
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c0c6205-6e44-4bbd-b456-9b3643cb77e9"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering 22(1):6â“15 (1996).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a083466-5982-4806-9811-75b5d8751bce"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification. Oracle (2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c006ccc-557e-445e-bbca-8f5fd614ce97"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
[API 2011] Java Platform, Standard Edition 7 API Specification. Oracle (2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa256ad9-b1ef-4d59-a6eb-20d904bedc5c"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Austin, Calvin, and Monica Pawlan. Advanced Programming for the Java 2 Platform. Boston: Addison-Wesley Longman (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b433725-5ff0-4c1f-9b02-ce199452e5fe"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="481ee691-3cfe-41a3-8d3c-3c4bc81037f5"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Black, Paul E., and Paul J. Tanenbaum. "total order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d03554f-e241-42ab-b273-c40ea9d12da6"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5eb10077-2faf-42ad-9f9a-17389250b704"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7887cfcb-6bf6-48de-afdb-bfc1df249dae"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Bloch, Joshua, and Neal Gafter. Yet More Programming Puzzlers. JavaOne Conference (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5eca2ae-db9e-4427-9e84-ab29c4a18c81"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Bloch, Joshua. Effective Java⢠Reloaded: This Time It's (Not) for Real. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bda79c0-f9f9-48ba-b275-79baad64d041"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Bloch, Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dd64f4f-94de-462c-8e7f-c9b7ddffda1e"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Bloch, Joshua, and Neal Gafter. Return of the Puzzlers: Schlock and Awe. JavaOne Conference (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f7c2598-62eb-4993-870c-139fae2075b3"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Boehm, Hans-J. Finalization, Threads, and the Java⢠Technology-Based Memory Model. JavaOne Conference (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4446a66-4ed5-435e-8339-09a0c167b1a5"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac823b43-7066-4956-bbab-ba6e4fc036a1"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT (International Telegraph and Telephone Consultative Committee). CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva: International Telecommunication Union (1988).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2f78dbb-cb9d-4ce9-9483-d7198787c7a0"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5543c497-6872-4052-8ab4-9b4f63f209e4"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Upper Saddle River, NJ: Addison-Wesley Professional (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ebda72dd-7523-4d67-9159-40a1dae1c455"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Christudas, Binildas. Internals of Java Class Loading, ONJava (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="421bb8b1-a38f-4873-9bcf-e55f4bc2ad26"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48â“54 (1981).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0dec627-5f2b-4b1a-98fa-b003ddabe124"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df320284-b271-4904-ab4d-c56817112c0b"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3adb4fa1-1a79-4d57-9a5c-b48553ccf99f"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Horstmann, Cay S., and Gary Cornell. _Core Java⢠2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f227cb1-28be-4b2a-bb8d-8e378731b1ba"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In Pattern Languages of Program Design, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ce17546-bb6a-48e6-bf14-7bb95b11946b"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 2008] MITRE Corporation. Common Vulnerabilities and Exposures (2008/2012).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d44911ec-d358-469a-b39b-ea373b312bcf"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Daconta, Michael C. When Runtime.exec() Won't. JavaWorld.com (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73f3fff3-402a-4967-86d0-9067832f2785"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls. Indianapolis: Wiley (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc89bc80-5e90-4f20-b389-2c62847b91b1"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Darwin, Ian F. Java Cookbook, 2nd ed. Sebastopol, CA: OâReilly (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fda2022b-ef6d-46fb-bb2d-9edd4a431985"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008] Davis, Mark, and Martin Dürst. Unicode Standard Annex #15: Unicode Normalization Forms (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c3b5b8f-c3ef-4f9b-98c4-aafcfd5daef0"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Davis, Mark, and Michel Suignard. Unicode Technical Report #36, Unicode Security Considerations (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="150199d0-57d2-4afe-9571-481fea7ca2b6"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143â“155 (1966). doi: 10.1145/365230.365252.