[Apache 2014] Apache Tika: A Content Analysis Toolkit. The Apache Software Foundation (2014). [API
20112006]
Java Platform, Standard Edition 7 6 API Specification. , Oracle (
20112006).
[API 2011] Java Platform, Standard Edition 7 API Specification, Oracle (2011). [API 2014] Java Platform, Standard Edition 8 API Specification, Oracle (2014 [Black 2004] Black, Paul E., and Paul J. Tanenbaum. "Partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).
| Anchor |
|---|
| Arnold 06 |
|---|
| Arnold 06 | Bloch 01 | Bloch 01 |
|---|
|
[
Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Arnold 2006] Ken Arnold, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed., Boston: Addison-Wesley (
20012006).
[Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005ASVS 2019] OWASP Application Security Verification Standard Project (2019).| Anchor |
|---|
| Black 04 |
|---|
| Black 04 | Bloch 08 | Bloch 08 |
|---|
|
[
Bloch 2008Black 2004]
BlochBlack,
JoshuaPaul E.
Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008, and Paul J. Tanenbaum. "Partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).
| Anchor |
|---|
| Bloch 01 |
|---|
| Bloch 01 | Campione 96 | Campione 96 |
|---|
|
[
Campione 1996Bloch 2001]
Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MABloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (
19962001).
| Anchor |
|---|
| Bloch 05 |
|---|
| Bloch 05 | Chan 99 | Chan 99 |
|---|
|
[
Chan 1999Bloch 2005]
ChanBloch,
PatrickJoshua,
Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ:
Prentice Hall (1999Addison-Wesley (2005).
| Anchor |
|---|
| Bloch 08 |
|---|
| Bloch 08 | Cohen 81 | Cohen 81 |
|---|
|
[
Cohen 1981Bloch 2008]
CohenBloch,
D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48–54 (1981Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).
| Anchor |
|---|
| Campione 96 |
|---|
| Campione 96 | Conventions 09 | Conventions 09 |
|---|
|
[
Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).
| Anchor |
|---|
| Chan 99 |
|---|
| Chan 99 | Coomes 07 | Coomes 07 |
|---|
|
[
Coomes 2007Chan 1999]
CoomesChan,
JohnPatrick,
Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).
| Anchor |
|---|
Core Java 04 | Core Java 04 |
[Core Java 2004] Horstmann, Cay S., and Gary Cornell. Core Java™ 2, Vol. I: Fundamentals, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48–54 (1981).
| Anchor |
|---|
| Conventions 09 |
|---|
| Conventions 09 | Coverity 07 | Coverity 07 |
|---|
|
[
Coverity 2007] Coverity Prevent User's Manual (3.3.0). Coverity (2007Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009).
| Anchor |
|---|
| Coomes 07 |
|---|
| Coomes 07 | Daconta 03 | Daconta 03 |
|---|
|
[
Daconta 2003Coomes 2007]
DacontaCoomes,
Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls. Indianapolis: Wiley (2003John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).
[Davis 2008] Davis, Mark, and Ken Whistler. Unicode Standard Annex #15: Unicode Normalization Forms (2008 [Core Java 2004] Horstmann, Cay S., and Gary Cornell. Core Java™ 2, Vol. I: Fundamentals, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).
| Anchor |
|---|
| Coverity 07 |
|---|
| Coverity 07 | Dennis 1966 | Dennis 1966 |
|---|
|
[
Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155 (1966). doi: 10.1145/365230.365252.| Anchor |
|---|
Dougherty 2009 | Dougherty 2009 | [Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).| Anchor |
|---|
ESA 05 | ESA 05 | [ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005).| Anchor |
|---|
FindBugs 08 | FindBugs 08 | [FindBugs 2008] FindBugs Bug Descriptions (2008/2011).| Anchor |
|---|
Flanagan 05 | Flanagan 05 | [Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005).| Anchor |
|---|
Fortify 08 | Fortify 08 | [Fortify 2008] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2011).| Anchor |
|---|
GNU 13 | GNU 13 | [GNU 2013] GNU Coding Standards, §5.3, "Clean Use of C Constructs." (GNU Coding Standards were written by Richard Stallman and other GNU Project volunteers.) (2013).| Anchor |
|---|
Goetz 04 | Goetz 04 | [Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).| Anchor |
|---|
