| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a01bbad612b2cd97-14908584-491a433a-ab6bace7-55d2aa528719deaf67fe89dd"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 96\] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="507a033291673976-a0e6bb4b-490f4efd-bc48acbf-361fe6c50e8254d966fcfc71"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bba30083303ab06-0996cda7-4b3445f1-81b3bada-bd39828a78c25cd1f1602d88"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 00\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4b2b5294de5885a-0934fa62-4a614790-9b84a23a-688502d1ef9e448e7aa728a1"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro> \[Bea 08\] [Packaging WebLogic Server J2EE Applications|http://edocs.bea.com/wls/docs61/programming/packaging.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1223120fb3c98b4-378701c8-45a64ffb-96d5bbe5-a9c22f71d1274e73173a0600"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 01\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd28c1a537de0cdf-85437357-405f4a92-b2ca91b1-1122c05c458e375d342aec6d"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62885cd04ab31c5b-3a65e197-4e864150-8e45ad37-623423211432fbbc1386230e"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e144542c065b1a2-123c1672-48ae4ce0-9c168565-c70231286f569da86d99b04e"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e1e2d939421fef1-08aa780d-44754583-9656aaf8-de7cdfa8e3f4312637f415c1"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro> \[CCITT 88\] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d66ca66ef73df65-f5d47683-4e4b42b3-a92a9830-6f0c97ecfc27351c1b46f47f"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b5ec777fa3870fa-21d57ebe-4dc84afe-bfaea5a9-6b87265d8f499e4180bbc9d0"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 05\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava (2005) \\ |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e503090f890a2509-84226d1d-496847e2-80dd997d-b45a0a048d16de1b0f539242"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro> \[CVE 08\] Common Vulnerability Exposure, MITRE Corporation (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19f72897c3880a8d-3a7f3e0d-464d47f7-8bf59625-5f33a88779ab9c4ffa030e79"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 04\] Core Javaâ„¢ 2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5145e77ffd165783-dc302dcd-496d41a4-8cc683b8-cb640e5b5ca95177864b6ef5"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro> \[Cunningham 95\] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e93891f1eb8058c-062f760a-41374313-8cc5b521-a3524920887222bebc606808"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca235674f891d457-6067c794-46894d05-bd1c93a3-129aacb28f05490b0d17931a"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4389c6fb29033d3f-1de4be4d-45304035-84fdb669-3d2047b68706aa4fa31a455d"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2233e8af0bb75a0-940555ba-44334c9a-8af38dfe-297338a493bfd319a3ee8be5"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a569b314b352eb0-79898470-471d45d8-9ae1a2b9-b490ed717bf43abb4c51b297"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro> \[Eclipse 08\] The Eclipse Platform (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fef3ff7eadffb05e-71d1581f-4ec14171-85eab9a0-fb7ed354e773958dd9b9995c"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99c16a01e51f2320-7768fc86-447f41ab-b384837c-e9ca02ceacbde6f23c6c8918"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87d1eb4a02f8c72f-d3d0e13c-408c4eb2-846a8de8-f02cc8f0840895ad8f85971e"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 03\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a93bf5bef735b795-26ec22af-4b5242f6-bf68b3bd-e427082fbf42d8162f709323"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c10774950d6ad42-c5898fca-4bcf4587-9003a17c-f43ec75eef26b722859195cc"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 01\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92f6189e8606b412-b6e22ebc-42b24f93-87138cff-440f9f6d2590b128062d439b"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro> \[FT 08\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23899532164cd5ef-a38bf9f8-42c14cf7-a476b4a3-6c66e9364422d57f58ab8048"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro> \[Gamma 95\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b375bbbca0b9b22-416aaf41-49674927-aa709ecd-c110f9c7760dd3ddf3eed095"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e14aaadd9b048860-9af1d9fa-4957482e-bf628220-853b010a4e270697e940bfa8"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65a35db727ae943c-65ac322a-442f4de1-b77c8d8d-a8aa0db6898c23db5ae51c42"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 