9 Best Books on Secured Programming

We have compiled a list of the Best Reference Books on Secured Programming, which are used by students of top universities, and colleges. This will help you choose the right book depending on if you are a beginner or an expert. Here is the complete list of Secured Programming Books with their authors, publishers, and an unbiased review of them as well as links to the Amazon website to directly purchase them. If permissible, you can also download the free PDF books on Secured Programming below.

 
1."Advanced Penetration Testing for Highly-Secured Environments" by Lee Allen and Kevin Cardwell
“Advanced Penetration Testing for Highly-Secured Environments” Book Review: The book explains how to perform penetration testing from the beginning to end by providing clear examples of each step. It explains how to define the scope of the test and plan it properly. The book also teaches how to understand the network and its components and create a complex structure with various security measures in place to test thoroughly. It includes ways to customize your own scripts and use them to exploit 32-bit and 64-bit programs.

Buy-this-Book (India) Buy-this-book (US)
 
2."Image and Video Encryption: From Digital Rights Management to Secured Personal Communication (Advances in Information Security)" by Andreas Uhl and Andreas Pommer
“Image and Video Encryption: From Digital Rights Management to Secured Personal Communication (Advances in Information Security)” Book Review: The book covers techniques for encryption of images and video data. It lists commercial applications like DVD or DVB to more research oriented topics and recently published material. It introduces different techniques and evaluates these techniques with respect to their respective properties.

Buy-this-Book (India) Buy-this-book (US)
 
3."Iris Biometric Model for Secured Network Access" by Franjieh El Khoury
“Iris Biometric Model for Secured Network Access” Book Review: The book talks about finding the edges of the iris of the eye using different methods. It tests and compares the effectiveness of five methods for finding both the external and internal edges of the iris and removing the impact of eyelids. It also explains how biometric systems, cryptography, and multi-agent systems (MAS) can help solve security issues in complex systems. The book focuses on how these systems can be applied to iris recognition for secure network access.

Buy-this-Book (India) Buy-this-book (US)
 
4."Secured Computing: A SSCP Study Guide" by Carl F Endorf
“Secured Computing: A SSCP Study Guide” Book Review: The book teaches about security concepts that are widely used by ISC2 and security professionals today. It explains how to keep an organization and enterprise secure. The book is intended for security professionals and includes test and quiz questions to help readers learn and prepare for the certification exam.

Buy-this-Book (India) Buy-this-book (US)
 
5."Secured Single Signon in a Client/Server Environment" by IBM Redbooks
“Secured Single Signon in a Client/Server Environment” Book Review: The book explains how to create a secure single signon process for a client/server setup. It describes the design principles of the RACF secured signon facility and a user verification and authentication method that’s installed on a smart card. It’s written for system programmers, security administrators, network administrators, and workstation and client/server application programmers. The book teaches how to develop and implement a secure single signon process in a client/server environment.

Buy-this-Book (India) Buy-this-book (US)
 
6."Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems" by Benoit Badrignans and Jean Luc Danger
“Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems” Book Review: The book analyzes the current threats to embedded systems, particularly FPGAs, and discusses the requirements of the FIPS standard for building secure systems. It identifies vulnerabilities in FPGAs at all levels of the security pyramid and offers solutions for security trends in FPGAs at the logical, architectural, and system levels for a comprehensive solution. The book is helpful for those interested in securing FPGAs and embedded systems.

advertisement
advertisement
Buy-this-Book (India) Buy-this-book (US)
 
7."The Secured Enterprise: Protecting Your Information Assets (The Essential Guide)" by Paul E Proctor and F Christian Byrnes
“The Secured Enterprise: Protecting Your Information Assets (The Essential Guide)” Book Review: The book describes practical measures that businesses can take to safeguard their operations. It outlines non-technical approaches, procedures, decisions, and actions that businesses can implement to shield themselves against unauthorized security breaches.

Buy-this-Book (India)
 
8."Secure your mobile data. Example: Secured android messaging" by Leo Egerev
“Secure your mobile data. Example: Secured android messaging” Book Review: This book offers code examples for developing secure messaging on Android using encoding and decoding mechanisms. It explains how different functions work together to perform encoding based on a password and verify the password in an encoded text. The book is intended for those interested in learning about encoding and decoding mechanisms, and demonstrates the capability of a unique script to encode an English text with a password and decode it with the original password.

Buy-this-Book (India) Buy-this-book (US)
 
9."Discrete Dynamical Systems and Chaotic Machines: Theory and Applications" by Jacques M Bahi and Christophe Guyeux
“Discrete Dynamical Systems and Chaotic Machines: Theory and Applications” Book Review: The book explains how to create finite machines such as computers, neural networks, and wireless sensor networks. It also discusses the behavior of discrete dynamical systems and their application in computer science. Additionally, it covers the interaction of machines in the real world.

Buy-this-Book (India) Buy-this-book (US)
We have put a lot of effort into researching the best books on Secured Programming and came out with a recommended list and their reviews. If any more book needs to be added to this list, please email us. We are working on free pdf downloads for books on Secured Programming and will publish the download link here. Fill out this Secured Programming books pdf download" request form for download notification.

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.