| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aaa4c20976fe4da8-a7b77949-4b224f9f-8dbb85f7-c13b0b6734db1e57be027477"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f77de16fb066c9c-60849dd6-4e574e2c-8d5db2bb-a697235e6c0220fe60ae71a4"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b64977095fad9ce-bbbe9e6d-465c4d03-9f12a9c6-0541e89dcf7ee08d09349e23"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01b8d1cde3ea17ff-c685d9f8-422f4a93-abca932b-99953dc6293de457da658160"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro> \[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1752e1c6a3b1f7a8-c26d6878-49c6448b-8d3aa0df-fe5913c881e359a14cd965cb"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro> \[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9cc737dc7c9e813-281a9fb4-47a24fd6-a90aad0c-8f7e80112647d12d4b19c7bc"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro> \[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="372241dd5db8ff3f-f66e92cf-4a334c88-b605bfec-29caf4f9d37997bbaf31481c"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro> \[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95474cc2d7122e5c-14ecf42b-471a41b6-878091af-00dae6a96e26abbdc805def6"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8a8117fad4d1da7-6edf6aea-499f4c23-83e88692-08879ea86dac714b9968fa66"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f67fe0b3d0970b6a-c4ff62a2-46064790-8a57be3f-65de30245940cedb3116d571"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e8e0aa94aecf4c8-b2935c4b-4b744718-937f99f2-b2c53f606406e9846416cfd0"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c853fc27874cec7-9b073a53-4755400c-8b84b57b-20f6cc4886ef8a61936cbf05"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72c79141813796ed-e4fb5049-463b43a1-bb9bb3d5-fdc0de8a98fc66f74340889f"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro> \[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14320eb35fbcccd5-02466ffc-4d7a46d5-ad50a748-4e336739d4d5d2a891edd93b"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro> \[JNI 97\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56d597789337530c-80af37dc-4193400a-88818730-c8b4cc974ec8293887a9e1e9"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> \[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b680a2070fe6dbaa-7aeffb52-483c4f0a-a1288891-0e5f73fb7c02371f1a659264"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a4b3f9e1662ea82-4773a8f4-4cf14f06-b55fb7a3-07aeff3139c5e442688737cb"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db5f3e5ef312cb9c-b5140727-43ae4344-b6859a3d-6b1aacc88ea6e7718c529249"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5e998815fa574e9-428eb3d1-4c474df9-ae1b8bf5-d1e958b193a5d93c0437a10a"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48c53f1138129b96-29e82f21-49474b98-b4448116-f796c6a76790f40fd5e34db7"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro> \[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aaa92b0cc955d54b-2ee77621-47b24479-a4069129-e63e7bf8291ff240ec679926"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro> \[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d802b8e359b6fab9-ab25e7fc-4d3742c1-a9cbbe9d-ee09514b514168f29864ab9f"><ac:parameter ac:name="">SecArch>SCG 06<07</ac:parameter></ac:structured-macro> \[SecArchSCG 0607\] [Secure Coding Guidelines for the Java 2Programming PlatformLanguage, Securityversion Architecture2.0|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.docseccodeguide.html] (20062007) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7314261b2684d81-6f765ee5-45394a4f-bb528c42-12943bd5af7ed1bcdf8155d4"><ac:parameter ac:name="">Secrets>SecArch 97<06</ac:parameter></ac:structured-macro> \[SecretsSecArch 9706\] [Java Secrets2 byPlatform Elliotte Rusty Harold. Wiley. (1997Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a35984896daccee6-053c57bc-484c4771-b627bb25-4a5c04d2de06cce4a772ff7b"><ac:parameter ac:name="">Security>Secrets 06<97</ac:parameter></ac:structured-macro> \[SecuritySecrets 0697\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006 Secrets by Elliotte Rusty Harold. Wiley. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="408176f3992913dd-02f29967-485646c4-826c999f-cce5d8a78e173f8be4daf219"><ac:parameter ac:name="">SCG>Security 07<06</ac:parameter></ac:structured-macro> \[SCGSecurity 0706\] [Secure Coding Guidelines for the Java Programming Language, version 2.0Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/seccodeguide.html] (20072006) |