You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 27 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03757bdf-a6a5-4e8c-9aca-b032ae9de074"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a83b6e4e-3d38-4349-85bf-720abfb47f0a"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="169d04e1-c220-435d-a477-130ac764bdd0"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4cc32ca-a95b-4cf1-b556-4d017abb4692"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f6756ac-1f20-4436-bd74-5facb6efd0d5"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1dce6677-313f-489e-8fc0-8074c30060d1"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fe97e6f-cf00-4d7b-bb15-8a452df657b9"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't, by Michael C. Daconta, JavaWorld.com. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d5b8669-810d-4cbc-95d5-b592db27765f"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57bbe6b2-14a2-483a-b0bf-a917c36fc0b3"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3525127-e9fb-496c-b971-a018e540122e"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="664d584f-6d10-4321-abf1-2ad42c1fb173"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8eb69fd7-fed2-4b4c-979d-fbfec49baf14"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="901627ad-a633-43c0-a13c-ebd10a28ddfd"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c91efb9c-c0b4-4b22-a40f-fd19e407c59c"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21552ef5-1ce4-496a-85c9-bf5e3a8ebd57"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="940c6857-de99-4d61-96d7-a593721d4401"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad4378db-e70d-4b3e-a79b-8ea58499aaff"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API, by Todd Greanier, Sun Developer Network (SDN). (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a146284-7ca6-4dcd-bbde-d4b3a96c9007"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6789409e-f4c4-415d-976e-2cb79e68555c"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f02abdb7-41d4-4f8f-9028-ab2dcf722c46"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89503db6-ae39-44f5-8db6-9445afbe4bdd"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54adfe32-339c-41a3-95b2-df863478ba9e"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce19bcd5-5f51-48e5-874e-7d1a2a06e56d"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07cde12b-2e83-4f6b-9152-a0799a187a67"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a785eb03-a759-4c7b-bcd1-d3f5c9de3e08"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2be3dad1-a4ec-4b28-9e52-11d4858e3993"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43f14333-2070-4161-9d05-026b2fed9f18"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f10741b-9124-4d90-a30b-273f9fdd1916"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4c37d15-bf63-435b-a849-78366148f122"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a94b63ae-ea10-4f6a-ade6-d269cfd0fe0e"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d0c17d7-3568-4f41-b54f-f3e60e8f3796"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89edcfcb-bf03-4a1e-b967-6dcbd3778644"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ecab28bb-dfdf-4ad8-8482-b286328ab947"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="086088eb-af4c-44c9-a1a4-15fb0ede38b1"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47a6987c-9b93-459d-a0b0-495e1c5301d7"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe9f432b-4235-4e86-9fca-67d4eb7f1d2a"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13f9be42-28c5-403f-85f7-10d6d735cdfa"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99f50f17-badf-4454-8d4c-c52913232ec6"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f328482-de41-450f-8008-9fee82c1304c"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6709cef9-d0d7-44ef-8f47-5814d5765515"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc2819b1-aeec-41f7-bea3-918387dd00a3"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac998d28-5b34-4e87-98b5-e70740716581"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b2b0a78-ded5-405b-90ba-07374fe87e68"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)

  • No labels