<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51f11fdc-66e0-4171-9164-e4566c8e8cb8"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering 22(1):6â“15 (1996).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afa86dba-e5d1-4022-b600-95d9d5c64f15"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
. Oracle, Inc. (2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e8df8e1-6011-493a-8ef5-436a51bbc846"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
[API 2011] Java Platform, Standard Edition 7 API Specification
. Oracle, Inc. (2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29220e3d-c9d8-490c-8e42-75ca6dde2c92"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Austin, Calvin, and Monica Pawlan. Advanced Programming for the Java 2 Platform
. Boston: Addison-Wesley Longman (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="365079cd-26ce-420a-92d7-8de005d4dd7d"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "partial order." In Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. http://xlinux.nist.gov/dads/HTML/partialorder.html
(2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07e8c4f6-0a93-4852-be72-05eeaeb96041"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Black, Paul E., and Paul J. Tanenbaum. "total order." In Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. http://xlinux.nist.gov/dads/HTML/totalorder.html
(2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d417ff6-cc6b-478a-9357-3235029fb12c"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5132e28c-306b-4b5d-9448-904bf449501e"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="707bbb1c-4457-414f-88eb-571dddc25496"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Bloch, Joshua, and Neal Gafter. Yet More Programming Puzzlers
. JavaOne Conference (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43a13d6b-69e0-47ef-bca9-3101fe9671d9"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Bloch, Joshua. Effective Java⢠Reloaded: This Time It's (Not) for Real
. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b3cd13a-2b8d-4dc9-becd-910f2532c8aa"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Bloch, Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="deff317b-3fcd-45b7-b298-95db136e1973"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Bloch, Joshua, and Neal Gafter. Return of the Puzzlers: Schlock and Awe
. JavaOne Conference (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2747c1ae-fc18-4567-b22a-a14b34932da8"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Boehm, Hans-J. Finalization, Threads, and the Java⢠Technology-Based Memory Model. JavaOne Conference (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9ba72d6-46ef-46ff-ace7-b6daa447ebf5"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63989452-da57-4971-96a2-77c156c9cec6"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT (International Telegraph and Telephone Consultative Committee). CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva: International Telecommunication Union (1988).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="807f35d7-9ed4-4634-b0b0-9e99bd511f69"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aba2b7db-d162-44b1-82b4-ee845619d41a"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Upper Saddle River, NJ: Addison-Wesley Professional (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="858519e3-c9f2-4ed0-8ef7-263870e9bdea"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Christudas, Binildas. Internals of Java Class Loading
, ONJava (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dcf21d9-4564-497d-b3d9-7003430ac1d1"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace
, IEEE Computer, 14(10):48â“54 (1981).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="122fcdf5-e357-4712-b529-7b1ebcced773"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
. Oracle, Inc. (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34b03ab7-7f74-4ead-891f-c37739be3d14"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming
. Java SE Garbage Collection Group, Sun Microsystems, Inc. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df3e5496-3330-4b4d-ae9d-a9809a02d231"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Horstmann, Cay S., and Gary Cornell. _Core Java⢠2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5dc9aba2-de57-414b-8636-f5c96b2d98d8"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In Pattern Languages of Program Design, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c121943d-cac0-4962-a02c-cbe23faed437"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 2008] MITRE Corporation. [Common Vulnerabilities and Exposures|http://cve.mitre.org/index.html] (2008/2012).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cde96568-fd55-4c12-ba7a-86a868a151c0"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Daconta, Michael C. When Runtime.exec() Won't
. JavaWorld.com (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20a75ee3-4949-4d41-b48c-e71b07ab4afd"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls. Indianapolis: Wiley (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58a0c181-85d6-47c8-b0d1-6c96114d28c9"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Darwin, Ian F. Java Cookbook, 2nd ed. Sebastopol, CA: OâReilly (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccfc767a-b45c-4aec-88d6-bf3535730c2f"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008] Davis, Mark, and Martin Dürst. Unicode Standard Annex #15: Unicode Normalization Forms
(2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc9c6a6f-e3ab-4fc1-9365-51aee799050a"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Davis, Mark, and Michel Suignard. Unicode Technical Report #36, Unicode Security Considerations
(2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="085bd61c-5699-4bba-b785-1fabbe4a528f"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143â“155 (1966). doi: 10.1145/365230.365252.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97cb4f0a-72a3-48cf-97d3-ed6fa621002d"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] U.S. Department of Homeland Security. Build Security In
. https://buildsecurityin.us-cert.gov
(2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f904141a-c26a-4c73-b0a8-3164badc19b0"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Dormann, Will. Signed Java Applet Security: Worse Than ActiveX?
