
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="acc43490-fa9e-4c8d-868e-dac5afd3b819"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac8a506d-b86e-4886-951e-12053988ef5c"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d2ef363-991c-4de1-9568-e01fefc3aca6"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4e52a63-181a-480d-ac91-61a4f7b65676"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
[Concurrency 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3929cfd8-bc1e-464d-b3f2-f764e78183a1"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
[Cookbook 04] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc9abf5c-c73a-43b5-8447-a8cf1268be6e"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef60be8b-da94-42c1-900b-864713995b31"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
[EJS 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bcf166e-9afa-4e57-8279-d9e663c1ed3e"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="568eaaae-7bbf-48aa-997f-ef99e4ec620b"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1cd03341-db6f-402e-a48f-efbb0d3db84d"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12c26e7f-7446-488e-a85e-dd7c6d0f49ae"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation ver 1.3 (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c075022c-1e94-47af-aff7-22d4e4dfb7a1"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5649e48-f7fa-4410-8de2-9c6d958fa457"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
[Java I/O] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0154b8c-0ea0-48d9-9cab-5be91cd43ef6"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
[JNI 97] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d41d53ce-39a5-4f0f-a37a-c8ba25df8db1"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro>
[JNS 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e896ba7a-cd5d-44a9-b692-071e520b5030"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f1c1a49-f346-4957-9ae2-6bfca6ce4f61"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb947699-f96d-49ed-8977-f0cbb6843129"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4b14fee-6144-4679-9558-56b1564f7cac"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4635a8c2-391c-4bb9-947c-c3876e4fc36b"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
[Patterns 05] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7cab7eaf-8915-4291-9769-8e4b1f7b6011"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
[Pitfalls 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b57a43cf-64f9-4329-8e46-2eb711839b2e"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbd21691-7766-4c61-928c-0bc4e59137bb"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="850cf1b0-948f-49a3-b665-fa929897583d"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro>
[Secrets 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e203e22-611b-4ee6-a340-4d47527272fc"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)