You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 11 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8da7076a-fed9-4903-a621-d7b4e5029267"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc778596-7723-4ffa-8429-bc072417f681"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="569b8947-8130-46ba-a4b2-5d400e46d579"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="807bab75-13a1-4da6-81f3-0dbfeda30d2e"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b219eeb-854c-48f3-8bcd-a9c5c835f7cb"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
[Concurrency 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d34e2044-8325-4b38-8efb-a352daf80f2f"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
[Cookbook 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a11b5e5-dba7-4e17-a59f-c727fb7320e2"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13e24a4d-1388-4cb3-a613-3dd625057149"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
[EJS 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23a6a308-99aa-43e0-9e4d-04653c25d3e1"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ace49e95-8c65-4023-ace6-22b1dcc35706"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b234775-bd36-4ca2-8a2c-f92d77e24414"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3289334f-2ef1-4031-8101-3e33c0794f11"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation ver 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd19bc18-c3a7-41d9-bd12-efe7a01bec7b"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccf52ef1-2e25-4dc7-abee-010d3a706d44"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
[Java I/O] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7c3599f-6eac-41d7-8c48-c1e56a3b7feb"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
[JNI 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="304f9d35-cd1a-4f75-9331-f26dea32bca8"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro>
[JNS 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff7cefdd-ee78-4830-9da1-91d8dc1c7d34"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23f630e3-785c-4b59-8ad6-c0a19504178b"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f22d7b8-5758-4209-ae27-b2aa502ce61e"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low, http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db77b32f-1762-463e-8077-df438c74eb24"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9bb1150-abc8-420e-997a-db6a1d13768f"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f6c0797-e1b6-4ba5-b96f-f74b2b51f4f4"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler http://www.brouhaha.com/~eric/software/mocha/ (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98f21945-64c6-479d-90b3-9b2b25a55c3b"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e0ed265-8e54-4b0e-a000-ee0ec9504675"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
[Patterns 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb3c2e77-82dd-4f88-a57a-f1dcc294e990"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
[Pitfalls 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc958b0e-d41d-4a01-96e7-881f9a68dceb"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f74810d4-6c98-4d9f-8481-e48635b900e4"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5209eaec-1616-44c4-b128-39a8da252ba9"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro>
[Secrets 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a934c2ac-1a1a-4b34-a007-b0c34964eb97"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

  • No labels