| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a378ceb7c03bfd5-a8980042-442a4eb7-b7c58844-703e1e0a3566ff2903e066e4"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4265e2386862497-e90621d4-41ff46d5-93759af2-18eb16046e1c2187ae9f1362"><ac:parameter ac:name="">Bloch 05<01</ac:parameter></ac:structured-macro> \[Bloch 05\01] Javaâ„¢ Puzzlers: TrapsEffective Java, Pitfalls,Programming andLanguage Corner CasesGuide, by Joshua Bloch and Neal Gafter. Pearson Education, IncAddison Wesley. (20052001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f65e4521b3905900-94f1c83b-42c342dd-9149a746-a07c81964847ddc85840a2be"><ac:parameter ac:name="">Bloch 08<05</ac:parameter></ac:structured-macro> \[Bloch 0805\] Effective Java, 2nd editionJavaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Addison WesleyInc. (20082005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="624a819cd7f9f243-f548591b-4a564ce0-820c8178-ca763d4b5ab7de3fec2d148f"><ac:parameter ac:name="">Campione>Bloch 96<08</ac:parameter></ac:structured-macro> \[CampioneBloch 9608\] [TheEffective Java, 2nd Tutorialedition, by MaryJoshua CampioneBloch, and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996Addison Wesley. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d46c610d9f3546b5-dfa492ef-49f5431a-b560b22e-6e1da83abba2837496f2a364"><ac:parameter ac:name="">Chan>Campione 99<96</ac:parameter></ac:structured-macro> \[ChanCampione 9996\] [The Java ClassTutorial, Libraries:by SupplementMary forCampione theand Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f053ccb4ef26b039-f0f94a1e-475b44c2-b143bf5e-63b499ec37c3d4d97f33836e"><ac:parameter ac:name="">Concurrency>Chan 06<99</ac:parameter></ac:structured-macro> \[ConcurrencyChan 0699\] The Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006 Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ddaf90d70f88a8e-d8081689-4c86499b-90a1b7d9-baf5895a143f404c3298b1be"><ac:parameter ac:name="">Cookbook>Daconta 04<03</ac:parameter></ac:structured-macro> \[CookbookDaconta 0403\] More Java CookbookPitfalls, by Ian F. Darwin (2004 Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d044cbad8dd3cebe-08d80493-4f444e93-946fa48d-8acebd360453e8efffcd9a23"><ac:parameter ac:name="">Doshi>Darwin 03<04</ac:parameter></ac:structured-macro> \[DoshiDarwin 0304\] [BestJava PracticesCookbook, forby Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003Ian F. Darwin (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2880b11a21ea3c49-bb2337ee-493c4f10-84e8abf4-78fbf470a9fc47f8aced788c"><ac:parameter ac:name="">EJPLG>Doshi 01<03</ac:parameter></ac:structured-macro> \[EJPLGDoshi 0103\] Effective[Best Java,Practices Programmingfor Language Guide,Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Joshua Block. Addison WesleyGunjan Doshi. (20012003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20d9e411778bbcde-6af22a08-41324ecb-9ba4a969-05680242ccbfd1b09faed98e"><ac:parameter ac:name="">EJS>Enterprise 04<03</ac:parameter></ac:structured-macro> \[EJSEnterprise 0403\] Enterprise Java Security:Enterprise Building Secure J2EE ApplicationsBest Practices, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004the O'Reilly Java Authors. O'Reilly. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="300290155a1712a6-e47ca6d0-4d6c4086-9573a9a3-dbfbeb58055f89e4d41b4bdd"><ac:parameter ac:name="">Enterprise>FindBugs 03<08</ac:parameter></ac:structured-macro> \[EnterpriseFindBugs 0308\] Java[FindBugs Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62eaf291c9f8e132-c5af3c05-4df24f56-865183f8-8b94c420ef43759ec5be6aa3"><ac:parameter ac:name="">FindBugs>Garms 08<01</ac:parameter></ac:structured-macro> \[FindBugsGarms 0801\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008 Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39fa23cfaebb48b0-47613189-4b484756-9fcaa5a5-fe5a509256aeb78addc37ff3"><ac:parameter ac:name="">Garms>Gong 01<03</ac:parameter></ac:structured-macro> \[GarmsGong 0103\] ProfessionalInside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, JessGary GarmsEllison, and DanielMary SomerfieldDageforde. Prentice Hall, WroxThe PressJava LtdSeries. (20012003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63020c479d2f417f-dd42e365-4bcb47aa-aa59b9f8-d77c05e398fb7fc6b21adc6f"><ac:parameter ac:name="">Gong>Green 03<08</ac:parameter></ac:structured-macro> \[GongGreen 0308\] Inside[Canadian Mind Products Java 2& PlatformInternet Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
| unmigrated-unmigrated-wiki-markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d95746f11a6c8d6e-852df12a-42c34747-b838905f-f2d3773b1d857076f339a578"><ac:parameter ac:name="">Green>Goetz 08<06</ac:parameter></ac:structured-macro> \[GreenGoetz 0806\] [CanadianJava MindConcurrency Productsin JavaPractice, &by Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="920dd518da43fa61-2f0cb715-468d4020-9577a4b3-a33852bab295eed689f5179c"><ac:parameter ac:name="">J2SE>Harold 00<97</ac:parameter></ac:structured-macro> \[J2SEHarold 0097\] JavaTMJava 2Secrets SDK,by StandardElliotte Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000Rusty Harold. Wiley. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5c564986fcb1512-982dce04-4fb746ef-80e290b5-c059369b3f18e9aa18d6f364"><ac:parameter ac:name="">JLS>Harold 05<99</ac:parameter></ac:structured-macro> \[JLSHarold 0599\] Java Language Specification, 3rd edition.I/O, by JamesElliote Gosling,Rusty Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.Harold. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2afe0a97-e9f0-44ef-9e4a-31f497653b5f"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/books/jls/index.htmlguide/] (20052000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2858d716cb90d498-f0fce46f-4a3148c7-8917a535-3dca6647d7a31bdeadf1a7b0"><ac:parameter ac:name="">IO>JLS 99<05</ac:parameter></ac:structured-macro> \[JavaJLS I/O05\] Java Language I/OSpecification, by3rd Ellioteedition. Rusty Harold. O'REILLY. (1999)by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac: |
| Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6da3e6b581dc3454-8e3bcd5e-457b4971-a6bb8001-13bb57f1fb050fb419d9a7c3"><ac:parameter ac:name="">JNI>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[JNIKalinovsky 9704\] The Javaâ„¢ Native Interface, Programmer's Guide and SpecificationCovert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by ShengAlex LiangKalinovsky. SAMS ADDISON-WESLEYPublishing. (19972004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70ce5ce08885b66f-a05b41bb-493f4bf2-971c96d5-a389f8697e642e20ad8a07df"><ac:parameter ac:name="">JNS>Lea 98<00</ac:parameter></ac:structured-macro> \[JNSLea 9800\] Concurrent Programming in Java, Network2nd Securityedition, by RobertDoug Macgregor,Lea. DaveAddison DurbinWesley, John Owlett and Andrew Yeomans. Prentice Hall. (1998Sun Microsystems. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07e593f8f23a6c82-4312dae5-495747d9-b3bbbd90-86b42be5a80981f5d51a3245"><ac:parameter ac:name="">Kalinovsky>Liang 04<97</ac:parameter></ac:structured-macro> \[KalinovskyLiang 0497\] CovertThe Java:Javaâ„¢ TechniquesNative for Decompiling, Patching,Interface, Programmer's Guide and Reverse EngineeringSpecification, by AlexSheng KalinovskyLiang. SAMS PublishingADDISON-WESLEY. (20041997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44ffa5f3d20fad13-76c622eb-42d84511-8f1badae-edd9171c2d8c1b48d10e2eed"><ac:parameter