 | Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025) by Archer, Gary, Kahrer, Judith, Trojanowski, Michał |
 | Latency: Reduce delay in software systems (2025) by Enberg, Pekka |
 | Optimizing Cloud Native Java: Practical Techniques for Improving JVM Application Performance (2024) by Evans, Benjamin J., Gough, James |
 | Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022) by Wilson, Yvonne, Hingnikar, Abhishek |
|
 | Java Performance: In-Depth Advice for Tuning and Programming Java 8, 11, and Beyond (2020) by Oaks, Scott |
 | Performance Engineering Best Practices: Building high performance cloud IT platforms using Java (English Edition) (2025) by V. Jones, Nolan |
 | JVM Performance Engineering: Inside OpenJDK and the HotSpot Java Virtual Machine (Developer's Library) (2024) by Beckwith, Monica |
 | Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023) by Dash, Sambit Kumar |
 | Advanced API Security: OAuth 2.0 and Beyond (2019) by Siriwardena, Prabath |
 | Optimizing Java: Practical Techniques for Improving JVM Application Performance (2018) by Evans, Benjamin J., Gough, James, Newland, Chris |
 | Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023) by Stian Thorgersen, Pedro Igor Silva |
 | OAuth 2 in Action (2017) by Richer, Justin |
 | Troubleshooting Java Performance: Detecting Anti-Patterns with Open Source Tools (2017) by Ostermueller, Erik |
 | Java Performance Companion (2016) by Hunt, Charlie, Parhar, Poonam, Rutisson, Bengt, Beckwith, Monica |
 | OAuth 2.0 Servers (2015) by Parecki, Aaron |
 | High-Performance Java Persistence (2016) by Mihalcea, Vlad |
 | Java Performance: The Definitive Guide: Getting the Most Out of Your Code (2014) by Oaks, Scott |
 | OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025) by Relington, James |
 | Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014) by Siriwardena, Prabath |
 | OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015) by Biehl, Matthias |
 | OAuth 2.0 Simplified (2018) by Parecki, Aaron |
 | OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014) by Biehl, Matthias |
 | Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015) by Bihis, Charles |
 | Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012) by Boyd, Ryan |
 | OAuth 2.0: Learn OAuth in a simple way (2016) by Warnock, Dan |
 | OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016) by Moore, Joseph |
 | OAuth 2.0 Identity and Access Management Patterns (2013) by Spasovski, Martin |