You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 11 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bb254b3-8378-4149-acd1-6d8703df2739"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a82cfabf-73b4-41d4-a0a2-f64dd2bf6c50"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5319ef92-f0f2-4752-8026-8099e45e03d2"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85e16178-2bca-4ad2-bba5-cd18e697bd40"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="903c0156-3a29-4504-b3e2-c18bb19bebcb"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
[Concurrency 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31d4693d-8c95-45a8-a6d7-544d11b1f02f"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
[Cookbook 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a1818ee-9e36-44ce-ab65-e9cb0ae11a90"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a37026d-1014-497a-b66f-6cf3ac51591c"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
[EJS 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4358b09-d97e-4beb-b792-4462e45de22b"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa948a5a-4e88-4c55-9fc1-f12ce9980218"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6dae1c49-13a7-4e33-8a71-9ad2233e29a4"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88d8dc18-9e30-4cbb-ad77-b3ea073ea0f5"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation ver 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb5491df-1843-45e8-84c0-610f46637e2b"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89981eea-742d-4748-a82f-b69396e6837f"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
[Java I/O] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55ab8ac2-e7e2-4430-98c1-ad7cfa43f038"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
[JNI 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b95b1a1-578f-4d3c-bf6b-4d60bb4dc184"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro>
[JNS 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbab08fb-47d4-4e87-8aff-144ba7344f12"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8515ffd-937a-497d-8a7d-eb49bf228d30"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b44fe999-74fb-48f2-be8f-42d8e680797e"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low, http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c0bb655-9761-4f21-a45b-8f913437889c"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4eb245b1-08e4-4183-8027-a5f545baf178"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f8b378c-5c32-4df0-aeb5-b721d7d977c1"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler http://www.brouhaha.com/~eric/software/mocha/ (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d2caed3-3c4e-4a07-996d-a650746d67f1"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33f4f3b8-afd1-4ea3-91ca-d152afbd3ffb"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
[Patterns 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a555ba1e-f441-4f6e-bf3f-bdfce270e967"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
[Pitfalls 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1103131c-ff3b-45bb-8377-2a1efeab4540"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3296c171-faa0-4db5-96d6-e4bc5b2e6221"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d06f4c4-60d3-48f9-b167-7564286364cf"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro>
[Secrets 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4704a7f-747f-44f1-a2aa-90a1ddeeec72"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

  • No labels