Safari Book Accesses:
· Software Security: Building Security In (by Gary McGraw)
· The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities (by Mark Dowd, John McDonald, Justin Schuh)
· Buffer Overflow Attacks: Detect, Exploit, Prevent (by James C. Foster)
· Introduction to Computer Security (by Matt Bishop)
· The Modelling and Analysis of Security Protocols: the CSP Approach (by P. Y.A. Ryan, S. A. Schneider)
· Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation, Second Edition (by Li Gong, Gary Ellison, Mary Dageforde)
· Security and Usability (by Lorrie Cranor, et. al)
· Securing Web Services with WS-Security (by Jothy Rosenberg, David L. Remy)
· Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0: Patterns & Practices (by Jason Hogg et. al )
· J2EE™ Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice (by Pankaj Kumar)
· The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (by Michael Howard, Steve Lipner)