. CERT Vulnerability Analysis Blog (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2fd052d6-70ce-4e45-8092-aabd633805a9"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Doshi, Gunjan. Best Practices for Exception Handling
. ONJava. (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3e6317a-97bb-45ed-954e-b26d9eef9c2f"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, Kazuya Togashi. Secure Design Patterns
. CMU/SEI-2009-TR-010. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a143d6f-8f88-4144-a426-c1acb6f81956"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27d9229d-a6ae-4f50-89c6-55a8e0b1e70b"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b19af450-39d2-43a3-97d4-72af64b4996e"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec86b1c5-aa7f-417c-a693-86eb7019ff50"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] Java Coding Standards
, prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d9bc4da-b881-4ae3-ac2e-dda4e2546b74"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Design Fragments
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cbe1cac6-81eb-41c6-94f5-068dc2b600e5"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="648396cc-87be-40e6-bb3c-e9bb857bed48"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f84ea3fd-1d7a-444d-b711-0e53cad43c3d"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f4719f8-50d8-4caf-9eeb-d1d2e3fa9558"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] A Taxonomy of Coding Errors that Affect Security
Java/JSP, Fortify Software. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee3dface-e8db-4658-a52a-080958815c3b"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f950af07-e9c5-4555-85ca-a0118244f28a"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8fa245a-ee83-489b-b942-8f5dccac672b"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Neal Gafter's blog
, by Neal Gafter's. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29f4762b-8cbe-4542-82d7-11f97b2a0942"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="193f1677-12fc-4376-9b35-fa3bdb7ffddb"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="346eeade-7e33-497f-bb19-edcbf8c7ba23"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Java theory and practice: Don't let the "this" reference escape during construction
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a94a94c1-2706-4e85-b46b-9c930977adf4"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004] Java theory and practice: Garbage collection and performance
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a58e3f4-a4d2-4141-8423-2765d74e3c5c"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Java theory and practice: The exceptions debate: To check, or not to check?
