| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa07e2e18bdeb324-9d9456cc-4f1f4d89-ac45b216-ef45d13aafef780e90f44e0a"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="316337390de77193-c552e9c4-4323461a-a16fa0be-c893504486c6108a8d8eadb0"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 00\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d7d1974c6522be4-8c6c7b41-43ce4150-974f868d-09e8efe849fb38ba7673f1c2"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 01\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3409cc1fc205e079-264c09ab-4a474aa2-9009aed2-d7d3e09c5384d74e8be6c192"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63bff973d1683f01-107a96f6-4bc5447f-b123b20b-6820dd8798de99683e3d51c8"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e581490b652e3f4c-f24214ca-4b08450f-b8e281cd-6dfee93abca172c97d9700ba"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4201f8cd055924b8-88f8e706-462642ac-91afbac9-a1f1dba6c6dec258bbd91d00"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e36a4d4ae6722fe9-988a416b-4cd24816-a6f58e01-ff1833f85ed2e043cc1f2cfd"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 05\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava (2005) \\ |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5b10e087380fa33-816360f8-49d34a83-90b2a08e-5d4a30e3a90a4cc97183cc83"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 04\] Core Javaâ„¢ 2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9bea1a700b03c134-4f11955b-4f33429e-b1a6ae64-9b40a2e4dd235921c10552be"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab3f4e1d7c25570b-df9c7480-4d044ec6-8838a405-c7c6bfefbcdbde8190f4c641"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="022efc2b56a09e66-a9c3a4bb-474a4f59-97b293cd-c6f3eef85e870e61312f9cff"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ddc87af2d0ee1cb-8955cc34-4ad1424c-85adb78d-88dbc868305078b7ef2e80a0"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df92314ccbf0f09e-b4389a0f-4a2d4cce-a621939f-b3c264f8c11d8722d513eb97"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c3a7ddcdfd905b0-bf758d0d-4b184f98-8ea8b260-66d6e9c596ff6cf231227826"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bda2afb297ec3746-38f17937-494342ee-a3d6ad25-3460137008968242c24264e6"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 03\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="880047cab1290c93-1c9680f4-444444af-83c3a6ff-3884317853693b8f79fbf3bf"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="837b60b07ac72cbf-082db834-48264374-91b4b87e-411adbdb146446bf90f8bde5"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 01\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8161abf78e238c9b-0a4ae24c-42564aac-82929b08-c61ec34f59929cf996c9ef4a"><ac:parameter ac:name="">Garms>FT 01<08</ac:parameter></ac:structured-macro> \[GarmsFT 0108\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c4d38cdac1a0d35-a1051196-43064ace-b6d8b27a-9806e22a7811ba12cb454547"><ac:parameter ac:name="">Goetz>Garms 06<01</ac:parameter></ac:structured-macro> \[GoetzGarms 0601\] Professional Java Concurrency in PracticeSecurity, by BrianJess Goetz,Garms Timand Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006Daniel Somerfield. Wrox Press Ltd. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca1d2ab4969cd94e-9db4a307-49194209-891b9a49-e537f83417c8d6431adcc4fb"><ac:parameter ac:name="">Goldberg>Goetz 91<06</ac:parameter></ac:structured-macro> \[GoldbergGoetz 9106\] Goldberg,Java David.Concurrency [Whatin EveryPractice, Computerby ScientistBrian ShouldGoetz, Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991.Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bf974856ef0bc27-c483a757-42134f5c-bcdfa872-2db17d207a45203c89a94e8e"><ac:parameter ac:name="">Gong>Goldberg 03<91</ac:parameter></ac:structured-macro> \[GongGoldberg 0391\] InsideGoldberg, JavaDavid. 2[What PlatformEvery Security:Computer Architecture,Scientist APIShould Design,Know and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffedaf58cf5ef249-dbf4da59-40c84fec-afc7b8c8-72bc4bc2847d7991c829ff1e"><ac:parameter ac:name="">Greanier>Gong 00<03</ac:parameter></ac:structured-macro> \[GreanierGong 0003\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b198bfab08dda854-4caf4799-4c624849-80f48d07-aa351fa51e83c84064315580"><ac:parameter ac:name="">Green>Greanier 08<00</ac:parameter></ac:structured-macro> \[GreenGreanier 0800\] [Canadian Mind ProductsDiscover the secrets of the Java &Serialization Internet GlossaryAPI|http://mindprodjava.sun.com/jgloss/jgloss.html] by Roedy Green. (2008/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59ffba0680516f56-1ca9474f-45a64c09-b7caba08-9ebc91a637eae5f79a927848"><ac:parameter ac:name="">Gupta>Green 05<08</ac:parameter></ac:structured-macro> \[GuptaGreen 0508\] [JavaCanadian memoryMind leaksProducts -Java Catch& me if you canInternet Glossary|http://wwwmindprod.