
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66a78b52-f48e-4ccc-a187-b9034690c691"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 96] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e247586a-9cd7-497b-b7c6-8bab7ab0d66d"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e282d2de-6369-4a28-8089-d1fa62b0b4b5"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1587ebcc-2772-4bd3-91e4-0998b64faaab"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro>
[Bea 08] Packaging WebLogic Server J2EE Applications (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="178534f6-b1c3-4f2b-b937-2f9d214afc2b"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8fc1bf49-6f2b-43d9-8c1b-e0fb04f976db"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee00efd8-3241-443d-948a-fefe3ec7b9cb"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11818997-453b-464d-b219-15f1f8eb0f52"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 05] Finalization, Threads, and the Java⢠Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac3b7129-9a5b-4f3d-81db-e4bd4cdde1b9"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18fbeb65-4049-4f5e-b22b-9c27a07048be"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 88] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7488ecf-c235-41f5-8975-cf13c13531b8"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f86ca8a7-4b6c-4b7f-9a71-174bcbc5baab"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading, ONJava (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17476272-ba39-4e14-8b24-3fe8d0468295"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 08] Common Vulnerability Exposure, MITRE Corporation (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="588e8553-5edd-4772-b6a5-b520c428f0ac"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 07] Garbage Collection-Friendly Programming by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e02d7c6-dec9-48c6-81e9-3cbcb820ede4"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 04] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64d01879-bce2-4832-a10a-dae6169aeb2b"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 95] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db41e48a-a291-4287-9cc0-563ec7c42523"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't, by Michael C. Daconta, JavaWorld.com. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f64bde2-cdda-4c1f-8002-f41253134a85"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69e21820-7be6-43b5-9704-2f0ed7c9ea5e"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ecdb0d9-664c-4101-bf51-cd1e1afdf44f"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59603768-fa08-4a5c-8574-83227fcf7454"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 08] The Eclipse Platform (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="500dcf61-711f-4807-b781-110bd36d90fe"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa0b69f6-173e-475a-86de-6d4b3665c84c"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b118bdb-1284-4a10-83c5-3db81feef880"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d39e994a-ff32-4d76-a78a-1c3a0af8a94a"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af31ebe9-29e5-4bb5-906a-2d15ff857259"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 01] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0d4c45b-0388-4c62-8da6-78fe97971180"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 08] Function Table Class FunctionTable, Field detail, public static FuncLoader m_functions
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d6e0636-ca78-48b1-9312-a1f9f1d5d3d8"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 95] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2803def-fc96-4f0f-a4c8-81c96a6a1095"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="892f98db-b09e-49e1-bb3c-2f376e568ce8"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 05] Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a0cdb3b-8c22-4c56-994e-5f395f40bb32"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c41cd55b-4e90-432e-beac-be51b0597493"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1c1598d-08e1-48ca-ba6d-7d8839b3f51e"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc022ef9-4f97-46c7-ab8a-27f5699030ac"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21b60325-217f-4f80-a92d-45de37056dce"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8dac7928-ceb0-46d7-87e8-fe627b514210"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b2b11bd-3da3-4a16-a5eb-3c936cd7c093"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 00] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72a409bd-0097-4566-a976-30a4112b420a"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 01] Java Developer Connection Tech Tips, January 30, 2001, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59e100ba-9aba-465f-a4e3-3a386c9874da"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e195bc6-0838-4391-8b19-4aa2c094cc12"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e25f804-ae61-4dcc-8cea-8e8534f42d99"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 03] Null Object, Something for Nothing, by Kevlin Henney (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bc2b103-0156-46de-be36-0a504a3cbe50"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 08] J2SE Documentation version 1.5, Sun Microsystems. Jar File Specification (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68fa9bbc-4741-4d47-a86e-b19a42187d06"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 99] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7838bd27-8c79-40fc-a598-242bc67f75a1"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d569f24-dbd0-4829-be92-ae8881b62430"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html], Sun Microsystems (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9989d40-d81a-409a-a030-3989930d4d03"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 99] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9398c5c6-3408-469b-a515-5bf4028b64d8"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 04] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b1809e2-81d2-4420-92db-9002bf1b251c"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 08] Java⢠Platform, Standard Edition 7 documentation, 19 Dec 2008. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b8d693a-6735-437e-8efe-c41b3f446253"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08c7b05a-407b-43a7-bfec-32ee29294085"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9e5ff37-3d75-458c-a856-e9a8b1267d79"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro>
