Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7faa02e8112f9623-f99aca5e-44f547b0-ad569c20-14d67c4e203ab2464e35723b"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70d0e61224ffdfac-e60b2175-42ac458c-9852b7d4-558fd2b6cb1b0a0f39630643"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
\[Austin 00\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="107b9d436d5370ec-d7bf0ad8-40da488f-8632973c-d9d3f738cb9433b867f1842a"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
\[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a56df8f82c676c5b-272de37a-4f5a4148-8fcaa3b1-75563c8aba4f243093d62d42"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d71ee3f74b74c89-b3f60dbd-41084e57-8c33975a-671a972dc691c76d05ecc8be"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e90d41b2a2d39a3e-cc791dc5-48fd4df3-a9f09079-2c7de961bbabd2cb22a39055"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="715e43cb4009f637-0f2a89e8-4b15413a-88bc954e-bed94e3b1817debc324222cc"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77888b721880f550-4ebdbf5c-471342ad-bcdc914d-2811e0aca32b45d6691119af"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
\[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com.  (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcdb061520412ab4-2d5332d1-473e4279-8aad911f-a82cd15a754ed0d7b58a0d25"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
\[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40209ae837ea4e99-17ddbf4d-45db4e42-ae9ab542-2a43ec2cf01137efd8f3ea41"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
\[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47066e75066022f1-e49decc0-416a4b81-bacb9fde-9b788676286c961d866f651c"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
\[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1242f383e5d6dd02-6a3483c0-422b4b5d-ba2d965c-d1fe7e7350bf1787746618a4"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e476fd1c77f7a1ff-1ace6d94-456140cc-a9bda390-6da6fc2571517ce48061b79f"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
\[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56695cfdd3922301-7d53d38c-416244e1-9668b22b-1f52751e543aa0c9c8dbf7d4"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
\[Fisher 03\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0179b61f2dab538-b11772b7-4bce4697-9fe389aa-dae8d156b5ee5f108046ce2e"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
\[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d513e7db264e9071-ebc755e9-486e408c-82db82a6-2aa3499f6c657b4d4f7203d1"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e1552e943ba7181-4cf98a43-49f64da6-b65894c6-4c04fe92e8a25e1e203f7a27"><ac:parameter ac:name="">Gong>Goetz 03<06</ac:parameter></ac:structured-macro>
\[GongGoetz 0306\] Inside Java 2Concurrency Platformin Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ac44cb2-fa18-4af1-bfa2-23a0daef59a3"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5028322fa7d6833c-038ed98d-47d24801-82beb274-032e4c2840dffa6ee21e4c3e"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
\[Greanier 00\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f57fca63898243e5-a1460185-497a46ac-869ca1ff-b609abc34375f3fd124cce20"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
\[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7646bd26e7d6d47f-1cb006dc-49e447c8-a9209100-0b3d7f6cc45ff9835450aa34"><ac:parameter ac:name="">Goetz>Gupta 06<05</ac:parameter></ac:structured-macro>
\[GoetzGupta 06\] Java Concurrency in Practice05\] [Java memory leaks -- Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by BrianSatish Goetz,Chandra TimGupta Peierls,and Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley ProfessionalRajeev Palanki. (20062005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ee45d929bfa9bfc-3ac497d5-4e844604-8c5496bd-c9a2b80706411c061ebad5a2"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
\[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8981b90c55462603-06ec5f49-4feb44db-8e6c9c90-1c1d25e306a63e222abd7c7b"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
\[Harold 99\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11b72d6df428697c-af0fe1d6-478d49c7-b3aa9db4-fcb49bba4bad81d3a1b51799"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c57e1aaa27cbc5c9-072c72e2-43b24cac-b9ffaef7-8735d3db8f3e45d5e02963d0"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2284a264c2e697a3-f80d5172-43f143a6-80ac8885-6db5d56a5301255de5260928"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
\[JLS 06\] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2962b528736497f9-0a490951-48a3413c-ae7583d0-fef7e102897f2958a80ce05c"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
\[Kabutz 01\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d416fdc81a5c1379-985fed7e-443f42c4-b695bfc1-e371237be40846c9a6e3fb1b"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8533c8a8253d839c-185eefd8-46bf4a9e-a24c8a3b-284ce2db19f06b4633c1250a"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daf94afaa54be57b-7bd5109c-44ac4609-a4648791-52c80c9768a2aef5ac9b6a4b"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
\[Liang 97\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6080ad16ec564349-53561975-48304e65-a434a355-43d3b8cfe3ab030eb3dec6f9"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
\[Long 05\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e025ab6715c1ab1-4db52a98-49bf4f60-b3c794b7-fdcb14652b426b59bcd2aa25"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
\[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a9ad04f84525728-5d20141c-4cdf4fdb-97848f6f-9e63173c5f0f149853aafcf1"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0ce9a732ae53bbc-0f2ca02a-46394bfa-b6eb85f7-fc7b22640b98b1613dec0882"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea9092703198cf95-cacfd7b6-4efb4b05-acb7af4c-621f61ecfe5d91682ba69504"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> 
\[Macgregor 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abb10873ddcea937-ab4bd726-4b1a4df6-963dbe88-fae2016aa115ec900f139159"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7c97444b5f97f0d-dd765a1a-40774e37-914b8181-385c26501e4ba6145a022ce6"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
\[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1ae1c3fbcc49c38-1a45820e-4e574a97-81ebb57a-94b6a91326e7952c9b0b5788"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9426e223b2a3798-7626b7b0-437c4029-b62593d6-894fce5b897dba2bfc8247c6"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
\[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82cfa06ba3550bb9-5bd067f1-415e439b-b0559a42-9c6069a0dfe6feda11fa7d26"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
\[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="170c0d5536107f61-23ed8192-456a4027-91e7b045-02ab1bf08172d266abbcb453"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="580cafa9894f93c7-4e90a682-4c364849-af3ca319-80d8587838238e062af97349"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cdedfe8fe6530b54-96bd30f5-4ca14ce9-8251a392-cf220d760ae4e7705369f263"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
\[Seacord 05\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2352dbacab7fbb6-bbd90cb2-40a74a0e-8bf39272-edb970351834f07093423264"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05dd8c11f1c31523-ed9acf77-43e34ba6-8c93a99f-0b75995e24568057a9dcb9fb"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
\[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7a21ccd5bbb0bb0-634ad561-42eb4bda-8246b5e3-ab4fbc7e4fb0a70379c53ffb"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
\[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008)