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/],jgloss/jgloss.html] by Satish Chandra Gupta and Rajeev PalankiRoedy Green. (20052008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24ecdcc79c1534dc-05a59ca3-4a8d421a-8925b69a-a28e4d493050ddc7fee9d0e7"><ac:parameter ac:name="">Halloway>Gupta 00<05</ac:parameter></ac:structured-macro> \[HallowayGupta 0005\] [Java Developermemory leaks Connection- TechCatch Tips,me Marchif 28, 2000you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Stuart Halloway.Satish Chandra Gupta and Rajeev Palanki. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="38c23b15c912460c-a31a10b5-488246bb-95eb94ff-92e40e69d00c15923cf2cec7"><ac:parameter ac:name="">Harold>Halloway 97<00</ac:parameter></ac:structured-macro> \[HaroldHalloway 9700\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6903b9a6f5128b89-71ef3c55-4d8843f4-a96886f1-91bd82b9da66dfea1518c21a"><ac:parameter ac:name="">Harold 99<97</ac:parameter></ac:structured-macro> \[Harold 9997\] Java I/O,Secrets by Elliotte Rusty Harold. O'REILLYWiley. (19991997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2872358643e4d2c2-a4209f72-4872418c-ab6e84e2-bc97e6095204d74d60ec8a06"><ac:parameter ac:name="">J2SE>Harold 00<99</ac:parameter></ac:structured-macro> \[J2SEHarold 0099\] JavaTM 2 SDKJava I/O, Standardby EditionElliotte Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000Rusty Harold. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0a6800aeb79af33-6ddb0f29-48164273-8742a57b-fea99cec79daf36effbf03ec"><ac:parameter ac:name="">JavaGenerics>J2SE 04<00</ac:parameter></ac:structured-macro> \[JavaGenericsJ2SE 04\] \[[00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.5.03/docs/guide/language/generics.html]\], Sun Microsystems (20042000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f492eac57133073e-78142f51-4e3743f5-b02282c6-ac4cf4bf1da013e50348307c"><ac:parameter ac:name="">JavaThreads>JavaGenerics 99<04</ac:parameter></ac:structured-macro> \[JavaThreadsJavaGenerics 99\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (199904\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcf76ed12064fe11-d232e23c-4ca74cc1-a834ba06-12ec3f9b694c39d997d2e0ab"><ac:parameter ac:name="">JavaThreads 04<99</ac:parameter></ac:structured-macro> \[JavaThreads 0499\] Java Threads (3rd2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (20041999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc0d4a41729590fc-ba7d354e-46f249f4-89808fa7-cf8093a05477ccc8cb435e35"><ac:parameter ac:name="">JLS>JavaThreads 05<04</ac:parameter></ac:structured-macro> \[JLSJavaThreads 0504\] Java LanguageThreads Specification, (3rd edition.Edition) by, JamesScott Gosling,Oaks Billand Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005Henry Wong. O'REILLY. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="276f5fbbb2c98364-34fc35a2-40b7404b-8e6fbe34-e9b306df990507048af73f92"><ac:parameter ac:name="">JLS 06<05</ac:parameter></ac:structured-macro> \[JLS 0605\] Java Language Specification, 4th3rd edition. by James Gosling, KenBill ArnoldJoy, JamesGuy GoslingSteele, and DavidGilad HolmesBracha. Prentice Hall, The Java Series. (2006[The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5aad4138633837d-cc62ea31-47fd474d-8216ac73-acd64a370e0044304873677b"><ac:parameter ac:name="">JMX>JLS 06</ac:parameter></ac:structured-macro> \[JMXJLS 06\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a15626e97eed2da8-c4469fef-4a684828-8e7cbe4c-c713c540e002be2fe52b5a10"><ac:parameter ac:name="">JMXG>JMX 06</ac:parameter></ac:structured-macro> \[JMXGJMX 06\] [Java SE Monitoring and Management Guidefor the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/tocindex.