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b15ff61a-8e64-4aad-97a3-422e125069ea"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Java theory and practice: Going atomic
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="792c62d8-6d19-454c-9ca4-5c9ea989da4e"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005] Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bed0c5e8-2889-4862-9afa-a82643217f66"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Java theory and practice: Plugging memory leaks with weak references
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e805dcd-e326-4dc2-8873-8ca374b9e30d"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2209172f-b22f-45e0-b3a4-154b5853858d"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Java theory and practice: Good housekeeping practices
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14066d16-19cc-49b6-8a6b-9b35253e724f"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Java theory and practice: Managing volatility, Guidelines for using volatile variables
, by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology). (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4280fcad-bb61-45c9-bc5a-22a3c4185996"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic
. Sun Microsystems, Inc. March 1991. (1991)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2b96742-748a-4546-ba2b-ad2665c324df"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="555ee017-4768-4d1d-b351-44237cf57328"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65493d48-260b-4594-a9f2-9ea0b9e7059b"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Discover the secrets of the Java Serialization API
, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ed085b3-03f8-4eaf-9962-1d8ccf32df5b"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Canadian Mind Products Java & Internet Glossary
by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28fc5bae-95ca-4f76-84e4-80ec9e76e442"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Reflection On Inner Classes
by Jeffery Grigg. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61d9501f-b13b-450f-9c9e-fe8705fd67ce"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] Java RMI
, by William Grosso. O'Reilly. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34b2dc56-e120-46fc-8773-a860aecf0d83"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Java memory leaks - Catch me if you can
, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f6074f1-3002-4c85-be86-36ec15131642"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Immutable Objects in Java
, by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d10e69b-ad83-44df-9a47-1a62980225e4"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Practical Java⢠Programming Language Guide, by Peter Haggar. Addison-Wesley Professional. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88fa0a70-4e72-4757-b817-2ca5a79f7b10"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Java Developer Connection Tech Tips
, March 28, 2000, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f83de6f-3096-4646-ac0c-e5fa4d1f2af5"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Java Developer Connection Tech Tips
, January 30, 2001, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a76de967-1fa5-48e6-b279-f1b1282b5ebb"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="750664bf-bc27-4fdc-b236-06062a5142ac"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43ed0b71-939d-467f-9c8e-8831866fd9db"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2648701c-dc9e-40b0-8de6-7ad78cbf8dd2"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86f768a4-38fa-4235-9c6e-36804fdf6057"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Null Object, Something for Nothing
, by Kevlin Henney (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7865e0cc-904c-46c4-9891-44698fa78346"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Java⢠NIO, by Ron Hitchens. O'Reilly. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9490b3a-7165-461a-923b-3a2ebf596731"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Advanced Java⢠Globalization
, by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="526c1473-ff9f-4b6f-b713-c2ca72b65da7"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] Finding more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8aed392-6df9-4c03-aa88-634da801ac79"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] Java's reliability: an analysis of software defects in Java, by J. Hunt and F. Long. Software IEE Proceedings. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e04c1b7-e4d2-468a-b87a-deb586dc9d79"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="613dc421-9d9a-4249-89d8-8e0814d4fa4e"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE. Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985), 2006.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a424796-2256-471d-9316-d00a964feaf6"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. J2SE Documentation version 1.3
, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="589509ed-b008-4306-b0d4-d77dd6aee2bc"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c916666-b47c-4ed0-b1ec-25ba18a9df01"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] java - the Java application launcher
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cf818dc-3ebb-43f7-be8b-003b2f5b294d"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24907d6c-9170-4486-96f7-719ae06f9386"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html
], Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9bce92a9-94f7-4b76-99f8-3a5e92b7cbc6"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7065c497-f4f6-46f2-8810-813ea054b9c9"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="051216a5-d4d8-4fa5-af2b-059a78c91217"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 documentation
, Sun Microsystems, Inc., 19 Dec 2008. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bdded82f-f681-4417-ba42-4a82169b0335"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification.
(2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fbd240c-dba2-404d-ba02-c7fefffbc7a1"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
[JLS 2011] Java Language Specification: Java SE 7 Edition. by James Gosling, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Oracle America, Inc. The Java Language Specification.
