Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f259659a5989d97d-8a1b4763-47114a8e-aeb7b65a-d5c5cad7f89aa1d469cacce2"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0cf923b5862fab7e-9070dda7-47f14be7-af3dbe0c-7607dde1250245a401dd4282"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42d5c8ba197ad791-f0cf89c7-4c4c48ae-bc99ad09-3dee2c73bb3a0790fa6493aa"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e57afa6d54bba7b9-7ba0f167-48d543af-bf0696a4-ce0065763cd91ee7c4cbc942"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
\[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1216075bee022d9d-eba45623-4ac847bb-a449acc9-2e9fd17f00fa14591ef34fb4"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
\[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cb3228140e9a5c1-0c52559d-475f428f-82c3b3b8-b7c9b438b59e2f2aa5754977"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
\[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d12a9c890ed09141-03bf48c5-49ab4867-9cd6836e-49aa6824d4fc82cbec7f29ef"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
\[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ff8729eebf7cf04-0af72a93-43ed48d2-a5f2bf67-124c3a67e4623caeb18edc92"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="38b66dc5721c1b87-34798c96-407c4b08-978ea008-b29403965b77abc77459a48c"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93b10ab90860c599-652ce027-4b364bea-a5839a97-250b2202b4ee21cc6dca673e"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="456a602aa8d70473-1f0aed43-45cb49c9-b146a1df-32b7ea3e49afb9a8cd0d5bfa"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c7e86d559d00e09-ec3d3a00-4ba14713-b089adb6-1e84a584fdc7e44f720e5658"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b8cffd8bfa8de4b-900d486c-48254b17-8b6cae26-c415e1cbdb86cadda628fbc6"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2356753ccf1f49a7-70954c62-4031470e-941dae5f-2c92e6240f21f183b5422da8"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
\[JNI 97\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42ddd895c3311bf6-bf47036b-420d48aa-88f094a9-c6e8e9856d1032087a93d7e6"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> 
\[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6765d50111ab7f4f-52e6421b-484d4ac8-a93f8409-b6c1d68c2a4db6943c4b25d4"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="610521841c2fec73-11ad823d-41b34f9c-be21bbe3-0121de660d2ea92f1fb6651e"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9526dacf5303920-75422834-4e194f06-be51b750-f8842aa1312ec000006977f1"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7618c3c9e3cd1dcc-b3e4e829-42634ac8-83c4bbd5-bb998e0b085c1bc4fae45cb0"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03fef94fef2dc034-0dcd1c10-4b3a4d82-9a578fea-25e9b664a73919cfef763ec3"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
\[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd51bdb5576dc36e-7be51d8a-41de4606-8f4281bc-10f16fc550fb87cb4e4fa9de"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
\[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b42accad33f09b30-fc2f2880-493048ff-9dcd8010-724ec46c83496da7846e75df"><ac:parameter ac:name="">SecArch>SCG 06<07</ac:parameter></ac:structured-macro>
\[SecArchSCG 0607\] [Secure Coding Guidelines for the Java 2Programming PlatformLanguage, Securityversion Architecture2.0|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.docseccodeguide.html] (20062007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="105057df9271eec0-d69a4651-43454fd2-9009b5d1-d9290758c291aae6187db438"><ac:parameter ac:name="">Secrets>SecArch 97<06</ac:parameter></ac:structured-macro>
\[SecretsSecArch 9706\] [Java Secrets2 byPlatform Elliotte Rusty Harold. Wiley. (1997Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b5fc4c11c4ee965-727c7a2a-424b4367-a1c5894e-f253ed20268a604fb800707e"><ac:parameter ac:name="">Security>Secrets 06<97</ac:parameter></ac:structured-macro>
\[SecuritySecrets 0697\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006 Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8c7765b131c51fe-ac045ed1-4e404768-a477af27-d2f841f7ce8ddd6d822856dc"><ac:parameter ac:name="">SCG>Security 07<06</ac:parameter></ac:structured-macro>
\[SCGSecurity 0706\] [Secure Coding Guidelines for the Java Programming Language, version 2.0Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/seccodeguide.html] (20072006)