Security Cryptography
The JCE
Keys and Key Management
Common Java vulnerabilities
Networking Concerns
Randomness and You
Hashing and Validation