonne, Hingnikar, Abhishek |
 | Code: The Hidden Language of Computer Hardware and Software (2022) by Petzold, Charles |
 | The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022) by Tijms, Arjan, Bais, Teo, Keil, Werner |
 | Fundamentals of Software Architecture: An Engineering Approach (2020) by Richards, Mark, Ford, Neal |
 | Advanced API Security: OAuth 2.0 and Beyond (2019) by Siriwardena, Prabath |
 | The Pragmatic Programmer: Your Journey To Mastery, 20th Anniversary Edition (2nd Edition) (2019) by Thomas, David, Hunt, Andrew |
 | OAuth 2.0 Simplified (2018) by Parecki, Aaron |
 | OAuth 2 in Action (2017) by Richer, Justin, Sanso, Antonio |
 | OAuth 2.0: Learn OAuth in a simple way (2016) by Warnock, Dan |
 | OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016) by Moore, Joseph |
 | Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015) by Bihis, Charles |
 | OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015) by Biehl, Matthias |
 | OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014) by Biehl, Matthias |
 | Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014) by Siriwardena, Prabath |
 | OAuth 2.0 Identity and Access Management Patterns (2013) by Spasovski, Martin |
 | Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012) by Boyd, Ryan |
 | Clean Code: A Handbook of Agile Software Craftsmanship (2008) by Robert C. Martin |
 | Java Security (2nd Edition) (2001) by Oaks, Scott |
 | OAuth 2.0 Servers by Parecki, Aaron |