Goetz 06 | Goetz 06 | [Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional (2006).| Anchor |
|---|
Goetz 07 | Goetz 07 | [Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2006).| Anchor |
|---|
Gong 03 | Gong 03 | [Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003).| Anchor |
|---|
Goodliffe 06 | Goodliffe 06 | [Goodliffe 2006] Pete Goodliffe. Code Craft: The Practice of Writing Excellent Code. San Francisco: No Starch Press (2006).| Anchor |
|---|
Grand 02 | Grand 02 | [Grand 2002] Grand, Mark. Patterns in Java, Vol. 1, 2nd ed. New York: Wiley (2002).| Anchor |
|---|
Grubb 13 | Grubb 13 | [Grubb 2013] Penny Grubb, and Armstrong A. Takang. Software Maintenance Concepts and Practice, 2nd ed. River Edge, NJ: World Scientific (2013). | Anchor |
|---|
Guillardoy 12 | Guillardoy 12 | [Guillardoy 2012] Guillardoy, Esteban (Immunity Products). Java 0-day analysis (CVE-2012-4681) (August 28, 2012).| Anchor |
|---|
Hatton 95 | Hatton 95 | [Hatton 1995] Hatton, Les. Safer C: Developing Software for High-Integrity and Safety-Critical Systems. New York: McGraw-Hill, 1995 (ISBN 0-07-707640-0).| Anchor |
|---|
Havelund 10 | Havelund 10 | [Havelund 2010] Klaus Havelund, and Al Niessner. JPL Coding Standard, Version 1.1 (January 25, 2010) | Anchor |
|---|
Hawtin 06 | Hawtin 06 | [Hawtin 2006] Hawtin, Thomas. [drlvm][kernel_classes] ThreadLocal vulnerability. MarkMail (2006).| Anchor |
|---|
Hirondelle 13 | Hirondelle 13 | [Hirondelle 2013] Hirondelle Systems. Passwords Never Clear in Text (2013).| Anchor |
|---|
JLS 11 | JLS 11 | [JLS 2011] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2011).| Anchor |
|---|
Jovanovic 06 | Jovanovic 06 | [Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258–263, May 21–24, Oakland, CA (2006).| Anchor |
|---|
JPL 06 | JPL 06 | [JPL 2006] Arnold, Ken, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed. Reading, MA: Addison-Wesley Professional (2006).| Anchor |
|---|
JVMSpec 99 | JVMSpec 99 | [JVMSpec 1999] The Java Virtual Machine Specification. Oracle (1999).| Anchor |
|---|
JVMSpec 13 | JVMSpec 13 | [JVMSpec 2013] The Java Virtual Machine Specification Java SE 7 Edition. Oracle (2013).| Anchor |
|---|
Kabanov 09 | Kabanov 09 | [Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009).| Anchor |
|---|
Kalinovsky 04 | Kalinovsky 04 | [Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004).| Anchor |
|---|
Knoernschild 01 | Knoernschild 01 | [Knoernschild 2001] Knoernschild, Kirk. Java™ Design: Objects, UML, and Process. Boston: Addison-Wesley Professional (2001).| Anchor |
|---|
Lea 00 | Lea 00 | [Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Reading, MA: Addison-Wesley (2000).| Anchor |
|---|
Lo 05 | Lo 05 | [Lo 2005] Lo, Chia-Tien Dan, Witawas Srisa-an, and J. Morris Chang. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October).| Anchor |
|---|
Long 11 | Long 11 | [Long 2011] Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and David SvobodaCoverity 2007] Coverity Prevent User's Manual (3.3.0). Coverity (2007).[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls: 50 New Time-Saving Solutions and Workarounds. Indianapolis, IN: Wiley (2003). [Davis 2008] Davis, Mark, and Ken Whistler (Ed.). Unicode Standard Annex #15: Unicode Normalization Forms (2008). [Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155 (1966). doi: 10.1145/365230.365252.| Anchor |
|---|
| Dougherty 2009 |
|---|
| Dougherty 2009 |
|---|
|
[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).[ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005). [FindBugs 2008] FindBugs Bug Descriptions (2008/2011). [Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005). [Fortify 2014] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2014).[GNU 2013] GNU Coding Standards, §5.3, "Clean Use of C Constructs." Richard Stallman and other GNU Project volunteers (2013). [Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Boston: Addison-Wesley Professional (2006). [Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2007). [Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Boston: Addison-Wesley (2003).
