Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0aac23496777f9df-58e89d26-4ac34d9f-b40aa032-bd817c4b9dd45b59df7f357c"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac035ad026ae8ae3-0b32fde2-441a4e18-9c3ba919-0aea0c656ca59c06820d2930"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e88a887b0d7333d-a7b251ec-47ec4cea-a909b047-54f813cc7e0b61b6fa696428"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3fe412537c65741-b75f9fdc-44d04ef2-918ab10a-85a6f1bf80130d8e3952dec1"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd202a5c0a38de5c-55291d8f-4c45488f-b072b302-8ba2701166f5a090a5a4c386"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da065aa56cadcd6f-8aebb1a3-46be4254-9405aa05-d476c43e873ffa8600b94e7f"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
\[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39db81c213010243-64120eb2-4aad4546-874ab8a6-1f78d44bd7362306a104eb40"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
\[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ff3db777bcb4d0d-404af092-4d214396-86f9aa27-8cf93250b59f16765073ebca"><ac:parameter ac:name="">EJPLG>Doshi 01<03</ac:parameter></ac:structured-macro>
\[EJPLGDoshi 0103\] Effective[Best Java,Practices Programmingfor Language Guide, by Joshua Block. Addison Wesley. (2001Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c6e54b2fca0c18a-5f5303a0-40c6448d-a22eaf42-2c3a6d1427a83e12a277ab69"><ac:parameter ac:name="">EJS>EJPLG 04<01</ac:parameter></ac:structured-macro>
\[EJSEJPLG 04\01] EnterpriseEffective Java, Security:Programming Building Secure J2EE ApplicationsLanguage Guide, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony NadalinJoshua Block. Addison Wesley. (20042001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="418c5953b6cc8bd8-4bf7e3b9-48b34018-a4f0a2c6-d72b6be12fcaf0ac45c4c64b"><ac:parameter ac:name="">Enterprise>EJS 03<04</ac:parameter></ac:structured-macro>
\[EnterpriseEJS 0304\] Enterprise Java Enterprise Best Practices Security: Building Secure J2EE Applications, by the O'Reilly Java Authors. O'Reilly. (2003Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2127f68c6601ca15-fc4f21c3-474e49b1-8b0b9f2f-fe0303a5feb6ec7bebe8f4b8"><ac:parameter ac:name="">Garms>Enterprise 01<03</ac:parameter></ac:structured-macro>
\[GarmsEnterprise 0103\] ProfessionalJava Enterprise JavaBest SecurityPractices, by Jessthe GarmsO'Reilly andJava Daniel Somerfield. Wrox Press Ltd. (2001Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b31405ac457a7d5b-dc71305b-43b942b5-8eacb19e-46a3786301aaab06762fa03b"><ac:parameter ac:name="">Gong>Garms 03<01</ac:parameter></ac:structured-macro>
\[GongGarms 0301\] InsideProfessional Java 2 Platform Security:, Architecture,by APIJess Design,Garms and Implementation,Daniel 2ndSomerfield. edition,Wrox byPress Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9796e36759036083-1545fa7d-473f46ae-a5bb9fcf-83c283f7399db93da3328d35"><ac:parameter ac:name="">J2SE>Gong 00<03</ac:parameter></ac:structured-macro>
\[J2SEGong 0003\] Inside JavaTMJava 2 SDK,Platform Standard Edition DocumentationSecurity: Architecture, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff03aa5b-faed-42f8-a726-b2792b4cd37d"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dcbf3c62-6874-40b5-9541-85c031bdd4c3"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b2b1e2a-7ebd-46cf-81f0-a8685ce8612e"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a94d148ba52ee83-5398da0f-48424f68-8da2bb99-2b5f05f3c62a41ed1ef767d5"><ac:parameter ac:name="">JLS>JNI 05<97</ac:parameter></ac:structured-macro>
\[JLSJNI 0597\] JavaThe LanguageJavaâ„¢ Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a81293e39e9033c-885a7d14-42814e7e-90a4a973-8900453bd8ff2d6632ea7e47"><ac:parameter ac:name="">IO>JNS 99<98</ac:parameter></ac:structured-macro> 
\[JNS 98\] Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999 Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c4aed47048344bf-aa531e54-4c0c4aa6-b7338ff4-85b3d5dfcd3a0aef25bf2477"><ac:parameter ac:name="">JNI>Kalinovsky 97<04</ac:parameter></ac:structured-macro>
\[JNIKalinovsky 9704\] Covert TheJava: Javaâ„¢Techniques Nativefor InterfaceDecompiling, Programmer's Guide Patching, and Reverse SpecificationEngineering, by ShengAlex LiangKalinovsky. SAMS ADDISON-WESLEYPublishing. (19972004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14ce07b5e2567461-9bb9d44c-48414c8c-bd93be8e-d751ee9eeb0c431fb6de43fd"><ac:parameter ac:name="">JNS>Lea 98<00</ac:parameter></ac:structured-macro> 