ac:name="">Lea>Low 00<97</ac:parameter></ac:structured-macro> \[LeaLow 0097\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000[Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b0fa931cd219878-8254ab9b-4ffa4d7f-9f5a802b-409212ea4f5f67d32641f33d"><ac:parameter ac:name="">Low>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[LowKalinovsky 9704\] [ProtectingCovert Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="847e7549b5692898-78dde464-4ce948ab-bff989a3-b6bcef77e95d534320f7490c"><ac:parameter ac:name="">Kalinovsky>McGraw 04<99</ac:parameter></ac:structured-macro> \[KalinovskyMcGraw 0400\] CovertSecuring Java:, TechniquesGetting forDown Decompiling,to Patching,Business andwith ReverseMobile EngineeringCode, by Alex Kalinovsky, SAMSGary McGraw and Edward W. Felten. Wiley. (20041999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad2df86517daec59-94d83c9b-48d249c9-9411b8f0-d46d6d92758baef51f2cbca6"><ac:parameter ac:name="">McGraw>Macgregor 99<98</ac:parameter></ac:structured-macro> \[McGrawMacgregor 0098\] Securing Java, GettingNetwork DownSecurity, toby BusinessRobert withMacgregor, MobileDave CodeDurbin, byJohn GaryOwlett McGraw and EdwardAndrew WYeomans. Felten.Prentice WileyHall. (19991998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="771639befe4b3306-f40c0a73-4c8a4543-9912bd76-e0e632697e8ec377eabfa599"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e043f91ea1d223f3-9e433183-4db54b30-87f39d35-92029df3636c71393705df67"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32954d0da22351a7-f01a68a2-45234cf4-82e8815b-166fda22cae54b04c6d3622d"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0192a1b3a56ecf3-02ea7a8e-4588438b-ad0eb081-4ee009fd96c344972e8695c0"><ac:parameter ac:name="">Patterns>Pistoia 05<04</ac:parameter></ac:structured-macro> \[PatternsPistoia 0504\] CoreEnterprise Java Security Patterns: BestBuilding PracticesSecure and Strategies for J2EEâ„¢J2EE Applications, Webby Services, and Identity ManagementMarco Pistoia, byNataraj Christopher SteelNagaratnam, RameshLarry NagappanKoved and RayAnthony LaiNadalin. Prentice Hall PTR / Sun MicrosAddison Wesley. (20052004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26e9c85f642676a5-9b61c12a-4c934689-97da9fb0-5ad34ed21731159203e6c25f"><ac:parameter ac:name="">Pitfalls>SCG 03<07</ac:parameter></ac:structured-macro> \[PitfallsSCG 0307\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003[Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8649d7a49fea2bb5-56bf6d37-49e24b51-92c3bf5d-f9d48d1cb2ef7f1aaeedd814"><ac:parameter ac:name="">SCG>SecArch 07<06</ac:parameter></ac:structured-macro> \[SCGSecArch 0706\] [Secure Coding Guidelines for the Java Programming2 Language,Platform versionSecurity 2.0Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/seccodeguide/spec/security-spec.doc.html] (20072006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36b73b1a4ff58874-2a2956ba-4e8c48a9-88c08918-289829b6c723bc6a4677d3f4"><ac:parameter ac:name="">SecArch>Security 06</ac:parameter></ac:structured-macro> \[SecArchSecurity 06\] [Java 2 Platform Security ArchitectureGuides|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="586c28f1799f712d-49bd84a4-4e4b4064-8744902a-5ae81a34e6fd59a130a999b4"><ac:parameter ac:name="">Secrets>Steel 97<05</ac:parameter></ac:structured-macro> \[SecretsSteel 9705\] JavaCore SecretsSecurity byPatterns: ElliotteBest RustyPractices Harold.and Wiley. (1997) |
| Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc856afd-ef20-4ddc-b1c7-408c9cfc62c9"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d349adad3bcfe219-c69181d6-4f9a477f-8116974c-7dd74657ac9183c6cfe1e197"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |