You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 37 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01ca3a39-2f87-4975-b5c8-35b612b89254"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32eedb16-dbed-4cbe-8266-945b12bffd54"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b710a8d-fb76-4824-ab83-d7b61a0d626a"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdde6a68-a9c1-4f4c-9995-7107f8efb5c3"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a42f92ad-554f-43e4-91bf-d4d7689b53f1"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a00a114-f0f8-45c1-8017-54fe7a089db6"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e6d8c6b-4f6d-432c-8b34-e1db42642757"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="271d99d5-a394-4323-a580-6d76c730d957"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't, by Michael C. Daconta, JavaWorld.com. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f972d45c-d9b2-4a34-8e69-4ce70d9634db"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2e62917-cfa9-45dc-9555-2a0faeb4dd04"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5fd598ba-283c-40b1-ad1f-77395ec80f1e"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19129bb5-13dd-4c73-bfef-efe4b5d88194"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a41f91b0-0ea1-4bdd-a21a-daddb446c018"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53f4052c-f3d2-47e6-8004-62f7c1df7964"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b709999a-ba89-4fc9-85ef-2d810f37d6a7"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="189b566b-7e89-4639-a9ce-c90653afd905"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="124457b9-7961-4da1-a8ed-deea31c1d1f4"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfc2d667-a038-4f56-a018-cd88834d1567"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80f7988b-e63a-4f4d-97c8-e6def51b6748"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49deedc1-9b3c-45df-9f08-ab23372a2794"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API, by Todd Greanier, Sun Developer Network (SDN). (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd378f6d-0dd8-4b20-b9da-bacd0ee756f5"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32297862-3af2-49a7-b538-a76013432a04"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks – Catch me if you can, by Satish Chandra Gupta and Rajeev Palanki. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d72f3553-2a23-4828-bcec-ed4c8cf6ba3b"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08f15f62-cab3-4cd5-aebb-dbe63f4b81b1"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62a54051-055b-4efc-b369-59d1ce68bf56"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3459a713-34ea-481b-9485-9111d3788d38"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01833628-f1df-4369-a928-2f7a1c168b1c"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9daf211c-3e4c-4e05-8060-e470f1b74d49"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e1c8957-ec27-4b76-9b94-f58971c97bb4"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f071788-0f97-4457-8190-e0f62507bab0"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b61d3ec-2422-4266-bc63-27e9b845e095"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA), Sun Microsystems, Inc. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9d2ed8b-24fd-4288-8384-4034bc8b4dd9"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI), Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9960393-0706-4959-acd4-d7ad94cfddff"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18f675a6-9b14-4404-8999-7290e9bfa431"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3046364-bce9-467d-ba5f-7931fee91257"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58065a7c-d40f-46d8-ba2d-ac5237e94af0"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7c3fb14-a298-4ab1-90e0-e89fd6e57674"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java, by Fred Long, CMU/SEI-2005-TN-044. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60a7771a-7d48-40c9-88a4-fa3c01558e8f"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13162768-e568-4728-8af6-59e28d96ddf7"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd57aa41-c84a-4a9e-a771-e76093d85ad6"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfc0d9fc-cb3e-40bd-aa0f-4f7de9c87035"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55bfb9b2-9953-4e0c-a027-9387fb196367"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a87fd3d-0521-4f81-a980-ec9cd7138d07"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="717c83f5-87ae-4600-b57d-886710e33579"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9e8e759-d492-4149-9434-9c4098c4013f"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c126dd90-94e8-4dd5-bf3a-ab0ec7009a3e"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4abd298f-ea2f-4349-b605-dcd0743ba4f8"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems, Inc. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36cb1382-3d97-4e9d-b152-f2cfc649e7b6"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8d2ea48-eeeb-456c-b093-2f163abf553f"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b35243f1-ee6a-4408-992e-e78592d1d025"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bbbdc587-488f-4b9f-a484-ab8f30598501"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9474122c-d04f-4f95-8480-366a2dbdb0ef"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8856dea-ded9-459b-86db-1fe688d0aaef"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a58fdf08-f0ea-4874-8a86-7edf476626fc"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)

  • No labels