Java Restify OAuth2 Access Token Cache JCache
Cloud Native Data Security with OAuth: A Scalable Zero Trust ArchitectureCloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025)
by Archer, Gary, Kahrer, Judith, Trojanowski, Michał
Latency: Reduce delay in software systemsLatency: Reduce delay in software systems (2025)
by Enberg, Pekka
Optimizing Cloud Native Java: Practical Techniques for Improving JVM Application PerformanceOptimizing Cloud Native Java: Practical Techniques for Improving JVM Application Performance (2024)
by Evans, Benjamin J., Gough, James
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022)
by Wilson, Yvonne, Hingnikar, Abhishek
Java Performance: In-Depth Advice for Tuning and Programming Java 8, 11, and BeyondJava Performance: In-Depth Advice for Tuning and Programming Java 8, 11, and Beyond (2020)
by Oaks, Scott
Performance Engineering Best Practices: Building high performance cloud IT platforms using Java (English Edition)Performance Engineering Best Practices: Building high performance cloud IT platforms using Java (English Edition) (2025)
by V. Jones, Nolan
JVM Performance Engineering: Inside OpenJDK and the HotSpot Java Virtual Machine (Developer's Library)JVM Performance Engineering: Inside OpenJDK and the HotSpot Java Virtual Machine (Developer's Library) (2024)
by Beckwith, Monica
Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition)Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023)
by Dash, Sambit Kumar
Advanced API Security: OAuth 2.0 and BeyondAdvanced API Security: OAuth 2.0 and Beyond (2019)
by Siriwardena, Prabath
Optimizing Java: Practical Techniques for Improving JVM Application PerformanceOptimizing Java: Practical Techniques for Improving JVM Application Performance (2018)
by Evans, Benjamin J., Gough, James, Newland, Chris
Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applicationsKeycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023)
by Stian Thorgersen, Pedro Igor Silva
OAuth 2 in ActionOAuth 2 in Action (2017)
by Richer, Justin
Troubleshooting Java Performance: Detecting Anti-Patterns with Open Source ToolsTroubleshooting Java Performance: Detecting Anti-Patterns with Open Source Tools (2017)
by Ostermueller, Erik
Java Performance CompanionJava Performance Companion (2016)
by Hunt, Charlie, Parhar, Poonam, Rutisson, Bengt, Beckwith, Monica
OAuth 2.0 ServersOAuth 2.0 Servers (2015)
by Parecki, Aaron
High-Performance Java PersistenceHigh-Performance Java Persistence (2016)
by Mihalcea, Vlad
Java Performance: The Definitive Guide: Getting the Most Out of Your CodeJava Performance: The Definitive Guide: Getting the Most Out of Your Code (2014)
by Oaks, Scott
OAuth 2.0: All you need to know (Identity in Cybersecurity)OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025)
by Relington, James
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014)
by Siriwardena, Prabath
OAuth 2.0: Getting Started in Web-API Security (API University Series)OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015)
by Biehl, Matthias
OAuth 2.0 SimplifiedOAuth 2.0 Simplified (2018)
by Parecki, Aaron
OAuth 2.0: Getting Started in API Security (API-University Series Book 1)OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014)
by Biehl, Matthias
Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkMastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015)
by Bihis, Charles
Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and AuthenticationGetting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012)
by Boyd, Ryan
OAuth 2.0: Learn OAuth in a simple wayOAuth 2.0: Learn OAuth in a simple way (2016)
by Warnock, Dan
OAuth 2.0: Introduction to API Security with OAuth 2.0OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016)
by Moore, Joseph
OAuth 2.0 Identity and Access Management PatternsOAuth 2.0 Identity and Access Management Patterns (2013)
by Spasovski, Martin