| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b460bb65d7439683-496bfdaf-408d4516-ab419c29-d31dbf000049598bfc23942a"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 1996\] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f259b0e7ed38cec5-06a893bb-4254408e-9f818b8c-15f9e4b3c02587861b22235d"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba02a08fcad44aac-476dd42c-4c794b8d-b16e897e-2e8c6a6613d120ddb65ace37"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro> \[API 2011\] [Java Platform, Standard Edition 7 API Specification|http://download.oracle.com/javase/7/docs/api/index.html], Oracle, Inc. (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4b8621e00a7ca03-35ec864b-4166404a-85be8a00-7650bfb1f2052922638f7ae8"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 2000\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c123becb6091a390-931efab5-467247ed-b5f58592-42d29c46e2508d59b1559180"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro> \[Black 2004\] Paul E. Black and Paul J. Tanenbaum, "partial order", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 17 December 2004. (accessed TODAY) Available from: [http://www.itl.nist.gov/div897/sqg/dads/HTML/partialorder.html] |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e932ca65fff9606-f6675e19-4679414e-ab7496cf-299f2d6c85c4dfa7085bbd40"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro> \[Black 2006\] Paul E. Black and Paul J. Tanenbaum, "total order", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 30 March 2006. (accessed TODAY) Available from: [http://www.itl.nist.gov/div897/sqg/dads/HTML/totalorder.html] |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f985e4547e40eb3-bfc23267-414b4cf7-83dc9883-d9c6eeac54728f2aad44880f"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 2001\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c6ea27daa1285d06-1785fc85-4fbd4fa6-9c15a698-8cb7bb15bf686fedc7b032e4"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 2005\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="576da8c943e04de1-b03251d9-4dd34958-97fab04e-98087e7287eb98504bf791ec"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro> \[Bloch 2005b\] [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/], by Joshua Bloch and Neal Gafter. JavaOne Conference. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="540734924892e5b6-b4c93333-44c1457d-b459b2d9-4779b5be77ba39141e5f40c3"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro> \[Bloch 2007\] [Effective Javaâ„¢ Reloaded: This Time It's (not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf], by Joshua Bloch. JavaOne Conference. (2007) <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c6d105d49a56a71-0e5dfc05-480b4e30-940894a5-6dc81b92d83825a0a4124669"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67b51dac2467cb81-32acc410-41de47d5-95bd8c3e-4034e5652fb8f92b724274a6"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 2008\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
...
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce86af5cf88835c7-5be5460e-47254e84-808ea9ed-9c7c99ec5be5300935b7e5c5"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro> \[Boehm 2005\] Finalization, Threads, and the Javaâ„¢ Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61c4959f22ead980-c5a9169e-487840d8-a1908877-6f6e96dfe4309da2605ef81e"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 1996\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95e85fd9acffb08d-51904db6-404c49c8-a5a98308-bc2ddc05d5e03e23cf5447e0"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro> \[CCITT 1988\] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="435d20e5c1db0d6c-9d983666-41e547bf-ae4b98d9-4d64be7c44d05db7e85ab45a"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 1999\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15320352e555c771-2032d994-4eb64b97-b1e49676-fe2ed0a58d800bb5b41d2002"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro> \[Chess 2007\] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87c8182edbddf2e8-fb327b83-46d34ea0-982fa46b-e4cebb1c307b1bf472dd588d"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 2005\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="897d033c5fbb5d28-22746754-470842a6-b6d6a129-cc2d02a288b7f46c9410536c"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro> \[Cohen 1981\] [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], IEEE Computer, vol. 14 issue 10 (1981) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3052792f8eedeba-339b4df7-49b34427-95078dac-50758ec87e207d63a528476f"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro> \[Conventions 2009\] [Code Conventions for the Java Programming Language|http://java.sun.com/docs/codeconv/]. Sun Microsystems, Inc. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3b0ffd5b9bf74ea-7f81e27e-4c4f449e-9069b6cb-1720a43c64b492913dfbbd15"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro> \[CVE 2008\] Common Vulnerability Exposure, MITRE Corporation. