<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf5846a8-b33d-4da2-99b2-7afda5a3623d"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a3090ee-dd18-4cd8-b5e1-15abf1c83a52"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41b0ce25-b5c7-46bb-88a4-1a5ea0345369"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
[API 2011] Java Platform, Standard Edition 7 API Specification
, Oracle, Inc. (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd8a357d-3112-44df-9ba7-77f9de60c2d8"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Advanced Programming for the Java 2 Platform
, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4056cd93-533b-4adf-b36d-88a585aa783f"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Paul E. Black and Paul J. Tanenbaum, "partial order", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 17 December 2004. (accessed TODAY) Available from: http://www.itl.nist.gov/div897/sqg/dads/HTML/partialorder.html![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97d84c2e-cb60-4b5a-b157-708c7fe9d509"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Paul E. Black and Paul J. Tanenbaum, "total order", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 30 March 2006. (accessed TODAY) Available from: http://www.itl.nist.gov/div897/sqg/dads/HTML/totalorder.html![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2a1d083-b172-40be-9b0e-0d5418b383b7"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10e6ea17-db2d-4df6-9b7c-ea595b8e591d"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ba3dc68-87e2-47f9-8bf2-ddd66e9aaac0"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Yet More Programming Puzzlers
, by Joshua Bloch and Neal Gafter. JavaOne Conference. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d9dd8c2-12c1-40ec-85fc-5a1482e0194b"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Effective Java⢠Reloaded: This Time It's (not) for Real
, by Joshua Bloch. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6099a0f7-a39f-4af9-86ee-02dc83196975"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8687532-deb1-42f8-8fc2-59fb19901087"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
[Bloch 2009] Return of the Puzzlers: Schlock and Awe
, by Joshua Bloch, Google Inc. and Neal Gafter, Microsoft Corporation. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb071937-fd9a-434a-a111-68d9f0b33463"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Finalization, Threads, and the Java⢠Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c26a8c68-c760-4376-922a-13649917d58e"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] The Java Tutorial, by Mary Campione and Kathy Walrath
(1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92c7a251-7cf3-40df-aae0-082051a97188"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="128e5a6d-97aa-4347-bc16-813832493cfb"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7dfd749-d566-4d5c-af91-4f08635028cf"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db295d5f-7cec-4eee-83f0-12a0d00c9cc2"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Internals of Java Class Loading
, ONJava. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d72ec0e6-37be-401f-a5ed-43e9c3851ff1"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] On Holy Wars and a Plea for Peace
, IEEE Computer, vol. 14 issue 10 (1981)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9e37470-c435-4ef0-89f8-027b8133d5c7"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
. Sun Microsystems, Inc. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bebad498-4692-4e9f-90b6-1e523e23bd1e"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 2008] Common Vulnerability Exposure, MITRE Corporation. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c79eeb66-84ee-490f-aaf4-3381c6cd8f3d"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] Garbage Collection-Friendly Programming
by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79412f8c-b667-4e75-a95d-82a492758475"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f67ea36-982b-4de2-86ef-325968d2ad0a"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54ae7040-aa2e-4044-aa59-27656ce255a7"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] When Runtime.exec() won't
, by Michael C. Daconta, JavaWorld.com. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3a3821e-e2f8-4993-ae6b-e32129e4211a"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4322d864-cafd-4c9f-9107-131f6960ac76"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="356687f6-eae2-475d-a549-7e45a5498fb3"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008] Unicode Standard Annex #15, Unicode Normalization Forms
, by Mark Davis and Martin Dürst. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3a55344-4747-412a-b7dc-91b0508edab3"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Unicode Technical Report #36, Unicode Security Considerations
, by Mark Davis and Michel Suignard. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23bbb720-c1cc-41c2-b0b2-404570a30d15"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn. 1966. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (March 1966), 143-155. DOI=10.1145/365230.365252 http://doi.acm.org/10.1145/365230.365252![]()
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="424a92d9-5f74-4e20-8e38-1d7ddead4951"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] U.S. Department of Homeland Security. Build Security In
.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72c33161-a679-444e-927e-4878fb00f2e6"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Signed Java Applet Security: Worse than ActiveX?