\[JNSLea 9800\] JavaConcurrent NetworkProgramming Security, by Robert Macgregorin Java, Dave2nd Durbinedition, Johnby OwlettDoug andLea. AndrewAddison Yeomans.Wesley, PrenticeSun HallMicrosystems. (19982000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c228351d50a6432a-4fc5e71a-481f4fc6-b9ec8960-5e6a0a8f1ac28e7623b25fb7"><ac:parameter ac:name="">Kalinovsky>Low 04<97</ac:parameter></ac:structured-macro>
\[KalinovskyLow 0497\] Covert[Protecting Java: TechniquesCode for Decompiling, Patching, and Reverse Engineeringvia Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by AlexDouglas KalinovskyLow. SAMS Publishing. (20041997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63f7220776999253-6d2f6884-480d4e18-89c5a864-f5e6c21948ab9402e6a6540e"><ac:parameter ac:name="">Lea>Kalinovsky 00<04</ac:parameter></ac:structured-macro>
\[LeaKalinovsky 0004\] Covert Java: ConcurrentTechniques Programmingfor inDecompiling, JavaPatching, and 2ndReverse editionEngineering, by Doug Lea. Addison Wesley, Sun MicrosystemsAlex Kalinovsky, SAMS. (20002004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="769641cfda164e98-be326259-49b54bb7-90f98a05-73792e1cbc85518be1b9bafc"><ac:parameter ac:name="">Low>McGraw 97<99</ac:parameter></ac:structured-macro>
\[LowMcGraw 9700\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997 Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78077e9be48ebffc-d79fe8af-4476406a-8153bbc9-00f8cbf274830681cbbcc16b"><ac:parameter ac:name="">Kalinovsky>Mocha 04<07</ac:parameter></ac:structured-macro>
\[KalinovskyMocha 0407\] Covert Java: Techniques for Decompiling[Mocha, Patching,the and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49b12d4c7a72d5a5-b7c4e243-4902493a-a90689b7-d8b3dbdd83251472fda5199e"><ac:parameter ac:name="">McGraw>Müller 99<02</ac:parameter></ac:structured-macro>
\[McGrawMüller 0002\] [Exception SecuringHandling: Java,Common GettingProblems Downand toBest BusinessPractice with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4790a2b8b6dc3ce3-545f08f2-45fc437d-91b59434-991e24d21df32cb3bdd88ae0"><ac:parameter ac:name="">Mocha>Oaks 07<01</ac:parameter></ac:structured-macro>
\[MochaOaks 0701\] Java [MochaSecurity, theby Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03534593140f57b7-cd79e084-477a4d18-8aaaa372-809eb38bc8b5457c6236c9b1"><ac:parameter ac:name="">Oaks>Patterns 01<05</ac:parameter></ac:structured-macro>
\[OaksPatterns 01\] Java Security, by Scott Oaks. O'REILLY. (200105\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54e1c42cb3a87e55-5927b577-49dc4159-974f917c-c02ba46b941e5fcbc535459d"><ac:parameter ac:name="">Patterns>Pitfalls 05<03</ac:parameter></ac:structured-macro>
\[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bfcecb512a5d68f-74291c9f-49104962-ac899138-a041c6f3ef7552e328f33585"><ac:parameter ac:name="">Pitfalls>SCG 03<07</ac:parameter></ac:structured-macro>
\[PitfallsSCG 0307\] [Secure MoreCoding JavaGuidelines Pitfalls,for bythe MichaelJava C.Programming DacontaLanguage, Kevinversion T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (20032.0|http://java.sun.com/security/seccodeguide.html] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6405e3c090cd86c1-3ea9a40c-46754b76-b7a1a2e8-291d7fc855873838cf66c18a"><ac:parameter ac:name="">SCG>SecArch 07<06</ac:parameter></ac:structured-macro>
\[SCGSecArch 0706\] [Secure Coding Guidelines for the Java Programming2 Language,Platform versionSecurity 2.0Architecture|http://java.sun.com/javase/6/docs/technotes/java.sun.comguides/security/seccodeguide/spec/security-spec.doc.html] (20072006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72223629f36732cb-2426bf66-4fed4b47-a16ab87a-bf5a742d9d30b618bef30416"><ac:parameter ac:name="">SecArch>Secrets 06<97</ac:parameter></ac:structured-macro>
\[SecArchSecrets 0697\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="330969e4112005cd-7079b8c5-422e40b9-8a6aa6e9-43a17061ad75546456ec1070"><ac:parameter ac:name="">Secrets>Security 97<06</ac:parameter></ac:structured-macro>
\[SecretsSecurity 9706\] [Java Secrets by Elliotte Rusty Harold. Wiley. (1997Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d140a581ea7523ea-5c2f8691-409640a0-92719dce-7fd37776bb4f8f1ff4837366"><ac:parameter ac:name="">Security>Tutorials 06<08</ac:parameter></ac:structured-macro>
\[SecurityTutorials 0608\] [The Java Security GuidesTutorials|http://java.sun.com/javase/6/docs/technotesbooks/guides/security/tutorial/index.html] (20062008)