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1682c3d7bc5af08-ac232e9f-4d994216-8710acf6-41ca4f7ce601a43d7b73247e"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro> \[Coomes 2007\] [Garbage Collection-Friendly Programming|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2906.pdf] by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="771343ed0ceb32d4-143dec8a-41c04526-800781e2-21761f81e65976288077d880"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 2004\] Core Javaâ„¢ 2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f73371105615230-ee5a7e4b-4e87414c-ad6795b7-304a8bab04c859eacbc14809"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro> \[Cunningham 1995\] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87d5f5efcd2f1148-e23096a5-4b764bb0-84178498-46ca08f453491811aedf85ff"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 2000\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9adf08c451825404-86bef591-43f84475-ace1a1b9-5c1951f3f6c75c7cf60e9aa9"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 2003\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fbc81db239cd94c-6debb4b2-4d8f4c3e-a2ec8dc1-2211a4962c010cf051d6a46a"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 2004\] Java Cookbook, by Ian F. Darwin (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5749e81d136094d6-b89db8b2-4fb54891-9f0f8f8b-b39338d15bd9d30757817eff"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro> \[Davis 2008\] [Unicode Standard Annex #15, Unicode Normalization Forms|http://unicode.org/reports/tr15/], by Mark Davis and Martin Dürst. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18d0235e984bba52-954c6ae5-4f254972-890d86d1-a000e26a9e85b9a88ab7a1b2"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro> \[Davis 2008b\] [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/], by Mark Davis and Michel Suignard. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06d687ea909c6f0b-bc126ece-428b41ab-a346993f-eb6409020e163acdcae3788c"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro> \[Dennis 1966\] Jack B. Dennis and Earl C. Van Horn. 1966. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (March 1966), 143-155. DOI=10.1145/365230.365252 http://doi.acm.org/10.1145/365230.365252 |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57b699a96f1d3b3f-9ad20884-47b9403d-90c89664-d146847ddace0732d43461b2"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro> \[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/]. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc7866f36086b9ec-e821d38c-44a4418f-83b0aa57-f2e80095680732210ba2ee34"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro> \[Dormann 2008\] [Signed Java Applet Security: Worse than ActiveX?|http://www.cert.org/blogs/vuls/2008/06/signed_java_security_worse_tha.html], by Will Dormann. CERT Vulnerability Analysis Blog. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ecfec4e4e6d0aa5-75f1d2e6-41194a2c-830eaa2b-d1fef0cfb37b9257b059110d"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 2003\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b0acad40824ed29-f9232ef2-42754cd0-84889b26-2a8e0b858d3b6686a628d077"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro> \[Dougherty 2009\] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, Kazuya Togashi. [Secure Design Patterns|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]. CMU/SEI-2009-TR-010. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57616a81d88eddad-315b14ca-4f584bef-911bbde2-23e3886f2391a29d500d19e0"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro> \[Eclipse 2008\] The Eclipse Platform (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4fa3c97edc033abc-778507af-4dd94fe2-816b9f1e-b51eecf2e3f7da2f3bb53572"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro> \[Encodings 2006\] [Supported Encodings|http://java.sun.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9db624939987191d-f56ac828-4f7442e0-9a33a8e9-c3c6e89f6e0da6ff3763ffe1"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 2003\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e21cfc56ff6f3763-54c355cc-471142b0-9767ad0f-ffa74b23050e079cbe3c68e6"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro> \[ESA 2005\] [Java Coding Standards|ftp://ftp.estec.esa.nl/pub/wm/wme/bssc/Java-Coding-Standards-20050303-releaseA.pdf], prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a36a1dc25c72689-4e9c9a04-46274888-a941b5c1-261cf6c8071913759f612bb1"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro> \[Fairbanks 2007\] [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3962994a6bc6b74d-e1605d6f-4332469c-b201af5a-0d621ed5cf5e9d8b7e324463"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d903fd20b4f8f890-7d58c333-4c34474d-965aa219-dcfc433087714ae71690843c"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 2003\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="508382f06eb947ed-7cbdf65f-40db41d4-bc3f99a9-990c82d25ab387c6c89858e4"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 2005\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46bbae75cdd95046-23d29c0b-45e34ca5-96eeb0b2-d658aa7637fb28ade3d6bf86"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro> \[Fortify 2008\] [A Taxonomy of Coding Errors that Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] Java/JSP, Fortify Software. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fbb0b23c3c7ddb8-4645f522-43d24a10-96e191ba-39f04f71416c0a515d0d7638"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 2001\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f0ab00a9861dba6-04cbbc3f-46c146e1-a29784fa-54ed155886200488ed9d3800"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro> \[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f798f264f12919db-56416adc-420847bc-840c868b-29e05d3921f583324231092a"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro> \[Gafter 2006\] [Neal Gafter's blog|http://gafter.blogspot.com/], by Neal Gafter's. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c3feda99fad3269-f5b4f648-4bd04f96-ab9a9ce4-03fac1dbe6c6ee42af2a15e1"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro> \[Gamma 1995\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75c9ee1d1763b148-61837da5-428b4e93-ad24aaf1-df6a38e6176e5bddb3af8d6e"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 2001\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2429fbcd6f8dd3b2-0bc388cb-41dc446a-b47e99d4-6de693454472fb18f8c8c8a0"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro> \[Goetz 2002\] [Java theory and practice: Don't let the "this" reference escape during construction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67c2fb9f505eda16-3535637d-469c47b8-be87ba33-c28e0b52067229be8fbeca14"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro> \[Goetz 2004\] [Java theory and practice: Garbage collection and performance|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12b52311797efa1f-37863324-4ed24ace-96d0888d-914aaf421d819f540a7a5e8b"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro> \[Goetz 2004b\] [Java theory and practice: The exceptions debate: To check, or not to check?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="380bdb785e7d1984-16873555-40ee48dc-a3c5a096-d62f0791b726006dc4c097f7"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro> \[Goetz 2004c\] [Java theory and practice: Going atomic|http://www.ibm.com/developerworks/java/library/j-jtp11234/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b135c07d7fb1a38-bc1d457c-4d964cd4-b6bb8b25-fc97cf6849ac5b871a891a3d"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro> \[Goetz 2005\] [Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43b3a933da527ff1-17746eb2-42724dee-96269bae-ed22796b13050686a1c135bf"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro> \[Goetz 2005b\] [Java theory and practice: Plugging memory leaks with weak references|http://www.ibm.com/developerworks/java/library/j-jtp11225/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b81503955d23a85-9cdc289b-446d487b-979b9ce6-6f1fb5081e75e140979e5f40"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 2006\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b3aa3e2823e1e44-9cd52d09-410a42a0-a0c9a101-e5b59608333efdf18df9e869"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro> \[Goetz 2006b\] [Java theory and practice: Good housekeeping practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bcb10b2700dd1fc-0668254b-40324047-85769c8a-2d4aa7d48ac7c458bd6395fe"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro> \[Goetz 2007\] [Java theory and practice: Managing volatility, Guidelines for using volatile variables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html], by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology). (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61bff0327889ba0c-a46835b5-40d7499c-a129b5d9-d3c27036ee6cd83355c5d162"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, Inc. March 1991. (1991) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f98231be84eb68a9-4b0d66c7-4baf49cd-9ba49fc4-4e06bc887b721ccbba1a8870"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 2003\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d879ece75742ab3-2051f0de-427c4cce-99d6a3bb-81381221ba53c63446b5e4dd"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro> \[Grand 2002\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd18529f66289e0d-7241e66f-4b3c4bae-8987aaca-8c18351318d2f207caab0a84"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 2000\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f2b7e723b364c92-a973f2a7-45534ccf-ad78be55-bfb72f533536867784cc3fcd"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 2008\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2584677bc7bdffdd-0d7ca075-41e340a4-b0c8a390-d0d529bc466473ad93c56dfc"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro> \[Grigg 2006\] [Reflection On Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] by Jeffery Grigg. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80fa42fbcb3d0a24-81ae5879-4da34f12-9982a784-ae23d76ec9147b689ae5e850"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro> \[Grosso 2001\] [Java RMI|http://oreilly.com/catalog/javarmi/chapter/ch10.html], by William Grosso. O'Reilly. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec7fd19e7a510f6f-f55d6d05-4d454705-b281a0ee-8a92333ecf28293a298d9ce8"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 2005\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de39cd158472f27d-b6eedcff-4cf14920-a9189271-ef7882d04c253ce7264779ab"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro> \[Haack 2006\] [Immutable Objects in Java|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable], by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7115df1f3e09d52-006f6e4d-4f3e4d43-b83a9d32-7233d0f09213a252b3d76543"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro> \[Haggar 2000\] Practical Javaâ„¢ Programming Language Guide, by Peter Haggar. Addison-Wesley Professional. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48a1441e2d15c590-a5cd2d6b-47d6450d-8ecbb65a-1a8d22ed8999bde2eabb43da"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 2000\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/TechTips/2000/tt0328.html], March 28, 2000, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d6f58ddd2041dbc-3b38afd9-4fa24163-af679fe9-91ae9e5c922c3036d1b3d8aa"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro> \[Halloway 2001\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/JDCTechTips/2001/tt0130.html], January 30, 2001, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bea98d33547a7f36-d11f7472-45d04720-a44b869d-afd7885faa21bc353c514104"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 1997\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0bcf53815e82061b-88d33195-49d24457-b7efac85-32d62f2422cda2c0e5b6ea21"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 1999\] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14af776fc58778e2-16293097-4ae34ba0-b0bb8528-9018327f62c9aec3c2c99dfa"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro> \[Harold 2006\] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f73281b051acbc85-4fbc748f-4ec14bc3-a039a5ff-8ff609c1f473ca2796e34315"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro> \[Hawtin 2008\] [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf] by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="949dfb42a4a0d432-f481438a-487c4039-addb9055-c64bd5a8043ba5375d24102e"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro> \[Henney 2003\] [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c529b3f4e8bac23-8988af94-45eb470d-b7c5b598-9182ad7796f6565ed41b6466"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro> \[Hitchens 2002\] Javaâ„¢ NIO, by Ron Hitchens. O'Reilly. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc599cbe310e5bbd-da250a79-494f43f0-8a11bf70-1098e682bb05369b12f39dec"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro> \[Hornig 2007\] [Advanced Javaâ„¢ Globalization|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2873.pdf], by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fefa1c72820ad94e-fcc42466-428a4caf-9d76b28c-be2034cc37b8047a02d2ab6b"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro> \[Hovemeyer 2007\] Finding more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a399ca20269a1be-a6534e3b-4cab4516-b9798aa7-489d94dc8dcc3f2a619b93b9"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro> \[Hunt 1998\] Java's reliability: an analysis of software defects in Java, by J. Hunt and F. Long. Software IEE Proceedings. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="834f9ad238ff5098-ddec9ed3-442a4377-be24a07a-12893d4580dd64bb7a947466"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro> \[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25fadfbc478276a6-7689778a-4bfe4080-a591ab84-0b5ed32ba8de6b8a52cffdd4"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro> \[IEEE 754 2006\] IEEE. [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c5cbff2db7685a9-05f1e5c1-47194132-823eb777-02ddec38880f2a4f64c66f97"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 2000\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/], Sun Microsystems, Inc. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c71ab7a12bf763a9-51aeadeb-438a43a0-9dd29872-2df906a920876510fed94e8a"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro> \[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html], Sun Microsystems, Inc. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8e7ed0dc9103bc9-b18827fc-42244ae1-96238b8e-89030e9b8a1d45cb82bf8406"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro> \[Java 2006\] [java - the Java application launcher|http://java.sun.com/javase/6/docs/technotes/tools/windows/java.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="275c2f9fb2c65cfa-ea8641f5-415c473b-b947ba96-4e8449e07ec085e4e1392b64"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro> \[Java2NS 1999\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="beb38f93088fc784-1f722072-43b2419c-b035a14a-c8bc7609a47aa206ad182fe7"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 2004\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems, Inc. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92f6b530c98ea55a-3b90c41e-40ca4e2e-9b0cb86f-2a481e67f135418dca0ab8de"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro> \[JavaThreads 1999\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6baf2ce0980e83c-21294440-439e4b16-b5dba445-ec3e9180d458e45d374907c2"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaThreads 2004\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5509f098b24f9f57-f058a808-4b8145dd-b21186a4-5c62d8fd2f0b5a004a578350"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 2008\] [Javaâ„¢ Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], Sun Microsystems, Inc., 19 Dec 2008. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc50c25ea6c7daac-144c7b78-40364dfd-8517a5c9-020cb772d1aa439a546e0533"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 2005\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fddc9bcf7d569bf-1d811b7e-487043a7-915b8f99-34468cfd9a01b3cb1b348915"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro> \[JLS 2011\] Java Language Specification: Java SE 7 Edition. by James Gosling, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Oracle America, Inc. [The Java Language Specification.|http://download.oracle.com/javase/7/specs/jls/JLS-JavaSE7.pdf] (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f202e07c7ae676a-4e35ba94-44f44f68-938283e2-c00c6997ed66473e776d655d"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 2006\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="690c8e49e88f85a5-41ee8afb-44774956-9cd79089-7aa1578cf01517227e4610a1"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 2006\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36f5313aa293f18c-a95bfd71-43614fc1-ac878b02-c6d1c53bdacf90674e26af0a"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 2006\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60bc4c26b8d01aac-f4aba423-44bf48d6-a0568457-1f389a16a679fea4b67c1186"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro> \[Jovanovic 2006\] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29], Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abc5d297b036e85a-0c4aaecf-4b3546ed-b6c5a847-1f52e2348fecee4eca087be7"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7aab4a8e20c76f99-8d4fbfe5-49e94871-851db8f6-5daebed65590ec64bc473ce6"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro> \[JPL 2006\] The Javaâ„¢ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bbc2cac362c43c6-3b86e711-4704447f-95a589d0-8525c6f86e19cb4369ff0ae0"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro> \[JSR-133 2004\] [JSR-133: JavaTM Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf]. