Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28e38ec5d8ea53c8-3f13f3d4-418144d5-8c2889ed-f5dd3bc422759f51e752dfef"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae6e4b964484ce52-823081e9-44c640ec-990b9cb5-dacb44e76a5c668f8603eced"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b65a6c4265742eee-4377476d-49414cad-8b66b563-29cad8c7ca7492f0669f9093"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="840766292e42e84a-71897702-47254aa9-a62b982f-a434e054e8bdf715f20a28be"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad5521054616c935-c941f8df-46484004-b9078dba-010e66c129d1c4fd41190cfe"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f50173b83ffe87ae-9dea4c23-42db47a5-bd678f65-f3ce95d7922dc4ee1aac979c"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
\[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52f14b27fc7da6c9-5d5b4e43-4ddb48b4-8fab8969-e114c40639ce76b223c06827"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
\[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31d21f10d5e25188-6d99d502-4b004e1c-8ab597b4-0573dda92d899925bdab395b"><ac:parameter ac:name="">EJPLG>Doshi 01<03</ac:parameter></ac:structured-macro>
\[EJPLGDoshi 0103\] Effective[Best Java,Practices Programmingfor Language Guide, by Joshua Block. Addison Wesley. (2001Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de24afff067051c2-89fcaefc-4f2f4fb1-a99b8166-1c09cabace4a26bab0a6b240"><ac:parameter ac:name="">EJS>EJPLG 04<01</ac:parameter></ac:structured-macro>
\[EJSEJPLG 04\01] EnterpriseEffective Java, Security:Programming Building Secure J2EE ApplicationsLanguage Guide, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony NadalinJoshua Block. Addison Wesley. (20042001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="191b58c9585c9fb0-521944ed-4cb74588-9216b35e-6cfc5e1be96e0a3c3fb7d30a"><ac:parameter ac:name="">Enterprise>EJS 03<04</ac:parameter></ac:structured-macro>
\[EnterpriseEJS 0304\] Enterprise Java Enterprise Best Practices Security: Building Secure J2EE Applications, by the O'Reilly Java Authors. O'Reilly. (2003Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c32b07a95361bd34-03068271-4beb4e51-889886f2-8ebb8443878c9fdcefd211e6"><ac:parameter ac:name="">Garms>Enterprise 01<03</ac:parameter></ac:structured-macro>
\[GarmsEnterprise 0103\] ProfessionalJava Enterprise JavaBest SecurityPractices, by Jessthe GarmsO'Reilly andJava Daniel Somerfield. Wrox Press Ltd. (2001Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d8c335d6ff5ad76-3744f315-48ba4624-ac339bbc-fe7296c0e06ff6a4d206d99c"><ac:parameter ac:name="">Gong>Garms 03<01</ac:parameter></ac:structured-macro>
\[GongGarms 0301\] InsideProfessional Java 2 Platform Security:, Architecture,by APIJess Design,Garms and Implementation,Daniel 2ndSomerfield. edition,Wrox byPress Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a89c1732789fb91-c6747324-42364bf1-8bfcb456-d37aad33dbfb014447a92b1d"><ac:parameter ac:name="">J2SE>Gong 00<03</ac:parameter></ac:structured-macro>
\[J2SEGong 0003\] Inside JavaTMJava 2 SDK,Platform Standard Edition DocumentationSecurity: Architecture, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b563225c-686c-4951-843e-b43be0547e36"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f371e5f-ceb7-49f5-866a-6e51fc935a1e"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="442684ca-bd0d-4afb-a3b3-877e7327eaa9"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f59b37c2fb7b821b-e53daaf5-40104ad2-accc87d9-896ac77d4f2cc7f95b717b42"><ac:parameter ac:name="">JLS>JNI 05<97</ac:parameter></ac:structured-macro>
\[JLSJNI 0597\] JavaThe LanguageJava™ Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5581e6f9d6bb2a11-237501b5-4a504ac6-85589dfb-d9ecc5db0420d703548cab1f"><ac:parameter ac:name="">IO>JNS 99<98</ac:parameter></ac:structured-macro> 
\[JNS 98\] Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999 Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d86cf81cb877786-b3409585-46e946a0-8520a9c1-5482f296b11e7e79e65c0ba7"><ac:parameter ac:name="">JNI>Kalinovsky 97<04</ac:parameter></ac:structured-macro>
\[JNIKalinovsky 9704\] Covert TheJava: Java™Techniques Nativefor InterfaceDecompiling, Programmer's Guide Patching, and Reverse SpecificationEngineering, by ShengAlex LiangKalinovsky. SAMS ADDISON-WESLEYPublishing. (19972004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78f8009e40d28016-70edf809-4a0d4e5b-99b3870b-e628bfbf15ec9884243bccb6"><ac:parameter ac:name="">JNS>Lea 98<00</ac:parameter></ac:structured-macro> 
\[JNSLea 9800\] JavaConcurrent NetworkProgramming Security, by Robert Macgregorin Java, Dave2nd Durbinedition, Johnby OwlettDoug andLea. AndrewAddison Yeomans.Wesley, PrenticeSun HallMicrosystems. (19982000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2d88d6e097b16ea6-f4891763-4bbd4095-92849e60-7d550244424cc4ff151cf9cd"><ac:parameter ac:name="">Kalinovsky>Low 04<97</ac:parameter></ac:structured-macro>
\[KalinovskyLow 0497\] Covert[Protecting Java: TechniquesCode for Decompiling, Patching, and Reverse Engineeringvia Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by AlexDouglas KalinovskyLow. SAMS Publishing. (20041997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b50dda6550920b2-5a8fdc6b-4071411a-8dd497fc-119b6c72bf4c2d9c4e4da670"><ac:parameter ac:name="">Lea>Kalinovsky 00<04</ac:parameter></ac:structured-macro>
\[LeaKalinovsky 0004\] Covert Java: ConcurrentTechniques Programmingfor inDecompiling, JavaPatching, and 2ndReverse editionEngineering, by Doug Lea. Addison Wesley, Sun MicrosystemsAlex Kalinovsky, SAMS. (20002004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a82b5cc9dc10ee1b-be315d34-41b24631-a6a78561-4ee9586a1c32d1b586340fac"><ac:parameter ac:name="">Low>McGraw 97<99</ac:parameter></ac:structured-macro>
\[LowMcGraw 9700\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997 Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dd35c60da704109-ebcb6c4b-49cb4f4f-b215b010-e04c47b638f80479edbd629c"><ac:parameter ac:name="">Kalinovsky>Mocha 04<07</ac:parameter></ac:structured-macro>
\[KalinovskyMocha 0407\] Covert Java: Techniques for Decompiling[Mocha, Patching,the and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9227d80dd75af6ad-136058be-429f45fb-aa9fbee0-92c89f6de959fc920f367770"><ac:parameter ac:name="">McGraw>Müller 99<02</ac:parameter></ac:structured-macro>
\[McGrawMüller 0002\] [Exception SecuringHandling: Java,Common GettingProblems Downand toBest BusinessPractice with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c01497d4c78f5eda-c2d02287-4b6b4ab2-b1619c92-1fb9381a94dae4d29e4540ed"><ac:parameter ac:name="">Mocha>Oaks 07<01</ac:parameter></ac:structured-macro>
\[MochaOaks 0701\] Java [MochaSecurity, theby Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb13bbf738d8813b-90c37ffc-41e24ebf-95938d43-03ec61e06ec2eeca0660d97d"><ac:parameter ac:name="">Oaks>Patterns 01<05</ac:parameter></ac:structured-macro>
\[OaksPatterns 01\] Java Security, by Scott Oaks. O'REILLY. (200105\] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1dca0b6b848feca-f1efcf72-472d493e-be8ca082-8406982f57446cf9c511cb84"><ac:parameter ac:name="">Patterns>Pitfalls 05<03</ac:parameter></ac:structured-macro>
\[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37843fb899ddd66a-ba061bd6-4f834f27-ad13a7d0-ee5e8a7c1b19d4c6a3c5f486"><ac:parameter ac:name="">Pitfalls>SCG 03<07</ac:parameter></ac:structured-macro>
\[PitfallsSCG 0307\] [Secure MoreCoding JavaGuidelines Pitfalls,for bythe MichaelJava C.Programming DacontaLanguage, Kevinversion T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (20032.0|http://java.sun.com/security/seccodeguide.html] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d87ca8f65988a82-1bfc452f-41384e4f-9369b730-fc324baa976e40e35e84d92d"><ac:parameter ac:name="">SCG>SecArch 07<06</ac:parameter></ac:structured-macro>
\[SCGSecArch 0706\] [Secure Coding Guidelines for the Java Programming2 Language,Platform versionSecurity 2.0Architecture|http://java.sun.com/javase/6/docs/technotes/java.sun.comguides/security/seccodeguide/spec/security-spec.doc.html] (20072006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a0bc4db52652173-e8fb3616-4bf2432e-a3a2b73f-3733ded860b71912e9e945cc"><ac:parameter ac:name="">SecArch>Secrets 06<97</ac:parameter></ac:structured-macro>
\[SecArchSecrets 0697\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="135e421b0bd9de67-f611925e-4cbf48cc-aa6189d0-9f191ed2ba512719f2c17d01"><ac:parameter ac:name="">Secrets>Security 97<06</ac:parameter></ac:structured-macro>
\[SecretsSecurity 9706\] [Java Secrets by Elliotte Rusty Harold. Wiley. (1997Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f3b40f9ae9c0a66-f791a03b-40d64f09-8d75a030-3eb20ff4a96494c4044011a7"><ac:parameter ac:name="">Security>Tutorials 06<08</ac:parameter></ac:structured-macro>
\[SecurityTutorials 0608\] [The Java Security GuidesTutorials|http://java.sun.com/javase/6/docs/technotesbooks/guides/security/tutorial/index.html] (20062008)