(2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b154057-b64e-4557-b147-cd166686459b"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3397724-f298-499e-a113-4fd7547132ad"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d52e982-ce93-4252-bc9b-ba1474eceaf9"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="652db32d-60b4-4379-9cc0-e57791aaa30a"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="662f7dc3-beeb-4984-b7b5-0d1a1b11b3a7"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca9fcf3e-aa21-4ef1-8e0d-5c92cc51bafe"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dff88945-a4af-494a-95b6-75b294906900"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: JavaTM Memory Model and Thread Specification
. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f269429-1745-4780-8410-b67c5f817b15"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="871abec5-5cfe-4afb-a3ff-41ffba8e5f95"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64560d3d-6e03-440d-9ab0-404c11b08c9a"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] The Ultimate Java Puzzler
by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccce1b39-ab22-474b-a8be-a6a94331363d"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40548c99-0c2f-4ae3-90d9-d73a51e9733f"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e881da4c-9c3f-4978-a090-50148025a4ce"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Java⢠Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001)
[Lai 2008] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a5a7c58-38ac-4533-9891-c946ba14fa14"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html
, Angelica Langer. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d96b532-5a8a-4b20-a929-288908b5e8dc"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11ec410f-e9a5-4577-bd16-06ed4697cb5b"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Correct and Efficient Synchronization of Java⢠Technology based Threads
, by Doug Lea and William Pugh. JavaOne Conference. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2eaf6936-dfbe-43c5-92a2-6424082aef99"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] The JSR-133 Cookbook for Compiler Writers
, by Doug Lea. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="878be99d-2363-40c3-a6ed-bfbc53afdff3"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Robust and Scalable Concurrent Programming: Lessons from the Trenches
, by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8061e2dc-2f05-443a-88ac-5092f2b0e5b8"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d40cd6f-edd2-4db5-9dc7-3b09066d449b"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Dynamic Class Loading in the Java⢠Virtual Machine
, by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7934a019-f228-4641-874c-24f42cf7bade"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Using prototypical objects to implement shared behavior in object-oriented systems
. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="361c5046-ad3c-4764-bfbc-fc7ecf30a27d"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Security Issues in Garbage Collection
, by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed869453-a5ba-4469-913b-42dc2c751086"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Software Vulnerabilities in Java
, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d98d2abe-10f5-49e0-ac78-6f17612b9385"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
[Long 2011] The CERT Oracle Secure Coding Standard for Java, by Fred Long, Dhruv Mohindra, Robert C. Seacord and Dean F. Sutherland, Addison-Wesley, SEI Series in Software Engineering. (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4608abf5-d995-409d-8cd2-60e162b2652e"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Protecting Java Code via Obfuscation
, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16cd6b05-2f68-4015-b1c6-a44c365bd9e7"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 1998] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2a4032a-ec77-4c3f-9420-f583d6b38536"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Compressing and Decompressing Data Using Java APIs
, by Qusay H. Mahmoud. Oracle. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9760ef6c-b5fe-458c-9e6e-d8aa3f81cd5b"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ccbaf05-0c4d-41f6-a689-cf206194232b"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] JSR 133 (Java Memory Model) FAQ
, by Jeremy Manson and Brian Goetz. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62564c84-661d-4cf6-a242-bb76ccc6be7c"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] The Java⢠Memory Model: the building block of concurrency
, by Jeremy Manson and William Pugh, JavaOne Conference. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cdc6edb6-7e83-429a-8e78-50ea7393ac74"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Granularity
, by Robert C. Martin. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b129feb-6bff-4dcd-9b40-0b3427db344f"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25402a4a-3211-4b4f-9d9c-17af0c887d4f"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc82c2de-2e2a-4612-bc8d-bbd74960435e"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Twelve rules for developing more secure Java code
, Gary McGraw and Edward Felten, JavaWorld.com. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27fc9595-65cf-451a-9067-0e685b3f896c"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Java⢠Platform Concurrency Gotchas
, by Alex Miller, Terracotta. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="578e7130-71d3-4817-aa71-5a602c59fc29"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
[MITRE 2009] Common Weakness Enumeration