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8b59eded4ce3290-5db3fb85-4bc9431a-99c7b9fc-efea8357bd901cb94c91f34c"><ac:parameter ac:name="">JNI>JMXG 06</ac:parameter></ac:structured-macro> \[JNIJMXG 06\] [Java Native Interface SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/jnimanagement/indextoc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea4e03a2c9a95faf-1a2517b4-460948ba-9934b3ba-dbe3d3a307a9b1e7c64ed976"><ac:parameter ac:name="">JPDA>JNI 04<06</ac:parameter></ac:structured-macro> \[JPDAJNI 0406\] [Java Platform Debugger Architecture (JPDA)Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jpdajni/index.html], Sun Microsystems, Inc. (20042006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0786f04911372d18-c1d57c59-46de449c-9464b7d0-2dfbbf8922c83c6974c5ba6c"><ac:parameter ac:name="">JVMTI>JPDA 06<04</ac:parameter></ac:structured-macro> \[JVMTIJPDA 0604\] [Java VirtualPlatform MachineDebugger ToolArchitecture Interface (JVM TIJPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jvmtijpda/index.html], Sun Microsystems, Inc. (20062004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26c91ee50caffc61-ec8c08c8-47564cb5-b13cb87e-9d7fa4cbd541352faf5080b1"><ac:parameter ac:name="">JVMSpec>JVMTI 99<06</ac:parameter></ac:structured-macro> \[JVMSpecJVMTI 9906\] [The Java Virtual Machine Specification Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/bookstechnotes/jvms/guides/jvmti/index.html], Sun Microsystems, Inc. (19992006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41f55834686d7d97-fecf402a-42d2489d-b29b9ea4-ab6011367d0845f5751b2954"><ac:parameter ac:name="">Kabutz>JVMSpec 01<99</ac:parameter></ac:structured-macro> \[KabutzJVMSpec 0199\] [The Java Specialists'Virtual Newsletter, by Dr. Heinz M. Kabutz. (2001Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9af57c1277616014-868307c2-48544032-aa7684cf-16e69256d423e1c63b284507"><ac:parameter ac:name="">Kalinovsky>Kabutz 04<01</ac:parameter></ac:structured-macro> \[KalinovskyKabutz 0401\] CovertThe Java: TechniquesSpecialists' forNewsletter, Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishingby Dr. Heinz M. Kabutz. (20042001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c51a16bfda1a0f8-f0178aa1-4e144a1a-ba1a80a8-607e2c7d71caa334ed91ed75"><ac:parameter ac:name="">Langer>Kalinovsky 08<04</ac:parameter></ac:structured-macro> \[LangerKalinovsky 0804\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer (2008Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="735cce63a57b9dcd-2ba2ddd9-47184a18-b5b0baf2-2fdabc5d63ba1ce73c309304"><ac:parameter ac:name="">Lea>Langer 00<08</ac:parameter></ac:structured-macro> \[LeaLanger 0008\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000[http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="031bc00b8f3b291a-30b6cd80-49254cf0-bcdb8da4-0f9dc2b9bc12bc8243608234"><ac:parameter ac:name="">Liang>Lea 97<00</ac:parameter></ac:structured-macro> \[LiangLea 9700\] TheConcurrent Javaâ„¢Programming Nativein InterfaceJava, Programmer's Guide and Specification2nd edition, by ShengDoug LiangLea. ADDISON-WESLEYAddison Wesley, Sun Microsystems. (19972000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f091812c3d4d9563-4a8bca56-4915479d-8587959f-2fc2c5079e319d9a5e37b16f"><ac:parameter ac:name="">Long>Liang 05<97</ac:parameter></ac:structured-macro> \[LongLiang 0597\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html]The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by FredSheng Long, CMU/SEI-2005-TN-044Liang. ADDISON-WESLEY. (20051997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c05c165ad5048f77-e96b190d-410e42f5-bdef8f07-e32209833f8148f549955cd7"><ac:parameter ac:name="">Low>Long 97<05</ac:parameter></ac:structured-macro> \[LowLong 9705\] [ProtectingSoftware JavaVulnerabilities Codein via ObfuscationJava|http://www.cssei.arizonacmu.edu/~collbergpublications/Researchdocuments/Students/DouglasLow/obfuscation05.reports/05tn044.html], by Fred Douglas LowLong, CMU/SEI-2005-TN-044. (19972005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e9c3aadc304250d-e7682c30-4ae741aa-96ffa4be-debdf27e117bd736ea564e46"><ac:parameter ac:name="">Kalinovsky>Low 04<97</ac:parameter></ac:structured-macro> \[KalinovskyLow 0497\] Covert[Protecting Java: TechniquesCode for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b156e5383c3887d7-76ccccb4-48b94506-83c3986a-4fc24da97dd5b590fb732e1d"><ac:parameter ac:name="">Macgregor>Kalinovsky 98<04</ac:parameter></ac:structured-macro> \[MacgregorKalinovsky 9804\] Covert Java: NetworkTechniques Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cf8c0349a740f4c-5db6af84-4d34482e-98bab941-00c4f99a4c9a2b769ea60686"><ac:parameter ac:name="">McGraw>Macgregor 