, by Will Dormann. CERT Vulnerability Analysis Blog. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="faebed12-f672-4f99-841c-2b998b97b9ca"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Best Practices for Exception Handling
by Gunjan Doshi. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad9e9151-e0fd-467d-a7f3-f3c8f378cb64"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, Kazuya Togashi. Secure Design Patterns
. CMU/SEI-2009-TR-010. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e11de22-702c-4844-ae3a-a0aa25d2b02d"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9b2cb01-4c9e-47ef-a8e0-f033aa5495aa"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a56edb68-b752-4810-aedd-e457f5e88449"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11fe5a01-5606-4bcb-adda-6eacadcaf936"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards
, prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf6ee6ae-d95b-41c6-83ff-ae4c1b42b9ae"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58dd2d8b-35cf-4316-b984-2d1cd8bb932d"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b7bb58d-abb4-4480-bad0-f2155ffe429c"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9de3acd-a73d-4890-a02a-ab8cf1688675"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1e4cbcc-c287-4c19-933b-48e2818a2879"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security
Java/JSP, Fortify Software. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec2ae0e5-347b-4ac8-81ad-986e4aa02c18"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a9d8864-e9e5-4abf-9ba3-b40d7b0935ea"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d3fb0f3-4b50-4281-b930-bedb46116224"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Gafter's blog
, by Neal Gafter's. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b37ac448-003e-440d-a98f-c9b2ae4f76cc"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="012e23c8-f0c2-42c0-bef1-510c047bb6a9"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18991c69-be05-46fd-bfd7-b4ba6af40291"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Java theory and practice: Don't let the "this" reference escape during construction
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66f24ece-2417-4fdb-87d3-fcf5d3eff1d6"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004] Java theory and practice: Garbage collection and performance
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d216779-2c5a-4458-a7f4-2551a4d0e21a"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Java theory and practice: The exceptions debate: To check, or not to check?
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae0961c3-4341-48d8-9fb8-5af60281a8c9"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Java theory and practice: Going atomic
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0abdd642-1cfd-4c2d-9d02-5bc618564c21"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005] Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="859cfbbe-c1d8-4ca3-a7b1-27f11557937b"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Java theory and practice: Plugging memory leaks with weak references
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5f123a5-55a3-480e-99c0-d97570fcdf48"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4cc022d-8fd9-49c1-bb14-424faaf23eeb"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Java theory and practice: Good housekeeping practices
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50a0bb09-e7ad-454d-9e3c-e8383657f89c"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Java theory and practice: Managing volatility, Guidelines for using volatile variables
, by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology). (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6de38679-c67a-47a1-b02a-4356ec1dc037"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic
. Sun Microsystems, Inc. March 1991. (1991)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f74eee33-f9a1-4a7d-abe0-5e6e90a55846"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="efa377f8-bcc9-4a08-8a38-826ea4192be1"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9631d81-dd9a-40bf-b9fc-5174cdf000e6"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Discover the secrets of the Java Serialization API
, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f2eb261-449e-44b8-aaad-15baa19c673f"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Canadian Mind Products Java & Internet Glossary
by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="708c3993-5064-48f2-82e0-50e4e9de72cf"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Reflection On Inner Classes
by Jeffery Grigg. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1b38aa6-2d34-45e6-8c9a-b6feb0764016"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] Java RMI
, by William Grosso. O'Reilly. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ea8330f-5586-4a76-9d49-d5ec54a2b142"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Java memory leaks - Catch me if you can
, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae2b0701-b67d-4de1-9d89-5decf24533d9"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Immutable Objects in Java
, by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aea4972f-743d-45a0-ac6c-a0095d2f6d24"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Practical Java⢠Programming Language Guide, by Peter Haggar. Addison-Wesley Professional. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e17fc9f9-96f3-424f-a476-5a49d7d0e326"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Java Developer Connection Tech Tips
, March 28, 2000, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f96622db-ee4f-42ad-8018-0771bf7ebed2"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Java Developer Connection Tech Tips
, January 30, 2001, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="907238ef-3eb5-48a7-87cf-7d2a2ce62cb8"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="089f63f0-38c7-4d91-b566-9929159856da"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="572d6dd0-b8cd-486b-957d-e78427dfe0b4"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cd6d9b7-0568-4465-b36f-77496ad932f2"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f6233ff-0fbc-47a8-bfac-f6a3f05f01f3"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Null Object, Something for Nothing
, by Kevlin Henney (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1c57d6a-c963-4d2e-a7cd-be12b9fcce33"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Java⢠NIO, by Ron Hitchens. O'Reilly. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04155857-535c-416d-80a2-117b207c69da"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Advanced Java⢠Globalization
, by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e055f502-7911-4303-a7a9-11c28390184c"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] Finding more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07a2fd04-fa2d-4148-8dce-bd93dbb7aecb"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] Java's reliability: an analysis of software defects in Java, by J. Hunt and F. Long. Software IEE Proceedings. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab7af676-7360-4048-a9b9-6edabd849702"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdf1c744-d626-4536-93a1-e227fcfeee39"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE. Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dde8cc56-1df2-488a-bb18-9eaf923de8db"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. J2SE Documentation version 1.3
, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76833130-b7c2-4e4b-9885-6130b6682255"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f73ab859-91d2-433c-b40a-81e71e10a0e5"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] java - the Java application launcher
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54c4a0bb-16d1-44ba-81b8-3b2426aa4019"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec40e3c3-9f9c-4aea-8990-5891f5610d83"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html
], Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b73d5d5-a87d-4402-87a0-affe0dccf90f"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82c23ab3-b8f4-4cd2-ad1e-04fc4410f137"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac8cb420-b78c-4fec-b9f0-5c173e5874de"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 documentation
, Sun Microsystems, Inc., 19 Dec 2008. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8abf6ca-8dc1-45ba-a112-a62a313bed42"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification.