, MITRE Corporation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4331b1ff-d421-4b3f-8165-ae738cebefaa"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b0ecbab-cd42-4827-9c35-3866981e7e32"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Ruining Security with java.util.Random
Version 1.0, by Jan P. Monsch. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="931cb336-e723-4ed6-8cf7-50505b0895a1"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Using SQL Escape Sequences
, Microsoft Corporation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26aa854e-5fca-4ff6-95a2-0418db36f70c"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] MIDlet Packaging with J2ME
, by John W. Muchow (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c9f8615-a9c2-4216-ae28-788b034cc944"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Exception Handling: Common Problems and Best Practice with Java 1.4
by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="112b4681-1e85-4055-8325-565925a96df4"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c6dfa96-3d41-4cb4-bb1c-e7835becf19d"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Java⢠Generics and Collections: Tools for Productivity
, by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf026217-368b-4e7c-8639-9b4739e92173"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] What Are Race Conditions? Some Issues and Formalization
, by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin — Madison. (1992)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c582c7a-9c25-46a6-a2c0-d49252abc5d7"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cc373b6-c1c0-4047-9ca1-8e1d4cab9e04"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f612866-38a0-4afe-91ea-2da6ee7d1455"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Decompiling Java, by Godfrey Nolan, Apress
. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccb7eacb-8a3c-41ed-88ec-2e7ef84e2b15"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ff96ca6-fcf9-4819-aa6d-4d2ab20b12df"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning
, Oracle Corporation. (2010)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="927150f4-4856-4ae4-8929-9e3dc8424e63"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] A Guide to Building Secure Web Applications and Web Services
. The Open Web Application Security Project. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6f8c543-31dd-478c-8359-7da4c7fb619d"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] OWASP TOP 10 FOR JAVA EE
. The Open Web Application Security Project. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75b59384-4c42-4336-9bdf-4f2b779b9263"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 2008] OWASP
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e067322-9ebd-484f-97b7-b261526ff5a8"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57eaf944-9af5-410e-9350-f20709b2cd10"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Beware the dangers of generic Exceptions
, by Paul Philion, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf03be3c-d8bd-4bb6-92ec-1b430996b9fa"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Are We Counting Bytes Yet?
at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6a4c4d6-5902-4311-af94-dc0ef8206385"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="865b5257-2cfa-4687-a7f9-012fcb63accc"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Default Policy Implementation and Policy File Syntax
, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8e8fe01-642d-44f9-8c92-f78905a0a978"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] The Java Memory Model (discussions reference)
by William Pugh, Univ. of Maryland. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef417d06-ebb1-4e4d-abc7-aef01583bf78"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] Defective Java Code: Turning WTF Code into a Learning Experience
, by William Pugh, Univ. of Maryland. JavaOne Conference. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a402af7c-a9de-4843-86c3-4f3c233694c5"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] Defective Java Code: Mistakes That Matter
, by William Pugh, Univ. of Maryland. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40c6c7e3-3f51-40b1-8a8a-d9c431d1fe6f"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, Reasoning. 14 Nov 2003. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7de0bb94-dc89-41a9-9a55-2c8cff1383fc"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Reflection
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33d1df00-842b-438f-a039-011904d80877"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] The Elements of Java Style
, by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56894d52-a3cd-4205-bff7-525c9d6ce4f0"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Fallacies of Distributed Computing Explained
, by Arnon Rotem-Gal-Oz. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb6d2986-1d0c-40ec-ab93-b9accd5cf5cd"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003] Breaking Java exception-handling rules is easy
, by Vladimir Roubtsov, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25fb603a-452e-4154-a265-e19c34dc2888"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Into the mist of serialization myths
, by Vladimir Roubtsov, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b7abff2-477f-41eb-83f8-422169253048"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4bdfa3c-416d-42ff-92a3-febeb6b8b0d4"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." Proceedings of the IEEE 63, 9 (September 1975): 1278-1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a5330b5-3d90-43a5-a3c5-9e2fbe3936b2"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33777b42-cb39-4179-865c-9d4ae8167ffa"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0
