You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bbc1d9ff-f22e-44ec-8743-2d7b7487d1e0"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3743fcf4-3964-470d-952f-de89865be18d"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69e55fb8-d304-4acb-ae61-d668c7982fd0"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
[Concurrency 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c2db097-51b2-44aa-884b-4736c31e7866"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
[Cookbook 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a78fda96-1286-412a-851d-51fe9ec7f459"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61c10b48-cbe0-4c3e-88f0-2e3a1b3ec982"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
[EJS 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2e52e1f-7fd0-4163-97ac-800eae90d1a5"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1a88d07-32ad-42e3-88ef-85753339fa08"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1e4bc59-4896-4125-905a-641895fb0509"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52af172b-e712-4d5d-9a34-c24b4cddf848"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation ver 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="226717fd-a657-4c6e-8aac-2a22f9515fe1"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30384bf5-d10a-45e7-a18f-25e52b2498be"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
[Java I/O] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e82b9108-0181-4142-98b0-b8bb3929891e"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
[JNI 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f54cf200-a1fc-4d95-8767-bc8ef2714966"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro>
[JNS 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3cb13dd-e818-4b72-8fe0-6235fda6c269"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3ebe2fa-c860-4007-9c7e-f8df1f0d56aa"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0eb48121-0c83-4687-9a09-eb84ce466615"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7adb8bfc-6f61-40c7-9353-8b36eb021f1e"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35a6e327-2858-4454-92cb-4c3fb40e5c7e"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
[Patterns 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23d51230-c0a3-40d0-a701-b2a589edea70"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
[Pitfalls 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2b42a4f-75f0-4517-b906-9f0e68759130"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aecd3ca7-d9fc-4524-af6d-1fd7974c519b"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro>
[Secrets 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e7953e0-bf2b-4d8d-aa3b-4a7220fcdd0a"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

  • No labels