Safari Book Accesses:
Software Security: Building Security In (by Gary McGraw)
The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities (by Mark Dowd, John McDonald, Justin Schuh)
Buffer Overflow Attacks: Detect, Exploit, Prevent (by James C. Foster)
Introduction to Computer Security (by Matt Bishop)
The Modelling and Analysis of Security Protocols: the CSP Approach (by P. Y.A. Ryan, S. A. Schneider)
Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition (by Li Gong, Gary Ellison, Mary Dageforde)
Security and Usability (by Lorrie Cranor, et. al)
Securing Web Services with WS-Security (by Jothy Rosenberg, David L. Remy)
Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0: Patterns & Practices (by Jason Hogg et. al )
J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice (by Pankaj Kumar)
The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (by Michael Howard, Steve Lipner)