, Sun Microsystems, Inc. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6aeec45-e5fd-4ab5-95ea-bcea8e0598bd"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a30ae87a-4bbe-47fa-8a96-4eca674b0a62"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d013342-a6a7-45a9-8468-ca48acbd00f0"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
[Schoenefeld 2004] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48f9f57f-eb55-4d85-8825-a90e86563d78"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Avoiding Checked Exceptions
, by Don Schwarz, ONJava (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bafb5ee-6dcb-4c49-9bdd-c57d59140d92"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Java Tip 134: When catching exceptions, don't cast your net too wide
, by Dave Schweisguth. Javaworld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bc09d21-d911-4ca3-bc27-1d8d53e01a1c"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] SUN Developer Network
, Sun Microsystems, Inc. (1994-2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0db94e2-3e24-40ed-a44f-82decc580e87"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
See http://www.cert.org/books/secure-coding
for news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b27e74d-ad59-4b81-8fbe-dab1de308f37"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Java 2 Platform Security Architecture
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d65ce19e-cea4-4b56-8b71-f7728bac4532"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e96ba0b5-4dad-4d2f-92b4-07dcd3df6d04"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c4f6b59-efc9-4485-952d-b06c854dd200"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Avoid the dangers of XPath injection
, by Robi Sen, IBM developerWorks. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c77e9830-1917-430d-a8fa-da0e2e2857cf"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb74eb2d-0de8-4ea4-bbd0-c9e307f51a79"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] Steele, G. L. "Arithmetic shifting considered harmful
." SIGPLAN Not. 12, 11 (November 1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c079956f-b364-4253-9ede-bda8277b9064"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Java Developer Connection Tech Tips "Using the Varargs Language Feature"
, Daniel H. Steinberg, January 4, 2005. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7eb60540-e499-47e6-86bf-f06d9ce2bc85"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Secure Coding Antipatterns: Avoiding Vulnerabilities
, by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44b6e367-6660-43b6-a7e9-7f7121c51b53"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] XXE (Xml eXternal Entity) attack
, by Gregory Steuck (www.securityfocus.com). (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a62b72e-594a-4fc7-8f37-17ff9a405ba0"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73bd5a2d-ef25-4a2a-afb9-5a9b7fba65ee"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide
, Sun Microsystems, Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78fa3578-0d30-4f74-a651-280082720766"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="360d51fe-5b32-4356-b170-96211e2a7b04"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0892d5c-881c-414a-a95d-f0c62eecaaca"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Composable thread coloring
, by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36fc3906-6eda-4919-97f6-346035c5e022"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum, Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2/E
. March, 2003. ISBN-10: 0132392275.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d8e3301-5f7e-41b8-a2bf-cab350d74a2b"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, by Josh Bloch and William Pugh, JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d2c78b7-642b-4f18-b0cb-9c74465821b5"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Tomcat documentation, Changelog
and Security fixes
, the Apache Software Foundation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d95e7e3-72e3-4e7d-9fc3-a1183e328d42"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
[Tools 2011] JDK Tools and Utilities Specification
, Oracle Inc. (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d498b1a-f945-47f0-b405-2163834bfcc0"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0130d95-4e65-42de-ba07-f29598ace6c0"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: The Unicode Standard, Version 5.2
, Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45855f25-9bb1-4590-8e55-250b35a8a5f5"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Security and the class loader architecture
Java World.com, by Bill Venners. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4b572d9-85ad-4119-8ff3-c7479f241c39"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Failure and Exceptions, A Conversation with James Gosling, Part II
, by Bill Venners. Artima.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5fffc958-0abe-4647-81ce-7a3aeb31326c"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Extensible Markup Language (XML) 1.0 (Fifth Edition)
, W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9b93f75-36c5-4321-8d68-d9ba35d7fd13"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Michael S. Ware. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba57013d-a821-45d3-9162-37373961e5de"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Exploiting Unicode-enabled Software
, by Chris Weber, Casaba Security. CanSecWest March 2009. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9808a819-3685-4df1-9525-e17d48b1efa2"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] Secure Programming for Linux and Unix HOWTO
, David A. Wheeler. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e301a754-00fc-40b3-ac70-6f649cf089d5"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] Java Developer Connection Tech Tips "Creating Custom Security Permissions"
, John Zukowski, May 18, 2004. (2004)