91\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b33ed6e083e11b4-38ac759a-45074d53-9e908a8e-1e0c830160475e50694e651e"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73d373b897d66681-e2ebdc8c-4fd047dc-8083886b-73336ac2e7f3b7575fb6e3f3"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 00\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2402a3089f537cd-e749807e-4ab546c5-be0e8282-601faaf07b086f676685dd5c"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37fe0a45ea4fec40-fe7bdf36-4f634b31-b5d785ac-6c11271461757578e7cc0b24"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 05\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae89afbb13e954cb-98f0e8d9-48394867-89af9dad-26f124ac0eaae515242b9914"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 00\] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ef36996597fe40d-7ec321bf-4b9a4085-9e05b6de-0d938989f59791996a37549c"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro> \[Halloway 01\] [Java Developer Connection Tech Tips|http://web.mit.edu/java/JDCNewsletter/JDC-TECH1-01b], January 30, 2001, by Stuart Halloway. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73a4d5136e782058-13ac1d16-4407496b-809dbe28-8839fe6c75fca1b70089af27"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ceb15893263dfcc6-e9992b0f-4f324e89-8fbca700-4b6be0dba61bff4eb2a49586"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 99\] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1368fea07d28ece-47ed2206-48d84691-9d7bbf08-f387c5cc344ca49679570344"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro> \[Henney 03\] [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2bf5521d3868df2-29006ec1-40c6402f-bf0b8d0a-355106feabed77cd66db1071"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro> \[JarSpec 08\] J2SE Documentation version 1.5, Sun Microsystems. [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html] (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff818c1332091da0-6e22880f-4a9c4fa8-bcf4a97e-761323fc55cf9097535c4690"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro> \[Java2NS 99\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2052a37edd56524c-375363ba-41a44b0b-a86590db-88d0b831f7aacc6b9c93a982"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08bdb9bf1f977172-59b62d4c-469c4936-8ba5afea-e7fba17faca843e0707678cf"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 04\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="336bc2e5a61b57ac-fb4ced36-46214b44-81529c8d-5f531de30f87b2e3e3635032"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro> \[JavaThreads 99\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2052d080205e57ba-5d39c0aa-42e44009-b5869b0f-36116ec5750184da95f6340e"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaThreads 04\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3523eab697431cfc-fc20bddb-486e495d-82c2ac65-2cba09e78a28e4bcf6aa46a0"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 08\] [Javaâ„¢ Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], 19 Dec 2008. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20c86787d541b5b6-e508c966-454f4328-92149a7a-f27f059548e45385e59d30bc"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e2842584f88157d-583b2404-45e04d8b-b0219fcc-875c8e2485533f96fa89a947"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro> \[JLS 06\] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8cc2d87f924aa647-ce9fb623-4ac74d3d-875a8b48-c5f6ab859ea3b56a4e3df455"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro> \[JPL 05\] The Javaâ„¢ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ddc0cfd16bbf4bb8-5d399534-48154c4f-8a8fa8bd-f2d95f752637889b9479398d"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 06\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc1ee264d7fe1ca2-95321f9e-4f0e496a-943aad3d-76d432f362faf6a7f9a23021"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 06\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c5bc5f47ae537ec-ed278525-452f4b9f-a439922f-3db620cd70c51d975c26de86"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 06\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80e2bf1a8540e9c1-09812f0e-436a45ae-877baeb2-f779c701812454346b7a6672"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 