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01d8636d-7f2d-4785-b777-ebd1cbcf9aa5"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] U.S. Department of Homeland Security. Build Security In (2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28292631-3fb1-47bf-8a9e-6992605a9b7d"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Dormann, Will. Signed Java Applet Security: Worse Than ActiveX? CERT Vulnerability Analysis Blog (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="679cefc2-0aae-4fc9-ac2e-91247d5d7702"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Doshi, Gunjan. Best Practices for Exception Handling. ONJava (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="218b445e-672d-4340-aaac-fcefd8841ff8"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b144217-ad83-4998-903c-4c303379fcd4"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] Eclipse Platform, The Eclipse Foundation (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afdce5a8-dd94-4338-8ef8-cdcfaf005265"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings, Oracle (2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="846db09f-bf3b-441d-9692-fe62a0da57d7"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] Eckstein, Robert. Java Enterprise Best Practices. Sebastopol, CA: O'Reilly (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2900a5bf-ed0f-4977-9206-7dbbe31499a8"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f67e6a3d-7191-406e-81ee-e7368d35c4b2"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Fairbanks, George. Design Fragments. PhD thesis, Carnegie Mellon University (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27e8a1ee-1e75-498d-ac83-75a523b8a83d"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions (2008/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a12bb0c-e4de-406c-9b66-7ce68bf5763f"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. JDBC API Tutorial and Reference, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="692b716f-2b01-4b92-9312-b17a8f00d0ab"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d79fd6f-1964-4fa9-af92-b8b074dd08b1"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c3633ed-06b0-4b25-bb69-17638d1f14c1"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Fox, Joshua. When Is a Singleton Not a Singleton? JavaWorld (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="edc05c74-6055-47aa-bf29-c80d64b8f76b"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cca332e4-ae12-4548-9596-6ecf323fb621"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Gafter, Neal. Neal Gafter's blog (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43e389d5-b281-48a1-a6a2-dd556b0a32d3"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Reading, MA: Addison-Wesley (1995).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a7116ca-c60f-4afe-a95b-9faf4217dfe4"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Garms, Jess, and Daniel Somerfield. Professional Java Security. Birmingham, UK: Wrox Press (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ee5f1ef-f66e-4e3f-b7e7-9017922adbed"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Goetz, Brian. Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction. IBM developerWorks (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="221df89a-c711-4ae0-9c03-333ffaa9261e"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4383af8f-5803-430b-a73c-8baf78656048"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Goetz, Brian. Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check? IBM developerWorks (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54a490fb-5cc8-41d7-81c2-7fe54ee9dbe2"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Goetz, Brian. Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent. IBM developerWorks (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e0ebe85-4bd2-4c8b-9944-d933bfc22789"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005] Goetz, Brian. Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners. IBM developerWorks (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a2ee481-b2b1-43f8-aa8f-7e431625047e"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Goetz, Brian. Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships. IBM developerWorks (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b1174d6-875a-46cb-b111-75c6788ef693"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b84ab408-b880-40a8-8e91-effc2f784f15"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Goetz, Brian. Java Theory and Practice: Good Housekeeping Practices. IBM developerWorks (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfefec65-4d7a-44dd-9aea-cba5a01f4257"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7f67d44-fade-437f-a5fc-7dbe65df6b57"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems (1991/2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20ffafb3-f42f-4c06-8458-7c6eb078b757"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de3ddf45-7c8e-49fd-8171-9791301da67a"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Grand, Mark. Patterns in Java, Vol. 1, 2nd ed. New York: Wiley (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce3098a9-8bd2-402a-9a73-9dd3b5651b1d"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Greanier, Todd. Discover the Secrets of the Java Serialization API. Sun Developer Network (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e13e5a9-4c1a-4903-9327-e9f9a21e27c3"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Green, Roedy. Canadian Mind Products Java & Internet Glossary (2008/2012).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a27ef34-c924-4733-a317-d01ba6fd2eae"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Grigg, Jeffery. Reflection on Inner Classes (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88d21bce-2bca-406d-a876-b3b02d5709e3"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] Grosso, William. Java RMI. Sebastopol, CA: O'Reilly (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="148b1aef-8ee0-4755-abb3-4e417dcc578e"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Gupta, Satish Chandra, and Rajeev Palanki. Java Memory Leaksâ”Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0. IBM developerWorks (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54b1e162-c4dd-4106-aea7-e22faf542d3d"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. Immutable Objects in Java. Research report, Radboud University Nijmegen (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fbb4af7-d217-48d8-8e09-8f1a28de36b6"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Haggar, Peter. _Practical Java⢠Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd1974af-af55-4d8d-9c90-2aa613705334"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Halloway, Stuart. Java Developer Connection Tech Tips, March 28, 2000. Sun Microsystems (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6140339-be9c-40c7-a743-5c8d8394f54e"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Halloway, Stuart. Java Developer Connection Tech Tips, January 30, 2001. Sun Microsystems (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84f2eaa1-e6de-430e-b350-6c0b9b59d4aa"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Harold, Elliotte Rusty. Java Secrets. Foster City, CA: IDG Books Worldwide (1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd2db8d4-8dd6-47ba-a63b-f3cb83f93a3f"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Harold, Elliotte Rusty. Java I/O. Sebastopol, CA: O'Reilly (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3093bcd5-aecf-44a3-b02d-87e18111268c"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Harold, Elliotte Rusty. Java I/O, 2nd ed. Sebastopol, CA: O'Reilley (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cfe420c-37f6-4481-be4a-9116c858977e"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Hawtin, Thomas. Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities. Sun Microsystems, Make It Fly, London (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c6ef836-0e25-4b49-a870-4c7c73a68768"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Henney, Kevlin. Null Object, Something for Nothing (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c149579c-eeca-40d3-94a1-439589338655"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Hitchens, Ron. _Java⢠NIO_. Cambridge, MA: O'Reilly (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00b0f48e-7fdf-4ddd-829e-e340964a9954"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Hornig, Charles. Advanced Java⢠Globalization. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47af930c-f090-4fb0-a701-f6900e4d8841"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE), San Diego (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="828ff2fc-818b-4b07-9329-59b09814407c"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. IEE Proceedings: Software 145(2/3):41â“50 (1998).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55ec6889-8716-420d-a686-e25965034f46"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] IEE (International Electrotechnical Commission). Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed. Geneva: IEC (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5065d2d-1035-40a4-a382-ac971f03b83a"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE (Institute of Electrical and Electronics Engineers). Standard for Binary Floating-Point Arithmetic (IEEE 754-1985). New York: IEEE (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="583fb925-bc8d-41eb-95e4-243ff6e4d1ca"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] JavaTM 2 SDK, Standard Edition Documentation, J2SE Documentation version 1.3. Sun Microsystems/Oracle (2000/2010).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5993b5b0-5a36-4892-bd2f-bf63ee8568b6"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification. Oracle (2008/2010).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b84aa7e4-3621-47bf-ade2-d926c90a39a0"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] java: The Java Application Launcher. Oracle (2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb6ac367-2aa0-4bd6-93d4-cfd3470a017e"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Upper Saddle River, NJ: Prentice Hall (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="431f59cd-f6af-4eed-9188-d91d27336362"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Java Generics. Oracle (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0809b1c9-9aa9-4a2c-8ee3-95934be96438"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Oaks, Scott, and Henry Wong. Java Threads, 2nd ed. Sebastopol, CA: O'Reilly (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40c1438f-0a1e-44b0-973c-38384793c36f"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Oaks, Scott, and Henry Wong. Java Threads, 3rd ed. Sebastopol, CA: O'Reilly (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53a2288b-2c67-4c23-bf62-fedbb31acd2d"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 Documentation. Oracle (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26562e51-7576-49cb-84de-44d6e383427e"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. Java Language Specification, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05c843d2-9399-43df-82a2-c7db22d069fa"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
[JLS 2011] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8af19313-e1ba-4acf-92d8-4c1800043973"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7ffdfa4-430c-43ce-b387-d9ab8ff3b623"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d5661d4-7f37-42cd-8f07-84323e903450"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88648446-89ed-44a8-964b-6804d01dd821"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258â“263, May 21â“24, Oakland, CA (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fec75c96-03ae-4190-a478-7291e04a941c"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA). Oracle (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb0da381-07bc-42dd-8515-f8a0c9f2d79d"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] Arnold, Ken, James Gosling, and David Holmes. _The Java⢠Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bd23856-1c64-4bdf-8f0c-c9a3041f54d3"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: JavaTM Memory Model and Thread Specification (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b2bd211-ebc6-4aa7-907c-d72a1fc66060"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI). Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="034a6e12-523e-4f69-bc73-1fb5e797d218"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification. Oracle (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76955acb-a1f6-4871-9978-6a48e1da4b68"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74873754-503c-4ede-bc70-1f2332dbe573"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] Kabutz, Heinz M. The Java Specialists' Newsletter. (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9cae441-c1e6-4103-9bb1-aa6814075de7"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f6156ff-414b-4e57-9e2e-a1c4db0638a7"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Knoernschild, Kirk. _Java⢠Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83b152e4-d670-4688-a33b-fa6b6cd1d3e0"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 2008] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. IEEE Software 25(1):13â“19 (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c613a27-b448-4dce-8b8b-475c764c2de2"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] Langer, Angelica, trainer and consultant. http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97691964-511b-4ee3-9177-0533ae1ce01a"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Reading, MA: Addison-Wesley (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9764e033-f7b3-4385-8f2b-e2184278b064"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Lea, Doug, and William Pugh. Correct and Efficient Synchronization of Java⢠Technologyâ“based Threads. JavaOne Conference (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4450f8e-da5f-45de-bf45-9652846e81e2"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] Lea, Doug. The JSR-133 Cookbook for Compiler Writers (2008/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="817e38cf-5b7c-4069-bcd0-53839709359e"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. Robust and Scalable Concurrent Programming: Lessons from the Trenches. JavaOne Conference (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2041727-d5bc-4c0b-a87c-2fcaa99388c7"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] Liang, Sheng. _The Java⢠Native Interface, Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb229377-395e-4388-bb3f-3716277ca28d"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Liang, Sheng, and Gilad Bracha. Dynamic Class Loading in the Java⢠Virtual Machine. In Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, New York (1998).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34f21c4d-fdbe-4bea-b159-ab467fba0fb1"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Lieberman, Henry. Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 214â“223, Portland, OR (1986).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c454836-2482-4165-93f2-77e86b398203"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Lo, Chia-Tien Dan, Srisa-an, Witawas, and Chang, J. Morris. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c9dd765-23d6-4904-8a77-23f8c9c7acd9"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Long, Fred. Software Vulnerabilities in Java. CMU/SEI-2005-TN-044 (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41f16c45-ff29-41d8-b45d-18f0efd1d1d5"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
[Long 2011] Long, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e436e07-cc15-4766-9e45-7c4316b74908"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Low, Douglas. Protecting Java Code via Obfuscation. Crossroads 4(3):21â“23 (1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48ade6d7-e9d9-4a2c-af6e-30aea6b05ffd"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 1998] MacGregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. Java Network Security. Upper Saddle River, NJ: Prentice Hall PTR (1998).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b379ba3d-c106-42a1-881b-ef7024bc9e3d"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Mahmoud, H. Qusay. Compressing and Decompressing Data Using Java APIs. Oracle (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64720c94-2fc4-42f1-ad63-09b4fe0cc0c3"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Mak, Ronald. Java Number Cruncher: The Java Programmer's Guide to Numerical Computing. Upper Saddle River, NJ: Prentice Hall (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6dca64ae-7ad7-4b37-9d01-ac11bed3a5aa"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] Manson, Jeremy, and Brian Goetz. JSR 133 (Java Memory Model) FAQ (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae58c3bb-d38c-4fed-a7ac-d53718963508"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] Manson, Jeremy, and William Pugh. The Java⢠Memory Model: The Building Block of Concurrency. JavaOne Conference (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21fd13c9-2812-41d8-b3d1-29c7e0fc1aab"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57â“62 (1996).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03f67361-993f-4bc3-8823-90e2f22df34b"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] McCluskey, Glen. Java Developer Connection Tech Tips. (2001, April 10).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7231a7c8-918d-45a9-9281-d0b09c7a085d"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code. New York: Wiley (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ff5021d-d1a2-4817-b395-2a25811c4d8b"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] McGraw, Gary, and Edward W. Felten. Twelve Rules for Developing More Secure Java Code. JavaWorld.com (1998).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc328035-77bd-49f8-804f-211351065235"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Miller, Alex. Java⢠Platform Concurrency Gotchas. JavaOne Conference (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c916ef3a-f6db-4cf5-b1ae-ac69cd2aeeb0"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
[MITRE 2009] MITRE Corporation. Common Weakness Enumeration (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="499505d8-c457-44be-9ac5-4b69e698454a"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0460c68d-f0f4-47f2-a791-7660e9565de9"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Monsch, Jan P. Ruining Security with java.util.Random, Version 1.0 (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d45dbf8b-cac3-4b10-953f-41d7f58e1eea"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Microsoft. Using SQL Escape Sequences (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="81369d65-1546-4a45-9838-0c9404fab8f5"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] Muchow, John W. MIDlet Packaging with J2ME. ONJava (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb8db096-f11c-4431-be19-e4012bcb500b"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Müller, Andreas, and Geoffrey Simmons. Exception Handling: Common Problems and Best Practice with Java 1.4. Sun Microsystems (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30dc3fc9-8ce7-4cf9-82c1-d1f8a01d3d10"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006] Naftalin, Maurice, and Philip Wadler. Java Generics and Collections. Sebastopol, CA: O'Reilly (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8702c5de-0ed1-4513-9157-ce3096619c8a"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Naftalin, Maurice, and Philip Wadler. Java⢠Generics and Collections: Tools for Productivity. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95a5c20d-5366-4caf-b5de-c7f5ee1086bd"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74â“88 (1992).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac9e51df-1e6e-4654-a1f8-7a3bd50546b9"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Neward, Ted. Effective Enterprise Java. Boston: Addison-Wesley (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20944482-9b95-49dc-a1ee-5d08524f2844"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Nisewanger, Jeff. Avoiding Antipatterns. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="654abb75-ef90-422f-84c7-268890f0f7e0"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Nolan, Godfrey. Decompiling Java. Berkeley, CA: Apress (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7845304-d9c2-4645-9dee-04095d80308a"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62d28e0d-0d57-4b21-8194-22c6097c58f9"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning. Oracle (2010).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6201b69b-d21a-45da-a4eb-ded04b2009c6"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] OWASP (Open Web Application Security Project). A Guide to Building Secure Web Applications and Web Services (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="610cf157-2ce7-4ca3-bc17-c97511e85edd"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] OWASP (Open Web Application Security Project). OWASP Top 10 for JAVA EE (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a15c557-d68a-4d14-ac07-cf075eca975c"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 2008] OWASP (Open Web Application Security Project). (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77187615-396e-4711-aab5-112a7288da48"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK). Oracle (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16e1a0af-7b9b-4f34-8dd7-7c13d742ef7c"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Philion, Paul. Beware the Dangers of Generic Exceptions. JavaWorld.com (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff52feae-58bb-4047-9cdc-642bd4b9cee4"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Phillips, Addison P. Are We Counting Bytes Yet? Writing Encoding Converters Using Java NIO. Paper presented at the 27th Internationalization and Unicode Conference, April 6â“8, Berlin (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07e2eae6-3707-4819-9fe4-845e4cc1fc7c"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6430a03d-94ee-4220-bab2-e4f27ad99d04"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems/Oracle (2002/2010).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0db507bc-b82b-4385-8016-a6727f628ad4"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] Pugh, William. The Java Memory Model (discussions reference). Discussion based on work supported by the National Science Foundation under Grant No. 0098162 (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b371aa4-a9fe-4235-874e-b3dc8fa2d42b"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] Pugh, William. Defective Java Code: Turning WTF Code into a Learning Experience. JavaOne Conference (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e005953c-a91d-4522-a56f-2c5e9f101935"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] Pugh, William. Defective Java Code: Mistakes That Matter. JavaOne Conference (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe2bd5b7-d842-4f6e-bf25-f5b9ebcd85ec"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data: Tomcat v 1.4.24 (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25eaa166-5f8a-4ed8-a87a-ce57069331ba"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Reflection. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aba1c953-2c0a-4174-af65-90c3fdf92f08"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5108e36b-a76b-4703-a475-2ee8cd755f82"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Rotem-Gal-Oz, Arnon. Fallacies of Distributed Computing Explained (white paper) (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc6f4f00-759a-4096-872f-8c96953818c8"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003] Roubtsov, Vladimir. Breaking Java Exception-Handling Rules Is Easy. JavaWorld.com (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d308e1e2-c94c-4488-8c0f-a774017b2c0a"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Roubtsov, Vladimir. Into the Mist of Serialization Myths. JavaWorld.com (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bba433ed-7ca5-45d8-98f8-3d0ec2912bdf"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17(7):388â“402 (1974).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22a3754b-b977-4e26-b3c2-e38f41bd63ad"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] Saltzer, J. H., and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE 63(9):1278â“1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8068e50d-8b4d-4f40-b8aa-dfcba8ad0739"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0. Sun Microsystems (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bade2dd2-955b-4957-8708-a7ff7c9fc4d2"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0. Oracle (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bebc7a7-be25-4dc0-ab1e-d5b2b96b4c8e"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Schildt, Herb. Herb Schildt's Java Programming Cookbook. New York: McGraw-Hill (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b61a3510-3879-4da7-9602-11e981276494"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Schneier, Bruce. _Secrets and Liesâ”Digital Security in a Networked World_. New York: Wiley (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aad4727c-c4c5-4e20-9200-e4275a6b9171"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
