Author

Joshua Long

📖 Overview

Joshua Long is a cybersecurity researcher, author, and public speaker specializing in Java security and application security. He serves as the Chief Scientist at Contrast Security and has made significant contributions to multiple open-source security projects. Long is known for his work with the OWASP Foundation, where he has contributed to security standards and best practices. His technical writing focuses on secure coding practices, vulnerability detection, and enterprise Java security patterns. His book "Securing Cloud Services" addresses practical approaches to cloud security and has been used as a reference by security professionals. Long regularly presents at major security conferences including RSA Conference, Black Hat, and OWASP AppSec. Long's research has helped identify critical vulnerabilities in widely-used Java frameworks and libraries. He maintains an active role in the security community through his ongoing work on various security tools and his contributions to security education initiatives.

👀 Reviews

Technical professionals praise Long's clear explanations of complex security concepts in his writing and conference talks. His book "Securing Cloud Services" receives positive reviews from security practitioners who cite its practical examples and implementation details. What readers liked: - Clear breakdowns of security vulnerabilities and mitigation strategies - Code examples that demonstrate real-world scenarios - Balance of technical depth and practical application What readers disliked: - Some material becomes dated quickly due to rapid changes in cloud security - Limited coverage of newer cloud platforms beyond AWS - Advanced topics may be challenging for beginners Ratings: - Amazon: 4.3/5 from 47 reviews - Goodreads: 4.1/5 from 82 ratings Reader feedback highlights Long's expertise: "Finally found a cloud security book that gets into the technical details without getting lost in theory" writes one Amazon reviewer. Another notes: "The vulnerability detection patterns have helped our team improve our security testing approach."

📚 Books by Joshua Long

Weird City A critical examination of Austin, Texas' culture and development, analyzing the city's rapid growth, creative scenes, and evolving identity through an urban studies lens.

Securing Cloud Services A technical guide covering practical security approaches, risk assessment, and implementation strategies for protecting cloud-based infrastructure and applications.

👥 Similar authors

Jim Manico Java security expert and OWASP leader who writes extensively about secure coding practices in Java applications. His technical focus aligns closely with enterprise security architecture and defensive programming techniques.

Dafydd Stuttard Co-author of The Web Application Hacker's Handbook who specializes in web application security testing and methodology. His work covers the technical aspects of security vulnerabilities and exploitation techniques that security professionals encounter.

Marcus Pinto Security researcher focusing on web application security testing and secure development practices. His writing examines practical approaches to identifying and remediating security flaws in enterprise applications.

Gary McGraw Pioneer in software security who writes about secure software development and architecture. His work emphasizes building security into applications from the ground up through systematic approaches and best practices.

Michael Howard Security architect who writes about secure coding practices and software security development lifecycle. His publications focus on practical implementation of security controls and threat modeling in software development.