99<98</ac:parameter></ac:structured-macro> \[McGrawMacgregor 0098\] Securing Java, GettingNetwork DownSecurity, toby BusinessRobert withMacgregor, MobileDave CodeDurbin, byJohn Gary McGrawOwlett and EdwardAndrew WYeomans. Felten.Prentice WileyHall. (19991998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11c1ffc28f617580-ba4f51b4-4f5249a6-8feb966e-809684ca8692c9f9adfc2027"><ac:parameter ac:name="">Mcgraw>McGraw 98<99</ac:parameter></ac:structured-macro> \[McgrawMcGraw 9800\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com (1998Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4782134a247f92cf-6137bdef-49c84931-85769e35-20075dccdb4efa1552f50095"><ac:parameter ac:name="">Mocha>Mcgraw 07<98</ac:parameter></ac:structured-macro> \[MochaMcgraw 0798\] [Mocha, theTwelve rules for developing more secure Java Decompilercode|http://www.brouhahajavaworld.com/~eric/software/mocha/] (2007)javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com (1998) |
| unmigrated-wikiunmigrated-wiki-markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa1ca8591661ec2d-d4153f30-44394cff-88d1949f-a447f628c9f17d1c6c83a611"><ac:parameter ac:name="">Müller>Mocha 02<07</ac:parameter></ac:structured-macro> \[MüllerMocha 0207\] [ExceptionMocha, Handling: Common Problems and Best Practice with Java 1.4the Java Decompiler|http://www.oldbrouhaha.netobjectdays.orgcom/pdf~eric/02software/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002mocha/] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07da69fe-0e93-4d55-b59e-2a46be765906"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
\[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f81285e7-3dc7-4757-b373-0b2bbe01df14"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
\[Naftalin 06\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7fe4b6bdf78924c-c6e04b22-4a614571-8a2e9a06-3f8033d4f8c0755ac3b8f4aa"><ac:parameter ac:name="">Naftalin>Nisewanger 06<07</ac:parameter></ac:structured-macro> \[Nisewanger 07\[Naftalin 06\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) \\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcf613d53871910b-9f603e91-45244224-9a76a696-34a8c2cb3109e05fd97f6404"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1244184847bc4ba-def89dda-4749462b-99b384bb-679958f2d1748c7c8ab6c9a8"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c100156b1eb4c84-4ad70574-4a8a41d5-a4268857-eaf66da580c12ecf3b9fd51f"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="747fb6a98419c866-40b46552-4d974a18-8fec951c-42d1fe80f37d7c43d4afc21c"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 02\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67557cccd5913782-ea26f5b2-46914ec0-bf45b291-b72c836abd33708248620fd9"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 06\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9318b00812e22a3e-fcfa4db6-4e6a486a-ba37b054-0d9e437e81467abb879092cf"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71e069b865b547e1-cccc1e6c-406746bc-9bd49ebf-21ab6305e23be9b6bba0edf0"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 07\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f1a80f2f1fd4c21-55f739e3-448a49cd-82038550-fc9a104875f730745e2cabee"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 05\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07c45ee50de4c30e-6489c1ea-4f744a1e-8a248718-f4569dabb65c93d83d967d7e"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b90bddcc4d3d1477-75056048-41044d0d-b5c68b3d-1a24453b315462ce5ef8a3bc"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="582736e1bb97d36b-cda340a3-4a5b42cd-aadabb8e-cc895973192b83053e7c57a9"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d6f3bcc00c4a58c-982a35cd-4ce14690-b19aab26-7ec00e82e06caca57dd839e9"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 08\] [SUN Developer Network|http://developers.sun.com/] (1994-2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd58f26af60569d4-ccfa6c15-44c240d6-b94189e4-7942e420a5cb19587e986c3a"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 07\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52765ffbe3321e8d-99aee81a-43564dec-9e24b3b3-3ca1e84bd7ae77a64d993ad2"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f33394619ca2750-cd2960ab-45334a57-87819151-eb793fcf3c6230a291601f6a"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] [http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html][Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler (2003) |