| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94ea7259f22de446-63079909-4d6c4fe6-b6eb9f5d-781e7b56f4cbf5b626c586d3"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d6496dc6335befe-5843682e-4c8944be-bef58ef9-6c23955bd050cc3ff85854d0"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Javaâ„¢ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e96d0e2-2697-40b1-a635-3fb26ef0524c"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a239268066d4d8c5-c91e054b-40a340a5-bdb6883a-2bd71991a79ec0d350fd72dc"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro> \[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09dbf55994aebef3-1c5f8b1c-41594df9-9340ac95-d0a0cd255eaf35d4d36d3761"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro> \[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7fa6595d11ca51f-94f75f3a-416a43b0-8131a0a2-655b4d3a5d543d57a9c17c2c"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro> \[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e207ef4131ce0158-d26ae0f3-48084f55-93788463-a1c9c0f4b303c2a361d5f08b"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro> \[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f01e32237277a1e5-b502bf76-4dfe486d-87abb897-df22d0dfb7a482ffcd1a2ff2"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2277c1549a08c417-f6cf47e4-423b4fc8-8ce2b6d3-3e11b8af30f46970a634ce8b"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b704436b3480635-2825f803-4e6947eb-a1869478-ea6985c1e113ccb8dfcbe219"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="746a68b9a2d21890-0c3dd5d7-418a4fa0-a703b00f-120d6fd84fd4394ec1e96412"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="142089c8654ad9d4-1704ff95-454246f3-85e08e74-4f47446363492f780b0880ee"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4d920bc25ccfae9-ff6a7399-46bd40ad-b5ac97b3-b7038b9d86d539557d0c9cf6"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro> \[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36e67dc88ec7bba8-39fe190e-4f474cf6-84baa69c-3d88c2f7ed152312e526f8c8"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro> \[JNI 97\] The Javaâ„¢ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e49f8f9fff929763-91937bc4-467b4a2f-83dab578-0397f0371fa857149e9b17f1"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> \[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd5304d8b3f15cb1-21a4c76b-4ad14b80-95d59985-ede33d91180516d0b023a510"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d82803b8266761b4-c081f459-4acf49fb-a5818675-be953be38c43bc21960c5ce8"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7cd36297b4185a14-a5a17372-4c8241ca-8a9e8ad6-32f7b4467e9ce0d9081e36a6"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f73304f0e2df9464-c181b636-4d7f431f-b79b83c9-3f2f613b69184ede91e0b8a9"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39dc09e08f279ef5-11aaded9-407747ef-95cfada4-76300b2ad8d172da883ba7ca"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro> \[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ„¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50b2888c939303a4-eb78d639-401144aa-ac4b8f55-778bfd5c8edde9f2cfdd3ee8"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro> \[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a21c4030e2c0115-6cf2a580-405740b4-b0a6b539-8f910c3001d19343b39ee8e0"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bf7951caf63947a-9d3e7654-4e66414d-8486aab7-070130d88a04a335e2ba446e"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro> \[Secrets 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
| Wiki Markup |
|---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c202fa69771f743-e65f3d9e-428f4668-b00aa84f-79ee93ecbffe57f749f04f50"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |