<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80b1648a-b86d-4b12-8120-9a209c85ecba"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 96] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8195ddd-178d-4274-8050-153fd5de2f12"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="847b398d-563e-4d43-a82f-982aba220c59"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform
, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe2a6f78-23a7-4a9c-9a46-85bb4e85123b"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro>
[Bea 08] Packaging WebLogic Server J2EE Applications
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf63b1bf-3f97-47e4-8966-e1458ee952e6"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cdb58464-75bd-41b8-ab8f-806fd85e51ee"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8eed1cc9-264b-44c4-910e-171fb9185f47"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="166c8d72-00b7-4cba-a0f3-4b34f66ea827"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath
(1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="955481ad-946c-40fc-84e2-4674ee13ed62"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 88] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="639d8d35-9d90-4ded-810e-e987fedaeb54"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07a37466-0195-4987-afec-f8289b26945f"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading
, ONJava (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2bb685c6-7148-4ee6-a69b-a01eb345d43e"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 08] Common Vulnerability Exposure, MITRE Corporation (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57d77f13-0985-43b4-b308-af1000b8a712"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 04] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bef1be1e-4a3c-4335-9e93-e938a54e76ac"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 95] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4fefa069-7dd6-405e-86b6-26c28f5d31e7"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't
, by Michael C. Daconta, JavaWorld.com. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f27b25e9-88e9-4948-bb1c-8aa3d3e91c0f"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63c1b385-b5f5-4fef-ad36-64d0bacdb72f"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78323791-e08f-4bc2-b117-2aff73019a3a"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling
by Gunjan Doshi. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="854c466f-484e-4ca4-a084-1c260af3e472"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 08] The Eclipse Platform (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d22f80b8-0e7a-48f0-9733-e99d05f707d5"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6d72af1-821b-40c2-9119-7a065fef132e"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f48203d9-0dfe-4a25-af87-ceb179d0605a"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a99dfe05-904f-48c7-9bf5-5f65bc547c52"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c905429-d7ca-41b8-8d60-2b521f84374f"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 01] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3610aa9-492c-4644-9e9f-cefdbcd05fb0"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 08] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17fccaaa-2a02-4e84-b2a3-709a4ddbc4aa"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 95] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4f30e95-3690-4555-9872-5e929606c0dc"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c600826a-0029-4441-8f8b-295d821f22ad"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ced88dcf-a6fc-4bd1-ac70-d8ef49f11834"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic
. Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5fdcf149-e44f-4cbe-9eae-4b06cf6790aa"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c6c89373-e558-45c5-adc5-03867fa7991b"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API
, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a11a0d35-5eaf-4448-9f13-8fc2fecb6a7e"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary
by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ca1597d-6b6a-4391-8142-031b34c50dca"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can
, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36fcc7c3-9680-40dc-98f0-d5964de5488d"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 00] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="668ab17c-73e0-4251-99d9-ea78058f29fd"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 01] Java Developer Connection Tech Tips
, January 30, 2001, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba149351-4432-406d-a28a-dd19bbc290da"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8dc3c7ce-8f31-4580-89d6-95696134c1f8"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de6ec5a0-2dd7-4303-bb76-9e30e9326536"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 03] Null Object, Something for Nothing
, by Kevlin Henney (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff7b08d4-c0c9-497a-b49c-054d9a4693d7"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 08] J2SE Documentation version 1.5, Sun Microsystems. Jar File Specification
(2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ecfc8e74-ed3a-4e0b-8f39-12a230bca2ca"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 99] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4989fb6-35ab-4b23-a4f5-6f89a4676ec3"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3
(2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08e09d9e-1df4-49f5-bcb4-d458210c6bd7"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html
], Sun Microsystems (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6394ce9-984d-450a-bc65-1828fc62a4ab"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 99] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75e78f0f-7e8d-4235-853e-1ed731a4b69f"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 04] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9e6ad4f-f196-43df-aed5-2147a600ba45"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 08] Java⢠Platform, Standard Edition 7 documentation
, 19 Dec 2008. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fea9013f-c812-48a8-84d8-aa99325385d9"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification.
(2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df6425ac-7c0f-4c2f-bc7b-4b0b90d36f56"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a8a2332-2458-40bf-8c92-5cdc890f29e0"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro>
[JPL 05] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d603359a-8e57-457d-a228-bb3f34d9dd11"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5478650b-4a47-4fe7-853d-3884fd9a98fd"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9c9ca91-645b-4efc-a6ee-89b8885f5c73"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="013d1b3a-917b-4e69-8d52-66e8e7f7ba4d"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="798354e2-90a0-4380-953d-8b976a17cb15"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f01c45a-d400-40eb-abdc-854740f8e81b"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7992b07f-1b09-4274-8617-2a10861feaf0"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab301073-b7d9-4e82-be00-4b9ba4f30185"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d9fb50d-ef0e-4799-b3b6-941680b32c69"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 08] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1850311c-c5a2-4c96-99ca-dfc41ee2040a"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html
, Angelica Langer (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b586c655-f1a5-4ad3-81e2-a9986dbe3b8e"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e503cf70-3c70-4c2a-abb0-52f9860feed1"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15fd68f8-aa09-4a01-bab4-eea2c0a087f1"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java
, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6398b22-e7e1-491d-885b-186ff24c77d4"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation
, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8deba935-51e0-4cc1-a68f-e44ab83caaa3"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="697854db-5403-4bfc-91a5-cf25952e0c65"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3716f7e1-13df-41da-9d2c-01a4a31fd0b0"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 01] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cb162e2-16b8-40c8-99ff-15a43f7b0dd8"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9b1470c-8736-4ff4-9cb0-de91536c2de5"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code
, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa014723-b115-4951-b1e0-bca635648615"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82ece05e-5a1d-4348-b0cb-6474be45720a"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 01] MIDlet Packaging with J2ME
, by John W. Muchow (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72df65f2-fa18-4ba1-ade8-0604be9821e7"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4
by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc384ae6-8c5a-42af-bb42-28adf907a7e8"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65721a17-3dc1-4e1b-bc26-f86aadfe6035"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 04] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc92f98d-8c2f-4073-a3ed-21434096fd75"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 07] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="015354c1-ec33-44ef-b8d5-b38a46e1d90b"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="844b833f-7781-48d0-bd3b-d5211f4c144c"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="437cfeda-f73c-4288-bde8-31532768594c"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro>
[Patterns 02] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee7a2971-54d5-469d-b5a9-0bb329a462aa"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 05] Are We Counting Bytes Yet?
at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f61c2ee-0aa8-4854-a03e-ed39f9d802b4"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4f66483-4c7c-45b4-96c6-1ec00559823e"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax
, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee14ae9b-bc57-4ab6-864c-375d8de8ec23"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8bfc432b-378b-4365-a2fa-c7edf79d1771"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c34c363-0ff4-4820-89fd-0a6ad8759122"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b56a2249-eb2c-432d-a6a5-2699ea06eaa4"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fee85f71-6b33-4f87-8003-99dc0d1d0a46"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26768957-3a3a-4fc5-9521-35f3be09bdee"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daa8d49f-6494-4975-b44a-e015c53dbe68"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 08] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afe36972-d339-4d66-8ccf-5a6d1dd77243"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a024f21-1317-477e-bd18-c1efb328cfed"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 08] SUN Developer Network
(1994-2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1772c8d7-d5c8-4694-b506-a3def2f698ac"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 07] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, by Josh Bloch and William Pugh, JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93e84b8a-8449-486b-836c-efe7b2bada12"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6412f6f2-305c-4fc9-a9c9-f608f0dfc8b2"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html
Secure Programming for Linux and Unix HOWTO
, David A. Wheeler (2003)