...
 [McGraw 1998] McGraw, Gary, and Edward W. Felten. 
Twelve Rules for Developing More Secure Java Code. 
JavaWorld.com (1998).
 [Mettler 2010a] Adrian Mettler, David Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, 17th Network & Distributed System Security Symposium, 2010. [Mettler 2010b] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI 10.1145/1814217.1814224, 2010. [Miller 2009] Miller, Alex. 
Java⢠Java™ Platform Concurrency Gotchas. JavaOne Conference (2009).
 [MISRA 2004] MISRA Limited. 
" MISRA C: 2004 Guidelines for the Use of the C Language in Critical Systems. 
" Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X).
...
 [Muchow 2001] Muchow, John W. 
MIDlet Packaging with J2ME. 
ONJava (2001).
| Anchor | 
|---|
| |  | Müller Muller 02Müller | 
|---|
 |  | Muller 02 | 
|---|
 | 
 [
Müller Müller 2002] 
MüllerMüller, Andreas, and Geoffrey Simmons. 
Exception Handling: Common Problems and Best Practice with Java 1.4. Sun Microsystems (2002).
...
 [Naftalin 2006b] Naftalin, Maurice, and Philip Wadler. 
Java⢠Java™ Generics and Collections: Tools for Productivity. JavaOne Conference (2007).
 [Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. 
What Are Race Conditions? Some Issues and Formalization. 
ACM Letters on Programming Languages and Systems 1(1):
74–88 74–88 (1992).
 [Neward 2004] Neward, Ted. 
Effective Enterprise Java. Boston: Addison-Wesley (2004).
...