Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be4dd23f7bc04609-abc8ad9d-4d92462e-8e619bae-1ddd3a0004f8422c39c17172"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f928850744684b9-b2f9d620-41e441d2-8a629094-ef3d2c32f752150f4d6cff50"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5bdbb6f36f56cfd6-88b7976d-47e54614-b051916f-8fb474f3a79c9ca40c56d6ab"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76a971bc25a4689b-1ac2e62a-47184219-9654a2fc-7f51c124598572aa0cd49001"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1fbb7ba745a217c-d706cb98-4c1f4104-bd9bb037-9d2973719bca133ec9f2819d"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d6f8a47dfa78848-d220dc5e-418e4746-8932aa99-974f8ae7ce0ad58d6b015b85"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
\[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36ad1ae45347592d-4b52cfb9-4fc343e7-a9d19164-7d4ecda6234561054a1fb497"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
\[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f39dc503f299546f-41a2c748-400e4cb0-a1e886cf-fad27d612ef0f6b9fed8cf3a"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
\[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c911b0e4b59decf5-90e4ae60-49f64e47-ba178e74-272c0b86b64aeb1f354e42f8"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
\[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d3e3d233dad57af-1d22b41d-4d2146ba-bae0a932-9e77248b82e26cbddcdde14b"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7bb9c988449f2c7-e05cad50-47c94ac0-b6b5a7f2-5a3ddfea1d7338a4d499ea93"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80cf3c9a15ca4b1d-5b5ed856-45e74f3e-94ae834b-7576ea291ac08770bfcc7cb7"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9df25942f4ab5c5-cf533e36-4b214d38-aa98a8ef-c9ba0fe9eeada36406255ed1"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f685474a85314e62-8781e54c-419b4a76-8d4bb45a-a38c6fae3f02999b4616c89e"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="520ec9b616076d26-52e11166-4b054b72-a488b4bd-a962ecfef51b5882924976ac"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e962c0690d2861f-62ced5e0-40324ca0-9dbe9553-40c24573350d80e0fc8f3b73"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
\[JNI 97\] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2664fa87c9de8051-59bfca54-405143e2-a265bfbc-cd34b2459b9136b9d0c7d535"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> 
\[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcc37fb86f6ca381-4ac8bb6f-4d5441ee-b6cf85c3-ff09e7d62a934a44ecbd79dd"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ba1d2f559022f44-641e4121-49164446-ad0eb41b-a97793549ae35a0e140e446c"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="902088b0e3d99a57-f1186349-4f304595-9cafa5fa-2544997cfa53a7c603417a99"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
\[Low 97\] [Protecting Java Code via Obfuscation, by Douglas Low, [|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b5f33dd1e7cf36c-3f613e97-481f4712-b1c4b0be-f7102b46c07d2b2ab08e5c06"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33d9fa28e2745851-96cb8b03-462c45ce-a7d49915-492f6c57f942f757f8a6f1c7"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad42b4aa3a82b801-800a4e1b-446045b1-9d18ab8b-d49adf8b13cf7166f21b5e92"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 07\] [Mocha, the Java Decompiler [|http://www.brouhaha.com/~eric/software/mocha/] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b9b673511a34d3e-26f2b015-46674ddc-b6e598eb-7bd81d64c3ddf15c2c553cda"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbbf5a298b25cf49-77c1fbd5-4397499d-be679244-47cced123de693d7bf62daea"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
\[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab41a7ade397146d-3f3c5c1f-4b4741a9-9e41af3c-5a02b04413c5a073322f0c92"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
\[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f39e6d38498d1c9-7ee02e7b-4a444765-9ee49484-bf8fcccdb3b216b46a9b9ff6"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9465277e1fbc604d-af6bce7d-47504bda-b3369003-b6c5cb4f57b5b62a8695fe24"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f98d3b2684e11d7-2db87c7b-4fcf4c0d-a533ab88-cd50aaa51e6f2e043cd5e6de"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro>
\[Secrets 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21f621ddb9be6d99-774f83f8-4e1f4b8e-b0b0a2a4-2a52cbf908a4871413fb9243"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006)