[Goodliffe 2007] Pete Goodliffe. Code Craft: The Practice of Writing Excellent Code. San Francisco: No Starch Press (2007). [Grand 2002] Grand, Mark. Patterns in Java, Vol. 1: A Catalog of Reusable Design Patterns Illustrated with UML, 2nd ed. Indianapolis, IN: Wiley (2002).[Grubb 2003] Penny Grubb, and Armstrong A. Takang. Software Maintenance Concepts and Practice, 2nd ed. River Edge, NJ: World Scientific (2003). | Anchor |
|---|
| Guillardoy 12 |
|---|
| Guillardoy 12 |
|---|
|
[Guillardoy 2012] Guillardoy, Esteban. Java 0-day Analysis (CVE-2012-4681) (2012).[Hatton 1995] Hatton, Les. Safer C: Developing Software for High-Integrity and Safety-Critical Systems. New York: McGraw-Hill (1995).[Havelund 2009] Havelund, Klaus, and Al Niessner. JPL Coding Standard, Version 1.1 (2009) [Hawtin 2006] Hawtin, Thomas. [drlvm][kernel_classes] ThreadLocal Vulnerability. MarkMail (2006).| Anchor |
|---|
| Hirondelle 13 |
|---|
| Hirondelle 13 |
|---|
|
[Hirondelle 2013] Hirondelle Systems. Passwords Never Clear in Text (2013). [ISO/IEC 9126-1:2001] Software Engineering—Product Quality—Part 1, Quality Model (ISO/IEC 9126-1:2001). Geneva, Switzerland: International Organization for Standardization (2001). [ISO/IEC 24765:2010] Systems and Software Engineering—Vocabulary (ISO/IEC 24765:2010). Geneva, Switzerland: International Organization for Standardization (2010). [JLS 2013] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2013).| Anchor |
|---|
| Jovanovic 06 |
|---|
| Jovanovic 06 |
|---|
|
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258–263, May 21–24, Oakland, CA (2006). [JPL 2006] Arnold, Ken, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed. Reading, MA: Addison-Wesley Professional (2006).[JVMSpec 1999] The Java Virtual Machine Specification. Sun Microsystems (1999). [JVMSpec 2013] The Java Virtual Machine Specification: Java SE 7 Edition. Oracle America (2013). [Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009).| Anchor |
|---|
| Kalinovsky 04 |
|---|
| Kalinovsky 04 |
|---|
|
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004).| Anchor |
|---|
| Knoernschild 02 |
|---|
| Knoernschild 02 |
|---|
|
[Knoernschild 2002] Knoernschild, Kirk. Java™ Design: Objects, UML, and Process. Boston: Addison-Wesley Professional (2002).[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Boston: Addison-Wesley (2000). [Lo 2005] Lo, Chia-Tien Dan, Witawas Srisa-an, and J. Morris Chang. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October). [Long 2012] Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and David Svoboda. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Boston: Addison-Wesley (2012).[Manion 2013] Manion, Art. Anatomy of Java Exploits, CERT/CC Blog (January 15, 2013).[Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57–62 (1996).[McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code, 2nd ed. New York: Wiley (1999). [Mettler 2010] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI: 10.1145/1814217.1814224, 2010. [Miller 2009] Miller, Alex. Java™ Platform Concurrency Gotchas. JavaOne Conference (2009). [Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74–88 (1992). [NIST 2017] NIST Special Publication 800-63 (2017).[Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001). [Oracle 2008] Permissions in the Java™ SE 6 Development Kit (JDK). Oracle (2008). [Oracle 2010a] Java SE 6 HotSpot™ Virtual Machine Garbage Collection Tuning. Oracle (2010). [Oracle 2010b] New I/O APIs. Oracle (2010). [Oracle 2011a] Java PKI Programmer's Guide, Oracle, 2011. [Oracle 2011b] Java Platform™, Standard Edition 6 Documentation, Oracle, 2011. [Oracle 2011c] Package javax.servelt.http, Oracle 2011. [Oracle 2011d. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011).| Anchor |
|---|
Manion 13 | Manion 13 | [Manion 2013] Manion, Art. Anatomy of Java Exploits, CERT/CC Blog (January 15, 2013).| Anchor |
|---|
Martin 96 | Martin 96 | [Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57–62 (1996).| Anchor |
|---|
McGraw 99 | McGraw 99 | [McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code. New York: Wiley (1999).| Anchor |
|---|
Mettler 10 | Mettler 10 | [Mettler 2010] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, doi: 10.1145/1814217.1814224, 2010.| Anchor |
|---|
Miller 09 | Miller 09 | [Miller 2009] Miller, Alex. Java™ Platform Concurrency Gotchas. JavaOne Conference (2009).| Anchor |
|---|
Netzer 92 | Netzer 92 | [Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74–88 (1992).| Anchor |
|---|
Oaks 01 | Oaks 01 | [Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001).| Anchor |
|---|
Oracle 08 | Oracle 08 | [Oracle 2008]
Permissions in the Java™ SE 6 Development Kit (JDK). Oracle (2008), Oracle, 2011.
| Anchor |
|---|
| Oracle 10a12a |
|---|
| Oracle 10a12a |
|---|
|
[Oracle
2010a] Java SE 6 HotSpot™ Virtual Machine Garbage Collection Tuning2012a] API for Privileged Blocks. Oracle (
20101993/2012).
| Anchor |
|---|
| Oracle 10b12b |
|---|
| Oracle 10b12b |
|---|
|
[Oracle
2010b] New I/O APIs2012b] "Reading ASCII Passwords from an InputStream Example," Java Cryptography Architecture (JCA) Reference Guide. Oracle (
20102012).
