DDF :: Security :: Handler :: OAUTH
Cloud Native Data Security with OAuth: A Scalable Zero Trust ArchitectureCloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025)
by Archer, Gary, Kahrer, Judith, Trojanowski, Michał
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022)
by Wilson, Yvonne, Hingnikar, Abhishek
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and MoreThe Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More (2022)
by Tijms, Arjan, Bais, Teo, Keil, Werner
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) (2024)
by Chawdhury, Tarun Kumar, Banerjee, Joyanta, Gupta, Vipul, Poddar, Debopam
Designing Dynamic Java Applications With OsgiDesigning Dynamic Java Applications With Osgi
by Abu-eid, Valery
Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition)Penetration Testing with Java: A step-by-step pen testing handbook for Java applications (English Edition) (2025)
by Snoke, Nancy
Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition)Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023)
by Dash, Sambit Kumar
Advanced API Security: OAuth 2.0 and BeyondAdvanced API Security: OAuth 2.0 and Beyond (2019)
by Siriwardena, Prabath
Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applicationsKeycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023)
by Stian Thorgersen, Pedro Igor Silva
OAuth 2 in ActionOAuth 2 in Action (2017)
by Richer, Justin
Sandboxing remote code execution in the distributed system RCE: Sandbox based on Java and OSGiSandboxing remote code execution in the distributed system RCE: Sandbox based on Java and OSGi (2017)
by Stammerjohann, Marc Julian
OAuth 2.0 ServersOAuth 2.0 Servers (2015)
by Parecki, Aaron
OAuth 2.0: All you need to know (Identity in Cybersecurity)OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025)
by Relington, James
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014)
by Siriwardena, Prabath
OAuth 2.0: Getting Started in Web-API Security (API University Series)OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015)
by Biehl, Matthias
Building Modular Cloud Apps with OSGi: Practical Modularity with Java in the Cloud AgeBuilding Modular Cloud Apps with OSGi: Practical Modularity with Java in the Cloud Age (2013)
by Bakker, Paul
Enterprise OSGi in Action: With examples using Apache AriesEnterprise OSGi in Action: With examples using Apache Aries (2013)
by Holly Cummins, Timothy Ward
Enterprise OSGi In Action: With examples using Apache AriesEnterprise OSGi In Action: With examples using Apache Aries (2013)
by Cummins, Holly, Ward, Timothy
OAuth 2.0 SimplifiedOAuth 2.0 Simplified (2018)
by Parecki, Aaron
OAuth 2.0: Getting Started in API Security (API-University Series Book 1)OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014)
by Biehl, Matthias
Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkMastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015)
by Bihis, Charles
Java Security (2nd Edition)Java Security (2nd Edition) (2001)
by Oaks, Scott
Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and AuthenticationGetting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012)
by Boyd, Ryan
OSGi in Action: Creating Modular Applications in JavaOSGi in Action: Creating Modular Applications in Java (2011)
by Hall, Richard S., Pauls, Karl, McCulloch, Stuart, Savage, David
OSGi in DepthOSGi in Depth (2011)
by de Castro Alves, Alexandre
Building Modular Cloud Apps with OSGi: Practical Modularity with Java in the Cloud AgeBuilding Modular Cloud Apps with OSGi: Practical Modularity with Java in the Cloud Age (2013)
by Bakker, Paul, Ertman, Bert
Modular Java: Creating Flexible Applications With OSGi and SpringModular Java: Creating Flexible Applications With OSGi and Spring (2008)
by Walls, Craig
Pro Spring Dynamic Modules for OSGi Service Platforms (Expert's Voice in Open Source)Pro Spring Dynamic Modules for OSGi Service Platforms (Expert's Voice in Open Source) (2009)
by Rubio, Daniel
OSGi and Equinox: Creating Highly Modular Java SystemsOSGi and Equinox: Creating Highly Modular Java Systems (2010)
by Mcaffer, Jeff, Vanderlei, Paul, Archer, Simon
OAuth 2.0: Learn OAuth in a simple wayOAuth 2.0: Learn OAuth in a simple way (2016)
by Warnock, Dan
OAuth 2.0: Introduction to API Security with OAuth 2.0OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016)
by Moore, Joseph
Java Application Architecture: Modularity Patterns with Examples Using OSGi (Robert C. Martin Series)Java Application Architecture: Modularity Patterns with Examples Using OSGi (Robert C. Martin Series) (2012)
by Knoernschild, Kirk
OAuth 2.0 Identity and Access Management PatternsOAuth 2.0 Identity and Access Management Patterns (2013)
by Spasovski, Martin
Instant OSGi StarterInstant OSGi Starter (2013)
by Goodyear, Jamie
A Usable Semantic OSGi Architecture within the Smart Home Environment: Design, Implementation and ValidationA Usable Semantic OSGi Architecture within the Smart Home Environment: Design, Implementation and Validation (2010)
by Cabezas, Pablo, Legarda, Jon, María Sarriegi, José
Java Application Architecture: Modularity Patterns with Examples Using OSGi (Robert C. Martin Series)Java Application Architecture: Modularity Patterns with Examples Using OSGi (Robert C. Martin Series) (2012)
by Knoernschild, Kirk
OSGi Service Platform, Release 2OSGi Service Platform, Release 2 (2006)
by Osgi
OSGi Service Platform Enterprise Specification: Release 4, Version 4.2OSGi Service Platform Enterprise Specification: Release 4, Version 4.2 (2010)
by Alliance, OSGi
OSGi Service Platform, Release 3OSGi Service Platform, Release 3 (2006)
by Osgi Alliance
Getting Started With the Feature Pack for Osgi Applications and Jpa 2.0Getting Started With the Feature Pack for Osgi Applications and Jpa 2.0 (2009)
by IBM Redbooks
OSGi Service Platform Service Compendium: Release 4, Version 4.2OSGi Service Platform Service Compendium: Release 4, Version 4.2 (2009)
by Alliance, OSGi
OSGi: Conception d'applications modulaires en Java.OSGi: Conception d'applications modulaires en Java. (2012)
by Molière, Jérôme
OSGi Service Platform: Core SpecificationOSGi Service Platform: Core Specification (2009)
by Alliance, OSGi
OSGi and Apache Felix 3.0 Beginner's GuideOSGi and Apache Felix 3.0 Beginner's Guide (2010)
by Joseph Gedeon, Walid