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0baed1305de23d9-bbb0f718-473249fa-8e109ff7-f5000bc452580466cf12f4b6"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1f34ef7e40510b4-53d00fc1-4a234f47-b3409cb2-f0cbcb768e962976e03bcb61"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 1999\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="998de733bad23add-0bbeac2e-4ddf4e94-a12aa645-cc5a7a40d6fabaa74df6f0ca"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro> \[Kabanov 2009\] [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7f31f9e2ea20735-8e1c441f-43a842ea-a52aab3d-cd183eb33ea076d48e48eb83"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 2001\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ac290e85b1f0510-81a326db-4a394b62-8246b307-6460bd0a558f619b20b663fd"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 2004\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6dc0a4dd7633246e-73e49a27-4a4443c3-9f28b9ff-d1e05f14324ba9683853eb23"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro> \[Knoernschild 2001\] Javaâ„¢ Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001) |
...
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="074fad3c4f35e8e0-6e3ffc5a-4afc43cf-95aaa2d3-7063fc69222bbc1dc041a462"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 2008\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2efce72c0c11f6a5-8568a309-4d054708-80c88047-d7686af5f84a598130ae3ac3"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 2000\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a4c7e24317b5258-86de19b6-4b964c57-b93dbc0b-2a3659d56c1db99d0581990f"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro> \[Lea 2000b\] [Correct and Efficient Synchronization of Javaâ„¢ Technology based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf], by Doug Lea and William Pugh. JavaOne Conference. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0f34a1dfa395f96-4aa513d6-47794a89-bc80a748-fcd15fde57cc8f1423471742"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro> \[Lea 2008\] [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html], by Doug Lea. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcb0e1f67758e636-a8e459c1-4edd4e3d-a720a3a5-1cf67788c7a4f71d1dc2e71c"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro> \[Lee 2009\] [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf], by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5bad56d90e1b03fe-22dea284-4db54d72-8df1b932-a18d784f01b9d2f1c032be8a"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 1997\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44d75275d430c94d-4dcbabc2-44ef40d3-a42698ce-d132e0f3b1e6b46b91494707"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro> \[Liang 1998\] [Dynamic Class Loading in the Javaâ„¢ Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945], by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2bcac3583ba81251-8c05d5c3-41b74b85-899c8fe1-12272475dfc59b6ac10f578d"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro> \[Lieberman 1986\] [Using prototypical objects to implement shared behavior in object-oriented systems|http://portal.acm.org/citation.cfm?id=28718]. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2a15629539a33f3-677e9048-4e8e498d-bd989a49-bdf6f59e57ffccd24109a833"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro> \[Lo 2005\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75a7ac02aba5ed16-256e9450-442f4574-92d8be0a-67841d9193788fcac773ce5f"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 2005\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d22e82f-f4cd-4005-b40a-d13d0929dcc5"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
\[Long 2011\] The CERT Oracle Secure Coding Standard for Java, by Fred Long, Dhruv Mohindra, Robert C. Seacord and Dean F. Sutherland, Addison-Wesley, SEI Series in Software Engineering. (2011) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c11b0237-c7db-4d67-a18b-967e2d9d0362="9ee0c142-d8c3-449c-8eb4-e30b83c4d47d"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 1997\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90c51c2953fa886a-9a989c14-4b494952-a3558da0-aa1ef5db41f863e690bc7b09"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 1998\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f445882ce3dbbfd6-3418027c-4c094b62-a86585ad-6780d88469236a0ded78e5f1"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro> \[Mahmoud 2002\] [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/], by Qusay H. Mahmoud. Oracle. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d784235855b8e639-7d3f8fb6-48cd405a-bd07aa87-543a237f13cb33d29f0d1474"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro> \[Mak 2002\] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7633b98068241fd-4c2807f7-4b8d4b71-8d09a63d-a9920b4ab4228e234590b5dc"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro> \[Manson 2004\] [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight], by Jeremy Manson and Brian Goetz. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a74d8aede38f435a-180dc844-428043a5-97e7be6b-5169b072f4e94f02b23cbc0c"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro> \[Manson 2006\] [The Javaâ„¢ Memory Model: the building block of concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf], by Jeremy Manson and William Pugh, JavaOne Conference. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51094d2a62f5aceb-68203d04-4dad4568-aa39a016-df569ddc9060147601ef62f5"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro> \[Martin 1996\] [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf], by Robert C. Martin. (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b96860fde4ebb4cf-9e87c819-4a2a445f-8e30abe4-1414ce0c4446f13a3b2add05"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 2001\] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="424614c06b453900-5696e7df-49c24b03-b5d1a802-8ddf961072812d04529654b6"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 1999\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="124b8bb749d57ec8-a2a3a79e-4e604b88-9115ab90-533f1ea9cb37d88f3d28e81f"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro> \[McGraw 1998\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary McGraw and Edward Felten, JavaWorld.com. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5763b86e3d52f955-6f696489-4b244344-87f4acf3-65abd14685d7d9ac3e0bab16"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro> \[Miller 2009\] [Javaâ„¢ Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf], by Alex Miller, Terracotta. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf9ecc23c960d1bc-6f84b2ae-4a2e4c52-be459659-f93f24d3b71115e8a9d75982"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro> \[MITRE 2009\] [Common Weakness Enumeration|http://cwe.mitre.org/], MITRE Corporation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f382b454b140a44-b368e907-42fd4a17-9ff29ff5-9242e79e3bad1af7264368c9"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05b3b24d06b65271-c2a295ef-42b540aa-87988d3e-17e07d097330b7f1709af87f"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro> \[Monsch 2006\] [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p] Version 1.0, by Jan P. Monsch. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66b6c1a62e8a8089-958ffc24-471449ba-af6daa27-b31d01282f7923cfc5d63bf8"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro> \[MSDN 2009\] [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx], Microsoft Corporation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9ec504d9c7a5a2c-acd9d6f8-40554be5-adfba09b-354b48367dbd808493e57387"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro> \[Muchow 2001\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de2d20edba8f20f6-502a49f2-4f8b4568-ad539cf5-2f143d8ac5c7302c18a79ac3"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro> \[Müller 2002\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="887e527420c4e074-7c587a6a-4a1b423c-ae44a9ea-28664fd47b24fa62febcee13"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 2006\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6276b1ccd7cf1996-7e362a5b-45164a04-96bf866b-d890762114d23888a2bf91aa"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro> \[Naftalin 2006b\] [Javaâ„¢ Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="245418410d301bd3-768e2def-46b6463d-a7cbb4cc-b1569906857f5188848d6bb2"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro> \[Netzer 1992\] [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623], by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin --- Madison. (1992) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a26ea3cf25b05ccc-6b38c29c-49d449ec-b392a050-48f16b409fba2f40e41139dc"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro> \[Neward 2004\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff6c522b2c4a34da-e14babb6-447e4247-a65d99d2-7404eba2c63d0c9d29812a98"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro> \[Nisewanger 2007\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8108ab01bcc1deaa-dc636a2b-4da44df1-8186ab4a-3bbf8edd1c5067b21edb3f6a"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro> \[Nolan 2004\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4894410656a1b9bb-7003be3a-493f437b-b85298fc-4f4f0146783e07ef79659c0c"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 2001\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdb21fa1744af789-b3850e52-4ad24c31-b10fa914-b257564944bd753a66eca407"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro> \[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://java.sun.com/javase/technologies/hotspot/gc/gc_tuning_6.html], Oracle Corporation. (2010) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49031e45cb25d7c9-c3cf3b15-489e40bb-894699aa-f2f4e312cf69b8a9b1f53600"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro> \[OWASP 2005\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="579aff4c5b4098d7-3cc4d7a6-439e4775-ac1ea63f-744c52ad6981a55874f945b3"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro> \[OWASP 2007\] [OWASP TOP 10 FOR JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf]. The Open Web Application Security Project. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d2442774ea74424-0efaede9-491d4103-851b8db2-f74ec689bbff6236038370c6"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 2008\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="997b0f9b52f4dfc6-7bc1ea63-45ae47ce-b5feb914-23cc1914fa7f99fa13baaab2"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro> \[Permissions 2008\] [Permissions in the Javaâ„¢ SE 6 Development Kit (JDK)|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f61602780272dec-d234179e-42b04e0b-9dd9921a-e173967ab08192d1412955df"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro> \[Philion 2003\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="967de30240e8ff24-9a102463-49594826-96ed8e0b-dbb8e4c935671e059b5ada2f"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro> \[Phillips 2005\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="901dca3284a92bc0-d41d9c15-4f504be8-a44d92a9-ef1af229938bb7bb7355efa4"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 2004\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ebffb52324fb7628-bb9942d2-49aa41f4-a217b4e2-f4534a03bf262d04d10cb4bc"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 2002\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd1a4c4c3ebfe4f9-cdff3c43-43034647-bfb9b14e-cf7ea197115dd3058fe59fe5"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro> \[Pugh 2004\] [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/] by William Pugh, Univ. of Maryland. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="226fe9bf87f6f108-af66d7d1-47234ab7-a102bce7-2b63ed19af4493b3312c4554"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro> \[Pugh 2008\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ee9d970779fb228-0ab3cb51-4a134b12-84b4aa97-e9bfc02e7f9936a7a9480f1e"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro> \[Pugh 2009\] [Defective Java Code: Mistakes That Matter|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5335.pdf], by William Pugh, Univ. of Maryland. JavaOne Conference. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d269aae9f421660b-797c01ce-49c14f6c-a20da072-f7ebbba2d3193f3f541dc43e"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro> \[Reasoning 2003\] [Reasoning Inspection Service Defect Data Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf], Reasoning. 14 Nov 2003. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6206931d455df68e-c4576a81-48094663-9e958599-878ca6a3e236185c877e4ad9"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 2006\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41881d06fe3bb84d-24f0c1bf-4ed04724-914b8fef-ea40f2c886e56f986adce868"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro> \[Rogue 2000\] [The Elements of Java Style|http://www.ambysoft.com/books/elementsJavaStyle.html], by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f56fa87b6d821e1-4e52ad2a-43724469-92dd9c32-5568f8c05dc9c608e8f398d7"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro> \[Rotem 2008\] [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf], by Arnon Rotem-Gal-Oz. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a989a70620aa5f62-74ec40e6-42484e69-89338810-7e42c4d2ed016a0fee35bf63"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro> \[Roubtsov 2003\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de2e7110ce2cabda-703ac1fd-49b8467f-a7f78741-fbe19e9df253a6384eab69b8"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro> \[Roubtsov 2003b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f46ecaa395e2995-66586c8c-445b4e10-bb44baa1-8dd39a3ffe0ce3dbc51aa741"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro> \[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd0e81e67182ba73-1159d9ae-49914231-a048add2-4275016e862268c38f2271b7"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro> \[Saltzer 1975\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1736dfcbb68ae1b-ffef6e7e-41264ac6-bf08b4ee-c75f8619a9d3d69cda1f7f1e"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 2007\] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05b14e0f0af4c9fc-5c6bd354-48054968-98219570-9936232af2eda3172505f6c8"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro> \[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|http://java.sun.com/security/seccodeguide.html], Sun Microsystems, Inc. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ecef463f33306b4-1f9ebfe0-42be4ab3-817da24d-14c62331ce85e4476bee3a7b"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 2007\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fafb723631b99684-ac87436b-4c4e4849-8cf5b713-9be307c6828d7dc10481be68"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro> \[Schneier 2000\] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b8dfb4a00fa6f0d-e46e5735-4e1744bb-a13b91ee-918d1cb0449f7747271d62de"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro> \[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25a622411d62eeb2-231d5071-4f88487d-bd96b6c6-1300b0a75d6f3bd2d5335bca"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro> \[Schwarz 2004\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daac83fe7a77972f-ddb3bdbf-4b644b9f-8dc49460-57dc7eb336abc7ffde65392b"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro> \[Schweisguth 2003\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by Dave Schweisguth. Javaworld.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab6affff7951eee9-65f42d3f-40ee4017-937cad6d-ed072d2ecdde1f8c48952911"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 2008\] [SUN Developer Network|http://developers.sun.com/], Sun Microsystems, Inc. (1994-2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69c7bbbe365a9566-436907e3-4c96465b-a5fc83c5-bc10d6c325be1103e3d24cf0"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 2005\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) See [http://www.cert.org/books/secure-coding] for news and errata. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cdf37b8f5272565-343636d9-428443ce-8c9a87f6-0a38fb056d1482e95560b55a"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 2006\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17dac7f80daf010f-66781a10-494c4c10-b7cc8ced-572d753cc6658902251c68d4"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 2006\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac5a42b342574cb6-7ad31175-41574ff8-afd69b32-2d606a1b62a965da8d87e932"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 2008\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="864e5ffdfd4dceaf-6f3a2f70-49f0470d-ac509f0b-a29881bf7c34912a66c52866"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro> \[Sen 2007\] [Avoid the dangers of XPath injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html], by Robi Sen, IBM developerWorks. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a46c31a2f65c037-1a51da73-444d4272-8268b737-801830c9b41331a612c0b958"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 2005\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4d6d57fd7187ae4-fbd724ae-41984a65-b538a8c5-8850cde207028edd3f467fd2"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro> \[Steele 1977\] Steele, G. L. "[Arithmetic shifting considered harmful|http://doi.acm.org/10.1145/956641.956647]." _SIGPLAN Not._ 12, 11 (November 1977), 61-69. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f94cfdcd8da64883-3b857381-40ce4655-965f938b-de5f1d7804f22bef6fa69dfb"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro> \[Steinberg 2005\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], Daniel H. Steinberg, January 4, 2005. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af5177a9b767c0a4-f7b253f2-4e7b4bb5-ab51af16-c0ab85ad17c2b240930ad26e"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro> \[Sterbenz 2006\] [Secure Coding Antipatterns: Avoiding Vulnerabilities|http://gceclub.sun.com.cn/java_one_online/2006/TS-1238/TS-1238.pdf], by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f381d7f73db0fa1a-c65765d8-40b944cd-9601a02e-b0cd98ed8db80983a172a78c"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro> \[Steuck 2002\] [XXE (Xml eXternal Entity) attack|http://www.securityfocus.com/archive/1/297714], by Gregory Steuck (www.securityfocus.com). (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0b5e8584c850df2-3cf57e1b-40314521-aa40ba1a-be7ba8304b46d17e7ae7ba2b"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro> \[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://java.sun.com/j2se/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="825eb8da840a42f9-e290f3c8-4db2435f-861caab2-27e014ba78755b36f85f922d"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro> \[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/], Sun Microsystems, Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5a86a55965d6a7e-4574a851-417c4458-9d918b4c-572926432523e022e796a530"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro> \[Sun 2006\] [Javaâ„¢ Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f094512bd235be04-d2764308-40814607-a02bb7e2-25b67139dfbc4a1ab52046be"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro> \[Sun 2008\] [Javaâ„¢ Plug-in and Applet Architecture|http://java.sun.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07e6f29fdcceffbf-48a878d5-45af45a7-a3cca7a0-e8e8432cb256ce1fb710d604"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro> \[Sutherland 2010\] [Composable thread coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485], by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="127dc9102b0cd3f5-b7262d9a-4972478b-be6d8b07-74777de5f3346e4921379891"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro> \[Tanenbaum 2003\] Andrew S. Tanenbaum, Maarten Van Steen. [Distributed Systems: Principles and Paradigms, 2/E|http://www.pearsonhighered.com/educator/academic/product/0,,0132392275,00%2ben-USS_01DBC.html]. March, 2003. ISBN-10: 0132392275. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="667eb06186aba88c-e06a6bef-4c4d4880-b3a49265-08b1ccbc1718f6b392df4776"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 2007\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference. (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ff7a7fa2f020772-e9e8dc78-4ca84182-ab23b9e6-8c9d562039603a939cb75a35"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro> \[Tomcat 2009\] Tomcat documentation, [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security fixes|http://tomcat.apache.org/security-6.html], the Apache Software Foundation. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="739130217ed25102-05c26bb1-4daf4a1b-84e6a73c-ad4974eeefda7c73a1db96a1"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 2008\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html], Sun Microsystems, Inc. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5dcd29b25678371a-b160b404-418748fb-920bac0c-66bf6e14883bc62fcb3809d3"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro> \[Unicode 2009\] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: [_The Unicode Standard, Version 5.2_|http://www.unicode.org/versions/Unicode5.2.0/], Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="acbfb784fb072ab6-a3c5a2c8-45c54a12-868995c4-4f0d13bb560b59b71b3436ea"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro> \[Venners 1997\] [Security and the class loader architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1] Java World.com, by Bill Venners. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27c5e4d860919a88-b9d04be1-4bbc480c-a59cb5fc-72d0fb2d21de01a2cbddfa09"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro> \[Venners 2003\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b4efc6c0ce191b1-e4194dbd-4cba40a2-9a47b4df-800ecec8271124c2307cf541"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro> \[W3C 2008\] [Extensible Markup Language (XML) 1.0 (Fifth Edition)|http://www.w3.org/TR/REC-xml/#include-if-valid], W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ad4d939d7ca8371-9cb9959e-46054e45-9cd2828d-71e9aeaa8d610d09b996cc41"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro> \[Ware 2008\] [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/], Michael S. Ware. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68f2885a77ba19f4-b54dea11-480f4066-81b6bc25-8bfd036c9a86f4287443b740"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro> \[Weber 2009\] [Exploiting Unicode-enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf], by Chris Weber, Casaba Security. CanSecWest March 2009. (2009) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68a98e1e9465fb25-4dff6035-483044c8-9c828724-ac1d09a3054184e9ac5f7334"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 2003\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2b8670eb7d10365-fefe6f48-4e0e4a5f-9940871a-0d2f91026f09f709f4dcbe6d"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro> \[Zukowski 2004\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], John Zukowski, May 18, 2004. (2004) |