(2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe7de69a-2a7f-4ce6-ac12-2d26a4ada897"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
[JLS 2011] Java Language Specification: Java SE 7 Edition. by James Gosling, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Oracle America, Inc. The Java Language Specification.
(2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51d29a46-31ee-4d5c-a8e3-a86494794105"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b35b387-0cb9-4a63-be7a-f3710c127479"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cde77f64-f7a2-44e5-9747-115c837fee3b"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f007d5d-99d3-4255-b41b-16365a52df65"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d93ffc66-7ab9-48b0-b3ba-4a3110731a91"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7811eec-523a-40d3-b7d9-387aac1b7f68"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d061a2fb-5700-479e-98a9-07181b1d83ab"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: JavaTM Memory Model and Thread Specification
. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59100cf8-3efd-413d-8c51-2c97722f4106"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80ae55c7-adb4-4c85-b8fc-e5602c9e721d"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55927f64-1514-41fe-a0f4-bcd36d70e602"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] The Ultimate Java Puzzler
by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b51a5477-2395-4614-b75c-a53da8e65937"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ea0caf5-c7c8-486d-99c4-1d8122c04b47"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3c05ebd-814c-4837-91d5-a70d75b8dc7d"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Java⢠Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001)
[Lai 2008] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c58174db-b182-4b12-9adf-e515dca90745"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html
, Angelica Langer. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9fac9fb-6b2d-43a1-803b-90a7c9efe7b4"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb125048-7555-40dc-95fe-6608a54c5912"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Correct and Efficient Synchronization of Java⢠Technology based Threads
, by Doug Lea and William Pugh. JavaOne Conference. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f843e2e-35c4-4f04-90c8-e127280eb38d"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] The JSR-133 Cookbook for Compiler Writers
, by Doug Lea. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62fa19c1-be61-4417-a763-7460d6f67911"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Robust and Scalable Concurrent Programming: Lessons from the Trenches
, by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b824654-40ae-44e5-80ba-690797ced355"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b748d31-ecb8-4ac7-8477-985be52cd88e"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Dynamic Class Loading in the Java⢠Virtual Machine
, by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1b3b206-2761-4500-b416-7020c4ef70f6"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Using prototypical objects to implement shared behavior in object-oriented systems
. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bdafc9a1-6ad4-4d25-9fbf-fb268d84961f"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Security Issues in Garbage Collection
, by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4257043b-9005-49be-a0dc-a487cbe9cedd"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Software Vulnerabilities in Java
, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dec89364-48f4-488d-b5e8-0c6123dad4eb"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
[Long 2011] The CERT Oracle Secure Coding Standard for Java, by Fred Long, Dhruv Mohindra, Robert C. Seacord and Dean F. Sutherland, Addison-Wesley, SEI Series in Software Engineering. (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02465602-3371-4270-a42d-7cd87e8489ff"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Protecting Java Code via Obfuscation
, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8110f62-67a7-43e0-874f-fb5623430a04"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 1998] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0c14629-7780-4a57-9ed5-c6a44139d723"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Compressing and Decompressing Data Using Java APIs
, by Qusay H. Mahmoud. Oracle. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f78b765a-043c-4f65-acfc-0d33baa9df31"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66743e68-7ce3-4689-92cd-b361b6e74f70"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] JSR 133 (Java Memory Model) FAQ
, by Jeremy Manson and Brian Goetz. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d4533fc-1332-424c-a0db-4773c9dc41d5"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] The Java⢠Memory Model: the building block of concurrency
, by Jeremy Manson and William Pugh, JavaOne Conference. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cbcccea-8d30-406c-928f-7f870f2b04e6"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Granularity
, by Robert C. Martin. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ecd163f-85bc-40a0-9a8b-c4d92ba45a56"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="660af6f6-8fcd-45fb-8689-858384d20b7c"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f393563a-d3f3-4756-b93a-2068834cab23"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Twelve rules for developing more secure Java code
, Gary McGraw and Edward Felten, JavaWorld.com. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e548095-b957-44b8-b461-b3d99d69d0df"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Java⢠Platform Concurrency Gotchas
, by Alex Miller, Terracotta. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f14d7147-6b69-48d6-92a1-c78dd5345582"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