04\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="996fac3d0f516072-b12a052e-4d904706-95b5a837-d1b262d75c210bf70208e851"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 06\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="273e345fd89dfbb6-f352b2af-41ad4deb-bd1aabe4-da3a635783cac2412c1d6e23"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 99\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c450cbfa12aad51e-01a5f9cb-41e247cf-b29ba938-3eb4a0cdfd29ca371b4ef7d2"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 01\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92e964ec19a300f9-5d1fae5d-49d64c74-889189ad-2e86c4935c8894a669c4b5b0"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9216ff41df8ae8a-fc681b84-45414703-976fa35b-a9359254acb8b7304d5508b4"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro> \[Lai 08\] [Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems|http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4420062] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d788b69033d89ab1-e1190bcc-430147f8-b4f2bf55-3de932ce13ab06d3dfe2091c"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 08\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98964577e6b86b53-374557fe-461741a2-8ae5a375-4b4d1fba6b40ff2aa1d6debd"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12ccf269e36117c3-b7b4d0ff-45a647bb-94ae81f4-e3f9c2914e0d1d8976bec334"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 97\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e9b07fe953a024d-3801adf0-469a491e-ba8f9506-8b2efa72a2d449d61ead0ee0"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 05\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ec8fb936c959328-af737406-454b4183-94688e8d-6b0fcdab4b4abef9a1fb288b"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0eabd3af40ee9fa1-86ec46d4-4a894c9f-b4ef9fc8-cf95a674a241896059b74ef6"><ac:parameter ac:name="">Kalinovsky>Macgregor 04<98</ac:parameter></ac:structured-macro> \[KalinovskyMacgregor 0498\] Java CovertNetwork Java:Security, Techniquesby forRobert DecompilingMacgregor, Dave PatchingDurbin, andJohn ReverseOwlett Engineering,and byAndrew AlexYeomans. Kalinovsky,Prentice SAMSHall. (20041998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bd15076fa22244c-cfc128bd-4cf24e79-94289263-615d50c768d4f90e6da4a1d2"><ac:parameter ac:name="">Macgregor>McCluskey 98<01</ac:parameter></ac:structured-macro> \[MacgregorMcCluskey 9801\] Java NetworkDeveloper Security,Connection byTech Robert MacgregorTips, DaveApril Durbin10, John2001, Owlettby andGlen Andrew Yeomans. Prentice Hall. (1998)McCluskey. |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94dadeb12aaff6a5-05cde306-448d4264-922db11d-df53d343836e5e9e5a732aae"><ac:parameter ac:name="">McCluskey>McGraw 01<99</ac:parameter></ac:structured-macro> \[McCluskeyMcGraw 0100\] Securing Java, DeveloperGetting ConnectionDown Techto Tips,Business Aprilwith 10,Mobile 2001Code, by Glen McCluskey.Gary McGraw and Edward W. Felten. Wiley. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6606434e0addb2fb-58268bcf-4bca44b4-a2e88ad0-9dba973375f36e9f19ac5c52"><ac:parameter ac:name="">McGraw>Mcgraw 99<98</ac:parameter></ac:structured-macro> \[McGrawMcgraw 0098\] Securing[Twelve Java,rules Gettingfor Downdeveloping tomore Businesssecure with Mobile Code, by Gary McGrawJava code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward W. Felten., WileyJavaWorld.com (19991998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1359e8ed531d143f-082ed0a4-4f53482b-88d6a94e-7e0abbb46554cc19f3568737"><ac:parameter ac:name="">Mcgraw>Mocha 98<07</ac:parameter></ac:structured-macro> \[McgrawMocha 9807\] [Twelve rules for developing more secure Java codeMocha, the Java Decompiler|http://www.javaworldbrouhaha.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com (1998~eric/software/mocha/] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e5fbfb60565fb2cb-5c6cbeb2-46ed4b50-bfddabdc-e57330e6dd83e3fef955ffb2"><ac:parameter ac:name="">Mocha>Muchow 07<01</ac:parameter></ac:structured-macro> \[MochaMuchow 0701\] [Mocha,MIDlet thePackaging Javawith DecompilerJ2ME|http://www.brouhahaonjava.com/~eric/software/mocha/] (2007/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="729fe6591e2b6df6-5a17e648-436044f7-9c6a9583-9381e8a9a40b9fa933721c9e"><ac:parameter ac:name="">Muchow>Müller 01<02</ac:parameter></ac:structured-macro> \[MuchowMüller 0102\] [MIDlet PackagingException Handling: Common Problems and Best Practice with J2MEJava 1.4|http://www.old.onjavanetobjectdays.comorg/pubpdf/a02/onjavapapers/2001/04/26/midlet.html], by John W. Muchow (2001industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="568233c7c9be9273-c0244e9a-44e04365-b7d38456-809cc9ad49da39284c3dba04"><ac:parameter ac:name="">Müller>Naftalin 02<06</ac:parameter></ac:structured-macro> \[MüllerNaftalin 0206\] [ExceptionJava Handling: Common Problems Generics and BestCollections, PracticeMaurice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002Naftalin and Philip Wadler, O'Reilly (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9dec9474e110c804-a029a082-47504b57-bab3a173-0ed3863d37911eb442e59e72"><ac:parameter ac:name="">Naftalin>Neward 06<04</ac:parameter></ac:structured-macro> \[NaftalinNeward 0604\] JavaEffective Generics andEnterprise CollectionsJava, Mauriceby NaftalinTed andNeward. Addison PhilipWesley Wadler, O'Reilly (2006Professional. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28d3d071e5b723de-fe7c407f-4ced457e-bf4e8be5-1ad57c1358ec6399d9eb9d7d"><ac:parameter ac:name="">Neward>Nisewanger 04<07</ac:parameter></ac:structured-macro> \[NewardNisewanger 0407\] Effective Enterprise Java[Avoiding Antipatterns, by TedJeff Neward.Nisewanger, Addison Wesley Professional. (2004)JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="924791a76ee18775-00d54fb7-412646aa-8675a57f-b8e99d6045181366ab94bea6"><ac:parameter ac:name="">Nisewanger>Nolan 07<04</ac:parameter></ac:structured-macro> \[NisewangerNolan 0704\] [AvoidingDecompiling AntipatternsJava, by JeffGodfrey NisewangerNolan, JavaOne Conference[Apress|http://developerswww.sunapress.com/learning/javaoneonline/2007/pdf/TS-2594.pdf]]. (20072004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97c997bcee726a01-5bea525a-42d54134-875fa9b7-e81a17ad8c7d1fe41b245c39"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a435920218737f0-407d17a2-48cc419b-89baa592-76e2df26631ac021f99bd7ce"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d2b2278905a6fe3-c47f4785-40a54860-ad75b70a-050bb8214cebff67568d5bad"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro> \[Patterns 02\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71a3815c3cef3de5-403f7428-493e463c-b5738ed8-64c2737c42a1af28ffff870e"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro> \[Phillips 05\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c988dd464d962863-b17b9d8e-44da4c0c-bed4b519-77c79bd48bea04b5b1c22842"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a486288a0b5db8d-3b625899-4bb840ba-9f4ea780-41a1f60b491377258d25f054"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 02\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="275df372f0bddbf6-2b25691b-4ee54464-a0b185f8-c44910cfb49ed74d5b83cc5a"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 06\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e9973347098cec9-f291affe-4f5b4256-b1c893c7-75ebaf25ed1db76cc45c45b8"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e4c1b32e41e1cb9-9e783510-43e44bdd-97d3b0c9-cb86f5d17446e85081fe7004"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 07\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bfdddfeb47def95-b67a7ecb-44224769-b3099b53-d5751555ae40c3a3d78db4ac"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 05\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9443060b0c3fa4d-dc538a74-46ff4c48-878aa029-831780636b9194ffa6365a27"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ce02ee32d342622-84be419c-4c8d4811-a4f88dae-37096fcf95344cde6cc2a5ea"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d82323e244c8e74-ed73f051-476c4d0b-b518bf3f-98b0d6844143b9141955ff76"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 08\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84ed1b568e719a2e-2055492d-47c34bed-aab6b9ad-0c9fb75201394b2949b1a321"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8aaf6170203508b8-24cad40d-43394e01-809e9fe4-45aa3dd50990df69741a567b"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 08\] [SUN Developer Network|http://developers.sun.com/] (1994-2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eed56422ebb986e6-8f63235a-46e24d63-b1d8bd5d-b1646978374c63846836931b"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 07\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b515b649a97369fb-3e22aa5e-45604c39-98bdab25-f41280e950f557d348de669a"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75dfa4c2f66cd506-9edc4bff-436f42b4-82fab77c-70a895f06dc751b2697af52e"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] [http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html][Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler (2003) |