[JPL 05] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0835c2a2-65fc-45f9-823f-aa150debf66f"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af582f49-d608-4725-a6e8-3ba9b78d7578"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62964517-5444-4cea-854b-e61381ceb447"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6581df7-cbcc-4285-a7d2-7553092ddef3"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA), Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d88eb97-48e0-4037-a584-76e160685fcd"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI), Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9032c1f-c908-4aa2-b608-25b2c158da77"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4657310-0168-4cd1-9e93-681bfd6e5314"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8de154f-6462-4404-a7b7-2a305343656e"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4e38faa-17db-43f4-b2d0-7ed8b98c8191"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 08] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ba1fa84-ee72-4390-9ad7-1c7cf4b1c742"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html, Angelica Langer (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="324f7208-2076-44bf-96d1-e827ccdf9fbd"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d3d5752-8c4a-49ff-b78c-6a4867ca7d58"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5382f5a0-420d-499b-844f-d3bab24c5c48"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ea6dfc3-8bf3-443a-92ed-efdee203803a"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 05] Security Issues in Garbage Collection, by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1928964b-8cad-45c0-8ec1-6001ee8bea97"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0da3ce99-6c8a-4830-bf4b-dbafffb055dc"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba8a8ba5-5ea1-4556-83e9-dd2aace678cf"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 01] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7f2434b-9e33-481f-8d0f-f8cbbba14b39"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d815434-a056-4e36-b3bd-8a4a968abce9"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7b1c60b-9dd5-4392-8694-502edf9d9388"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffb346be-bc21-4d29-80c9-9e28b8f36196"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 01] MIDlet Packaging with J2ME, by John W. Muchow (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09da1298-c600-4e51-8135-c0fe7a07e306"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21e0f024-357d-4a30-b86b-b170a982bfda"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc111fba-09b9-4640-a6b8-c95051ebdcf6"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 04] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b167b9c0-b9aa-470a-b1d2-71a57e18b9fd"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 07] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3e1a613-c5f5-4b29-8ead-1f68d7d017e8"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 04] Decompiling Java, by Godfrey Nolan, Apress. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de22e001-58a3-4017-b931-9240d7a23772"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="745f418e-487f-442e-865a-e92dbf5422da"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d80c5b2a-64cd-473e-b036-9e1e49e45f42"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro>
[Patterns 02] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="503af125-08f1-47ae-b0ab-5ac76d8dc9a8"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 05] Are We Counting Bytes Yet? at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86630b90-059b-4d1b-b6c6-2c305fb7c4ba"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4693c6b-08ac-4a34-ac37-e983edf0d209"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0351ca9d-ba08-47cf-b66a-1c4963c48834"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25ef4fcc-6d27-4303-850c-11cd196311cf"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="185ef2d5-4a5b-47ce-b216-dbec147436f8"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b94d9353-38ce-48b1-9fbd-fd3c6726e9ce"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2566df39-720e-4aa6-99c2-144bcefa9543"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47b14764-2285-42c7-9b09-2ac4c338365e"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea330e08-3be0-4ac7-89ed-3dd03fd8b6d7"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 08] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d12306d6-6c0c-4ecf-a448-4d6ed01c65f8"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0565fb4b-98d2-45bd-9ccd-8c110f000584"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 08] SUN Developer Network (1994-2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4e4d104-4308-492c-8a09-be3a1094d0b6"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 07] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift., by Josh Bloch and William Pugh, JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9117399-e110-41d9-a365-061a127b5065"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c77fd665-8c4b-4e56-bb01-73153a6b8936"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.htmlSecure Programming for Linux and Unix HOWTO
, David A. Wheeler (2003)