Safari Book Accesses:

·         Software Security: Building Security In (by Gary McGraw)

·         The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities (by Mark Dowd, John McDonald, Justin Schuh)

·         Secure Programming Cookbook

·         Java Cryptography

·         PhP Security

·         Building Secure Microsoft ASP.NET Applications: Authentication, Authorization, and Secure Communication

·         Buffer Overflow Attacks: Detect, Exploit, Prevent (by James C. Foster)

·         Introduction to Computer Security (by Matt Bishop)

·         The Modelling and Analysis of Security Protocols: the CSP Approach (by P. Y.A. Ryan, S. A. Schneider)

·         Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition (by Li Gong, Gary Ellison, Mary Dageforde)

·         Security and Usability (by Lorrie Cranor, et. al)

·         Securing Web Services with WS-Security (by Jothy Rosenberg, David L. Remy)

·         Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0: Patterns & Practices (by Jason Hogg et. al )

·         J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice (by Pankaj Kumar)

·         The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (by Michael Howard, Steve Lipner)