Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3cecff806bc18d61-ba17b05e-48994f5c-ac9b9868-a64e832bc036f8bfc874a105"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="077c89b927cdf52c-ec8d7453-4b6f41e5-9a769e84-4a19cb100ba9fed91ef660ae"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a730191274cd39f1-0c868d6e-4e0b4f3a-846cbc62-03cf631c77939ea397212505"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c434fbcf59afc5a5-c1b7fe34-47214be0-adf89e22-ae5fd1978137db3872a36024"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c5fa76151f586a8-2f920846-428d4bf4-8ce2ba71-9152f1c8f59809cefb6d8a9a"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
\[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85cb3db67d36801e-8025de9f-40564cbe-9d9487dd-22b816a5e55a85606b48ff80"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
\[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30e1f24100ec843d-6e22688f-4be34b44-974a80ca-8d863c84a3084eda7df1d711"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
\[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b355205266e11e4f-dbcf66f6-42084bc0-b5dd9396-7bcbf7a3164c87b0de64dc54"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
\[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afb292159e0036c3-785185a9-48d14400-a7a9a3fd-c1afd95a7cfa103fa4a22865"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4cbef5a29c9b8fd-0ea041e5-4c884d1a-ad798e1f-95b0e67d30fa66bc1af1b73e"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e86d4e5f128a41e-6cabe6be-451345da-975eb799-bbed0377bb690a4800a1f42e"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b16588b58c3831a-f508ea3b-4e4e4325-9c2e9049-5dbc038af8f56fa5f709fca6"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4885475735dd972-c6c41043-4c4c4b77-a1918acc-d755c765075028d865fa124c"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab28774c2bc6f69b-7ee523db-425a4a62-81f19afd-8a7bcbf2a5a170ceb736ea17"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="549fc47651c47941-cdf7b391-4a8d4174-81099cac-5d69c7c2584081888f481d02"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
\[JNI 97\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54e1087df81d753e-d7d8cf1a-475540c5-b83eb5db-6d7a3d73a9eb379f6f9730b5"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> 
\[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="702088c053871791-b71c9d7c-466240de-9f518438-89fc69e0d782bd8737376846"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e07c6d4b1b20197e-421d1e2a-451a4d1a-98428a49-c7ce867e85b658aae7efc113"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52c09377cc3f555f-2e28e479-4f144a99-95af885b-3a09ca6c359430eb5905cbad"><ac:parameter ac:name="">McGraw>Low 99<97</ac:parameter></ac:structured-macro>
\[McGrawLow 0097\] SecuringProtecting Java, GettingCode Down to Business with Mobile Codevia Obfuscation, by GaryDouglas McGraw and Edward W. Felten. Wiley. (1999Low, [http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html] (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3b43259-87e7-4bb9-80d0-bfab2b43a1fc"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb0e6063-c00a-4b0a-8c6a-5148096347da"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="593e409a-3b8c-45d6-9dd8-36b2e85c6e2c"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 07\] Mocha, the Java Decompiler [http://www.brouhaha.com/~eric/software/mocha/] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a30eeadbc2871e1-059a5af7-47b84346-a29d8379-77ca8a58991db07f7e1f25d4"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e64c736a9389a31-85cd08d1-444e48c1-92f2a473-1c54d4f9efad801ab0dfeb40"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
\[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c32c1a0a79ead0e-c3aacbe5-420048d9-bc6ebd1e-63fa2d48dd1d83b2e4022aa3"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
\[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d33b3a51420e8bc-55a69bf2-4500448b-ada68cd7-d94e29fffc6fd04b55f88f84"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="549b95cf0ff8e590-6e26a8ec-43384f9c-b1e399da-15f4de1f79c90c168e97544f"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff393f936786da18-ac33f347-4c4645fb-b56787a0-30d13d981624e24846ae5848"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro>
\[Secrets 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dea532af2c100c2-1d7b51a2-4aa34ce3-9ea3b4b2-bc419484904f3e6b23d78364"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006)