[Schoenefeld 2004] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com) (2004, November).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="744f2936-81eb-45d3-a847-4269327cf0de"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Schwarz, Don. Avoiding Checked Exceptions. ONJava (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10d278a1-e302-4a7b-88ae-f3b638e81887"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Schweisguth, Dave. Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide. JavaWorld.com (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d803e57-4520-42b2-b0ae-80ead4f719b5"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] Sun Developer Network. Sun Microsystems (1994/2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff882b8e-6f12-469f-b760-ca9c04265f3e"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston: Addison-Wesley (2005). See http://www.cert.org/books/secure-coding for news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7faf77b-2599-4580-ae20-e47c0b064741"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Java 2 Platform Security Architecture. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c491e9ee-fef1-46a9-ab03-d0ddb68b4d79"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9197ef6-9273-4fd7-882d-67cbc3b838ce"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] Java Security Architecture. Oracle (2008/2010).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03be5af0-cdc7-4dfb-95a5-0fdd88014ef5"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Sen, Robi. Avoid the Dangers of XPath Injection. IBM developerWorks (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d53bdfd-5776-4d3d-a358-fe2ae1d2af57"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Steel, Christopher, Ramesh Nagappan, and Ray Lai. _Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management_. Upper Saddle River, NJ: Prentice Hall PTR (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a09c7066-7a5d-4d43-aa69-0c2c3e3b4f67"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] Steele, Guy Lewis. Arithmetic Shifting Considered Harmful. SIGPLAN Notices 12(11):61â“69 (1977).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="092da4dc-4d76-4d89-b3b1-e06c27fe0197"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Steinberg, Daniel H. Java Developer Connection Tech Tips: Using the Varargs Language Feature. (2005, January 4).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de99de9d-0dcc-4e97-96b2-19f61ceea963"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b784485-b2d3-4083-85c2-e160ee3a0dd2"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] Steuck, Gregory. XXE (Xml eXternal Entity) Attack. SecurityFocus (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23263051-2d0f-4b77-94e3-ea89eef69801"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated? Oracle (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ad8bf83-f0a6-48f2-bd71-11b42879c33c"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide. Oracle (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="381ab841-559f-4da1-a8c1-0ca0a58f5211"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 Documentation. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0bbbbf3a-cd93-4fb3-a9d3-5e2bda5cbdec"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture. Oracle (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9d81c13-d48b-4de0-b35d-2acb3ec0d658"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. Composable Thread Coloring. In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. New York: ACM (2010).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76a560f4-fdf1-451b-9113-bb70889ce696"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Tanenbaum, Andrew S., and Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2nd. ed. Upper Saddle River, NJ: Prentice Hall.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7271cc2-e9f7-45ac-909c-e4edc5fef4db"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] Bloch, Josh, and William Pugh. The Phantom-Reference Menace, Attack of the Clone, Revenge of the Shift. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0681fd3-5de1-487e-bfd2-5cdc257586bc"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Tomcat Documentation: Changelog and Security Fixes
. Apache Software Foundation (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69c824d0-28c3-499a-9475-4dc81464f600"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
[Tools 2011] JDK Tools and Utilities Specification. Oracle (2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cb3ddc2-4994-4ebb-85d5-8d8601d0bf57"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials. Oracle (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6384e617-93fe-4629-af55-c52dfef25401"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by The Unicode Standard, Version 5.2. Mountain View, CA: The Unicode Consortium (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a02de99-9556-4c55-b1cf-c54f91041d04"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Venners, Bill. Security and the Class Loader Architecture. Java World.com (1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8edd720-37c1-400b-a50d-5f146c88e84d"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Venners, Bill. Failure and Exceptions: A Conversation with James Gosling, Part II. (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="059199e9-6561-4a11-9d88-59fb1d8c3cbf"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Bray, Tim, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau. Extensible Markup Language (XML) 1.0, 5th ed. W3C Recommendation (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8144259a-b3ec-467f-96de-ef1609c872a6"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Ware, Michael S. Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools (thesis). James Madison University (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5592820c-9c8b-41d6-8db0-ee3c2b35c9c6"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Weber, Chris. Exploiting Unicode-Enabled Software. CanSecWest (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="281051d0-01c3-4963-a97a-db10ae660e75"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] Wheeler, David A. Secure Programming for Linux and UNIX HOWTO (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59bf8a17-495d-4c61-951b-90cd505bb3dc"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] Zukowski, John. Java Developer Connection Tech Tips: Creating Custom Security Permissions (2004).