[MITRE 2009] Common Weakness Enumeration
, MITRE Corporation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6db14d18-0747-41b2-9997-5435214bd380"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="708bca66-0499-4da2-9d9f-f02279388783"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Ruining Security with java.util.Random
Version 1.0, by Jan P. Monsch. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a1dd4b5-30ce-449b-b6c9-7572f620ff0d"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Using SQL Escape Sequences
, Microsoft Corporation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cae6f644-ed93-4eee-a4d3-ceccbc915df5"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] MIDlet Packaging with J2ME
, by John W. Muchow (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01c130d3-1380-41d1-800e-4babcd43e080"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Exception Handling: Common Problems and Best Practice with Java 1.4
by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2b5bcbd-26a4-4325-8ffd-04788f61f6ba"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29803154-dfca-49ce-9ee2-5cc1cd0cc91d"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Java⢠Generics and Collections: Tools for Productivity
, by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6934d61-02dd-4833-ade7-0890e3fbee98"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] What Are Race Conditions? Some Issues and Formalization
, by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin — Madison. (1992)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc213dc4-a9ec-4af9-b3ba-b73150cac7bb"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="caf37a2f-af8b-4c0b-9d3b-c9702183e7a8"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b261fffa-d6b8-4d42-b3f8-0efb6b986173"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Decompiling Java, by Godfrey Nolan, Apress
. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="faa576a5-77d2-45cd-b396-04ba3d1ea1ca"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ecf3169-b47d-49a8-9859-33407e9a73a8"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning
, Oracle Corporation. (2010)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43037b90-ea1c-4da1-b936-a7932611037b"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] A Guide to Building Secure Web Applications and Web Services
. The Open Web Application Security Project. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f77d6b7-d9b8-456a-93d4-5353b0b1960b"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] OWASP TOP 10 FOR JAVA EE
. The Open Web Application Security Project. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08a321ed-2f7a-46c7-acc2-5a557f6debe4"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 2008] OWASP
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65691138-10fc-4079-8e76-0473b9374ef2"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff4d2cbe-60be-4450-9db9-3ed5932033db"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Beware the dangers of generic Exceptions
, by Paul Philion, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42fbdd1b-b9e8-4a2f-9778-f2db24e85e31"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Are We Counting Bytes Yet?
at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8309cd9d-53a4-4d14-8357-6f5bf61b9589"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="405d092e-b4ba-4ba2-95a2-a659c15c7eb1"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Default Policy Implementation and Policy File Syntax
, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f272cb13-a8cb-4618-ade5-76a92d27b60d"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] The Java Memory Model (discussions reference)
by William Pugh, Univ. of Maryland. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d78d2efe-bf45-4a0c-9658-c4f4dbbb7d54"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] Defective Java Code: Turning WTF Code into a Learning Experience
, by William Pugh, Univ. of Maryland. JavaOne Conference. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9913b2f-637e-4256-83e2-2bc8adb357cf"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] Defective Java Code: Mistakes That Matter
, by William Pugh, Univ. of Maryland. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a77eec61-0c8f-4872-b305-1d8270a0d297"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, Reasoning. 14 Nov 2003. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="925f9fd0-b1d4-4bf0-bfec-b306ff6f30e8"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Reflection
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56fa760e-7cd2-4252-b185-7a838331b826"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] The Elements of Java Style
, by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c35da137-cff9-425f-a071-3cb6769afeec"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Fallacies of Distributed Computing Explained
, by Arnon Rotem-Gal-Oz. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="666c2df9-5a46-4b08-b2b0-167bfa350cda"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003] Breaking Java exception-handling rules is easy
, by Vladimir Roubtsov, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6530970-495c-469a-b410-a77a06505e8f"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Into the mist of serialization myths
, by Vladimir Roubtsov, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c158611e-b58d-45fc-9639-8a46125d3cba"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b11025a-fe8c-4969-acec-bdc01557d85e"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." Proceedings of the IEEE 63, 9 (September 1975): 1278-1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="522553ff-22e0-431f-8b5e-1a39236c628f"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="561c89ac-34b6-4e8f-b367-fcfe0fecb275"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0