[Oracle
2011] Package javax.servlet.http2012c] Java Platform Standard Edition 7 Documentation. Oracle (
20112012).
| Anchor |
|---|
| Oracle 12a13a |
|---|
| Oracle 12a13a |
|---|
|
[Oracle
2012a2013a]
API for Privileged Blocks. , Oracle
(, 1993/
2012)2013.
| Anchor |
|---|
| Oracle 12b13b |
|---|
| Oracle 12b13b |
|---|
|
[Oracle
2012b2013b]
" Reading ASCII Passwords from an InputStream Example,
" Java Cryptography Architecture (JCA) Reference Guide. Oracle (2012), Oracle, 2013.
| Anchor |
|---|
| Oracle 12c13c |
|---|
| Oracle 12c13c |
|---|
|
[Oracle
2012c2013c]
Java Platform Standard Edition 7 Documentation, Oracle, 2013.
Oracle (2012). [Oracle
20132013d]
Oracle Security Alert for CVE-2013-0422. , Oracle
(, 2013
).
[OWASP 2005] OWASP (Open Web Application Security Project).
A Guide to Building Secure Web Applications and Web Services (2005).
[OWASP 2008] OWASP.
Open Web Application Security Project homepage (2008).
[OWASP 2009] OWASP. Session Fixation in Java (2009). [OWASP 2011] OWASP.
Cross-site Scripting (XSS) (2011).
[OWASP 2012] OWASP. "Why Add Salt?" Hashing Java (2012). [OWASP
20122013] OWASP.
Hashing Java, "Why Add Salt?" (2012 OWASP Guide Project (2011).
[Paar 20092010] Paar, Christof, and Jan Pelzl. Understanding Cryptography, : A Textbook for Students and Practitioners (companion . New York: Springer (2009). (Companion website contains online cryptography course that covers hash functions).Berlin: Springer (2009) .
[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin.
Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004).
[Policy
20022010]
Default Policy Implementation and Policy File Syntax, Document revision 1.6,
Sun Microsystems/ Oracle (
2002/2010).
[Reddy 2000]
Reddy, Achut
Reddy.
Java Coding Style Guide. (2000).
[Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz.
The Elements of Java Style. New York: Cambridge University Press (2000).
...
[Seacord
20082009] Seacord, Robert C.
The CERT C Secure Coding Standard. Boston: Addison-Wesley (
20082009).
[Seacord 2012] Seacord, Robert, Will Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch.
Source Code Analysis Laboratory (SCALe) (CMU/SEI-2012-TN-013). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2012.
http://www.sei.cmu.edu/library/abstracts/reports/12tn013.cfm.
...
| Anchor |
|---|
| SecuritySpec 08 |
|---|
| SecuritySpec 08 |
|---|
|
| Anchor |
|---|
| SecuritySpec 10 |
|---|
| SecuritySpec 10 |
|---|
|
[SecuritySpec
20082010]
Java Security Architecture. Oracle (
2008/2010).
[Sen 2007] Sen, Robi.
Avoid the Dangers of XPath Injection. IBM developerWorks (2007).
...
[Steinberg
20052008] Steinberg, Daniel H.
Java Developer Connection Tech Tips: Using the Varargs Language Feature.
(2005, January 4 Java Developer Connection Tech Tips (2008).
[Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai.
Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006).
...
[Tools 2011]
JDK Tools and Utilities Specification. Oracle (2011)
..| Anchor |
|---|
| Tutorials 0813 |
|---|
| Tutorials 0813 |
|---|
|
[Tutorials
20082013]
The Java Tutorials. Oracle (
20082013).
[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by
The Unicode Standard, Version 5.2. Mountain View, CA: The Unicode Consortium (2009).
[Unicode 2013] The Unicode Consortium. The Unicode Standard, Version 6.2.0, defined by
Unicode 6.2.0. Mountain View, CA: The Unicode Consortium (2013). [Vermeulen 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).[Viega 2005] Viega, John.
CLASP Reference Guide, Volume 1.1. Secure Software
, (2005
).
[W3C 2003]
The World Wide Web Security FAQ. World Wide Web Consortium (W3C) (2003).
...
[White 2003] White, Tom.
Memoization in Java Using Dynamic Proxy Classes. O'Reilly onJava.com (
August 20, 2003).
[Zadegan 2009] Zadegan, Bryant.
A Lesson on Infinite Loops (2009).