10 Most Popular O’Reilly Secure Programming Books

These Best Secure Programming Books are among the most popular and best-seller secure programming books of O’Reilly.

These programming books will help you if you are thinking of creating or implementing a security in programming, may it be for Web or Apps or Software, whether you are a beginner or has advance experience with this, these programming books will be a big help t anyone who wants to learn and add something to their notes.

Ready to add some more ideas and enhance your experience in secure programming?

Take some time out on what you are currently doing and read these books by O’Reilly and take advantage of what ideas and helps it can give you today and in the future. Don’t forget to take notes!

  • Security for Web Developers: Using JavaScript, HTML, and CSS [Read online]
    Security for Web Developers: Using JavaScript, HTML, and CSSThis practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. Author John Paul Mueller delivers specific advice as well as several security programming examples for developers with a good knowledge of CSS3, HTML5, and JavaScript. Create a security plan for your organization that takes the latest devices and user needs into account Develop secure interfaces, and safely incorporate third-party code from libraries, APIs, and microservices Use sandboxing techniques, in-house and third-party testing techniques, and learn to think like a hacker Implement a maintenance cycle by determining when and how to update your application software Learn techniques for efficiently tracking security threats as well as training requirements that your organization can use.

 

  • Decentralized Applications: Harnessing Bitcoin’s Blockchain Technology [Read online]
    Decentralized Applications: Harnessing Bitcoin's Blockchain TechnologyTake advantage of Bitcoin’s underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. You’ll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use. Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possible Build a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data store Learn about OpenBazaar’s decentralized market and its structure for supporting transactions Explore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogo Take an in-depth look at La’Zooz, a P2P ridesharing app that transmits data directly between riders and drivers.

 

  • iOS Application Security: The Definitive Guide for Hackers and Developers [Read online]
    iOS Application Security: The Definitive Guide for Hackers and DevelopersEliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them. Whether you’re looking to bolster your app’s defenses or hunting bugs in other people’s code, iOS Application Security will help you get the job done well.

 

  • The Internet of Risky Things: Trusting the Devices that Surround Us
    The Internet of Risky Things: Trusting the Devices that Surround UsDiscussions about the IoT generally go in one of two directions: we’re either headed for a rosy future or a dystopia. Smith, who began working in information security long before the Web, provides several examples of past forays into the future that went wrong because of simple flaws. Examine bugs that plague large-scale systems, including integer overflow, race conditions, and memory corruption Look at successful and disastrous examples of previous quantum leaps in health IT, the (already) smart grid, and autonomous vehicles Explore patterns in coding, authentication, and cryptography that led to insecurity Learn suggestions for fixing blunders that led to spectacular IT disasters.

 

  • Mobile Application Penetration Testing [Read online]
    Mobile Application Penetration TestingExplore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. What You Will Learn Gain an in-depth understanding of Android and iOS architecture and the latest changes Discover how to work with different tool suites to assess any application Develop different strategies and techniques to connect to a mobile device Create a foundation for mobile application security principles Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device Get to know secure development strategies for both iOS and Android applications Gain an understanding of threat modeling mobile applications Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner.

 

  • Coding for Penetration Testers: Building Better Tools [Read online]
    Coding for Penetration Testers: Building Better ToolsThis book provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage. Discusses the use of various scripting languages in penetration testing Presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages Provides a primer on scripting, including, but not limited to, web scripting, scanner scripting, and exploitation scripting Includes all-new coverage of Powershell.

 

  • Hacking: The Art of Exploitation: The Art of Exploitation [Read online]
    Hacking: The Art of Exploitation: The Art of ExploitationRather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective. Even if you don’t already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques.

 

  • Hacking: The Art of Exploitation, 2nd Edition [Read online]
    Hacking: The Art of Exploitation, 2nd EditionRather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective. Even if you don’t already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques.

 

  • Secure Coding: Principles and Practices
    Secure Coding: Principles and PracticesGraff and Ken vanWyk looks at the problem of bad code in a new way. Writing secure programming code isn’t easy, and there are no quick fixes to bad code. To build code that repels attack, readers need to be vigilant through each stage of the entire code life cycle: Architecture: during this stage, applying security principles such as “least privilege” will help limit even the impact of successful attempts to subvert software.

 

  • Spring Security Essentials [Read online]
    Spring Security EssentialsGet to grips with the internals of the tools and servers involved in the security layer. Work through practical projects and working programs. Compare different security servers and techniques. Use the sample projects in practical, real-time applications. Get further readings and guidance on advanced security mechanisms on secure programming. The popularity of the Spring framework is increasing and the security package of Spring addresses vast mechanisms of Security in a rich way. Spring Security Essentials focuses on the need to master the security layer, which is an area not often explored by a Spring developer.

You may also like...