, Sun Microsystems, Inc. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b0b9917-df52-46cb-9816-e69b2a8260ca"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37b76ff4-b0be-4a5c-aa51-7639b544da44"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d10b0bf-8544-47ac-8b08-49c77da59214"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
[Schoenefeld 2004] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d9faeaa-7737-4fc8-9af9-215869b52bdc"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Avoiding Checked Exceptions
, by Don Schwarz, ONJava (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca8e78db-b562-4c46-96e5-33cb8b4910fe"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Java Tip 134: When catching exceptions, don't cast your net too wide
, by Dave Schweisguth. Javaworld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e08ebfd6-b358-4df5-ac97-701bdbb0479b"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] SUN Developer Network
, Sun Microsystems, Inc. (1994-2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33066cf4-7131-424b-a17d-5e6ec073dc66"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
See http://www.cert.org/books/secure-coding
for news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e51f44b-5c9d-4650-8b7a-69c86e0629f3"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Java 2 Platform Security Architecture
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b455d146-e72b-4965-bd2e-0e8d7112181d"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daa88428-966c-4a17-bcb2-3c1afc63d787"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c6d0797-52f8-48e3-8813-c6cc5cfc8455"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Avoid the dangers of XPath injection
, by Robi Sen, IBM developerWorks. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4769db5-f460-408f-afeb-8d878c8f4a23"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87f913eb-4a2c-4c0a-a426-e5ef6365342b"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] Steele, G. L. "Arithmetic shifting considered harmful
." SIGPLAN Not. 12, 11 (November 1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="adbf73d5-5746-4232-98c2-2c9bd3c89dcc"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Java Developer Connection Tech Tips "Using the Varargs Language Feature"
, Daniel H. Steinberg, January 4, 2005. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34f2be0a-6f43-4b92-bbd1-1b6d9bee3dd6"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Secure Coding Antipatterns: Avoiding Vulnerabilities
, by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e3ef575-dcbd-4d45-98df-6061d1cde9a1"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] XXE (Xml eXternal Entity) attack
, by Gregory Steuck (www.securityfocus.com). (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="267a3410-403d-42e0-b544-067fb520afed"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8abe04c6-b4ff-4c8a-9513-48eae3475a6b"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide
, Sun Microsystems, Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2aa349f3-5011-41ee-813d-2113d52335c3"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d961b10f-3b52-4ec6-a0f1-780d1a64277c"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c6c8429-069d-4712-8271-fc02ea35ad6a"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Composable thread coloring
, by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bec0e3a-fdfd-41ef-bf52-17e85cf666b0"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum, Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2/E
. March, 2003. ISBN-10: 0132392275.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="367822ba-57d1-42d4-8c58-0d1fc29203bf"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, by Josh Bloch and William Pugh, JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="819c789d-4cbc-4d6c-895a-3aa0b9b741fa"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Tomcat documentation, Changelog
and Security fixes
, the Apache Software Foundation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7e8abfb-de1d-4710-aedb-545d524c4c14"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
[Tools 2011] JDK Tools and Utilities Specification
, Oracle Inc. (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2c29acd-00b0-47f6-9f53-99a5b18dc26a"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2554327-8879-4aa9-85d3-4fca665b214b"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: The Unicode Standard, Version 5.2
, Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cb5807e-09c3-47b7-924a-85afe5a1903f"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Security and the class loader architecture
Java World.com, by Bill Venners. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0d5a7d5-d0ec-435e-a396-ace5076c2a6a"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Failure and Exceptions, A Conversation with James Gosling, Part II
, by Bill Venners. Artima.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="022948a8-35a1-4721-a91a-f7ec0e05b54a"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Extensible Markup Language (XML) 1.0 (Fifth Edition)
, W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1849ab4-77cd-4336-93a6-dda9dedb7b34"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Michael S. Ware. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7de14a9d-665e-4187-a80e-1d49b08588e3"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Exploiting Unicode-enabled Software
, by Chris Weber, Casaba Security. CanSecWest March 2009. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36dc8f7c-0edb-4ab7-85a6-39e7122effb3"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] Secure Programming for Linux and Unix HOWTO
, David A. Wheeler. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="835e00a7-5d5d-4976-a43d-7c2183683327"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] Java Developer Connection Tech Tips "Creating Custom Security Permissions"
, John Zukowski, May 18, 2004. (2004)