<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a81162f-957c-45c5-98c4-782027643cd3"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 96\] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f38d87a7-e6dc-4649-95ec-ba0aa0267c49"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce49c481-c37d-40cc-8ac5-bae4b6dd3a8b"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 00\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e38ff94-fdf4-414d-8572-2feb52c8a89e"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro> \[Bea 08\] [Packaging WebLogic Server J2EE Applications|http://edocs.bea.com/wls/docs61/programming/packaging.html] (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9073954f-996d-4346-9730-5cdbbded47dd"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 01\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00ae41de-2b96-4fd2-9223-54c093010825"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a974ca6b-bd63-496d-8d1a-4a7d68469ace"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2e4f077-c7aa-4b3b-8adc-7c7a98224de9"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro> \[Boehm 05\] Finalization, Threads, and the Java⢠Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c22494c-a2a9-470f-911e-e6b8115b0305"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8710ea7-ba0a-4929-8b9b-91aaf3f86a2b"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro> \[CCITT 88\] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5850585-7a76-499d-8028-98341db8e1ed"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19d9889c-b08c-4d70-84e1-b0f98ca1ed8e"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro> \[Chess 07\] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="219d722a-9f76-4f02-a854-8463c9a70bda"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 05\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80123a94-c11f-40f8-ba79-2463f7fd8739"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro> \[CVE 08\] Common Vulnerability Exposure, MITRE Corporation (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a445bde-4fc3-493b-b0c0-ca6c1b8f77b2"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro> \[Coomes 07\] [Garbage Collection-Friendly Programming|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2906.pdf] by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0ca3f37-18eb-497e-ae18-7414bc06334d"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 04\] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4007a058-1b3d-4a92-bfad-7b322f2b6eb7"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro> \[Cunningham 95\] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd14df18-8799-415c-9078-7c73749f5842"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86297321-72a6-486c-9cbd-3aad6728635a"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d96fd29b-2890-49e5-961b-81f497a7c506"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b09142b8-594c-4603-9832-6d2db6829624"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a45e141-16e7-4223-aa4e-b11e247c5968"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro> \[Eclipse 08\] The Eclipse Platform (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8cf0b71f-34de-43da-bbcc-f41a4992a231"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0cc0275a-b33b-4fc0-b41a-79ad9dce345a"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro> \[ESA 05\] [Java Coding Standards|ftp://ftp.estec.esa.nl/pub/wm/wme/bssc/Java-Coding-Standards-20050303-releaseA.pdf], prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56fb5ab6-c41b-4a28-97fb-5d9634dfaa04"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2d6b54a-7aa1-44c3-bf4a-e7fbe3f4df6c"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 03\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55227c9d-19df-4813-a442-d68b6927e33e"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c049405-96bc-4fab-a591-4b8979a935c8"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 01\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="754d1741-4395-4747-bd0c-4de9441aa45d"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro> \[FT 08\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c1f9f42-3c40-4552-92f3-235e5d8e593d"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro> \[Gamma 95\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4210f5b-3c2f-4dfd-9bd7-b825f5efd13d"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ee47d3c-8775-4eef-abbd-d082a975652e"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro> \[Goetz 04\] [Java theory and practice: Garbage collection and performance|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cce2e59-8216-4731-b122-d4252c61d4b1"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro> \[Goetz 04b\] [Java theory and practice: The exceptions debate: To check, or not to check?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef2d9a50-b19e-4311-bc4e-1ff6b504dc34"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro> \[Goetz 05\] [Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c02e28fb-029d-4aaf-a0ff-a809c4618c22"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b516b57-499b-4138-bf2e-972ed12331bc"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro> \[Goetz 06b\] [Java theory and practice: Good housekeeping practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19f4468e-e2df-41cf-b8e5-3c39edbf3316"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 91\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5874223f-a98e-41cd-a700-a235cbfc8045"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0b4b475-fa5c-45c1-b502-ead5e16743b6"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 00\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e232e61-2efe-4d7e-ba57-b836ad260ebb"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80db7da0-a043-452c-a34c-d8547cdd7019"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 05\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a094435-b858-496d-a233-a8344962ed7c"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 00\] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7ccf398-291a-4ec4-b80f-599513883c42"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro> \[Halloway 01\] [Java Developer Connection Tech Tips|http://web.mit.edu/java/JDCNewsletter/JDC-TECH1-01b], January 30, 2001, by Stuart Halloway. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fc447a8-5b66-4c0e-9b00-24b885778d65"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d6d022f-a336-416d-8935-e896794291a7"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 99\] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ccfccec-79a4-4e89-b2f5-62c069388edf"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro> \[Harold 06\] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03488742-5f31-4ffb-ba03-91eebf8e9b0a"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro> \[Henney 03\] [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1472f56d-b4c6-4fbe-b730-302cccb65d23"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro> \[JarSpec 08\] J2SE Documentation version 1.5, Sun Microsystems. [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html] (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cfe0b8a-756d-4f95-be9b-903ac2461aea"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro> \[Java2NS 99\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0924c20b-dfdf-48ee-809c-bad9ddb50260"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="914aed3f-c3cc-462b-ada4-69e9052e894f"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 04\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="380cf207-bccb-4ae7-b816-4a8f76fbd9aa"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro> \[JavaThreads 99\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b87f2c7f-ca19-4e8a-a5df-03cc9fb6435a"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaThreads 04\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffe596a5-4967-485a-a8b1-561971aafd9c"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro> \[Sun 06\] [Java⢠Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html]. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ff2478f-b731-4d45-9a88-ccac64b6471c"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 08\] [Java⢠Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], 19 Dec 2008. (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21e712c0-30c4-4b61-8a7f-1a61f825b3ad"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3fd1db6-8af0-46aa-8da4-8306ef6f7022"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro> \[JLS 06\] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b21e99ba-7916-4a78-8916-b74a9641bb16"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro> \[JPL 05\] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c42eb0b-4686-4fd2-8d90-e8f55a5c6c53"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 06\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="986ea92e-1a7e-4263-839c-b5fbdfc45715"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 06\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a49ea75-f13b-4ea7-96bd-0e628eccc2a4"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 06\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c547551d-52d5-49d9-8d33-418bd298baef"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 04\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41f3c17f-f8b2-431c-b3e6-e45ec2c6a969"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 06\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e6f9f7a-5dd7-46b8-928a-ebc007bb19ec"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 99\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0df6dec-11c8-4e5e-aeff-4c4a62ad9df9"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 01\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d25048f4-fe91-4a5d-a558-b88e67c7b979"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcf5e0f8-bd11-4af9-a8a8-8b567629e364"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro> \[Lai 08\] [Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems|http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4420062] (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9dac1db5-d575-42db-a856-825a59a6a3d7"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 08\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bff9663-512c-4553-9f51-0e5e5c062cf6"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b07ee1fe-3317-45a4-8aed-5b7568f1ddc6"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="061543d2-2b13-49c6-9aab-91c3619cf0c9"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 05\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f86d67ce-65ba-40f8-9e09-17fa3f64d7d9"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro> \[Lo 05\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a313c63-534c-4513-b4ec-d8fd5547fa3d"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d81a926-bef3-474f-8b3e-76d2fb05fafc"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07b82117-d020-4bda-b0b3-3a37cfc58170"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 01\] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55a2d877-e38e-455c-a279-1a6258c0fbf6"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4cfdda4-1bc8-404b-9a78-f9dff2238662"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro> \[Mcgraw 98\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com (1998) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2217b534-7af3-488a-b34b-c3c140e144a1"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro> \[MITRE 09\] [Common Weakness Enumeration|http://cwe.mitre.org/] (2009) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b69bd5e6-cf9b-4b96-a4e0-4c119cd2bb49"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cc02417-77bd-4948-a42f-7e51f8ea870b"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro> \[Muchow 01\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f977eb72-3358-4226-9aa1-67a6ac3e250e"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90339fbb-cf48-4ccd-9045-94d86882c1f9"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 06\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8aa905c-0f43-44cc-9150-4f464e5a8a9b"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro> \[Naftalin 06b\] [Java⢠Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8604cdb2-0fdf-4855-bf0e-7a98e80f2232"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro> \[Neward 04\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea2d917d-7a5b-45ad-97cc-33fd9df2bddd"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro> \[Nisewanger 07\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75b6d6fa-a9be-4f29-b3ff-f00b1df73ed0"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro> \[Nolan 04\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17e276a7-0406-4af7-a636-ebf9e644763e"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4371d4f2-f560-4552-b955-a5d0662732cd"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro> \[OWASP 05\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25cccfb4-fce8-42ce-8d84-8db66acaf99d"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc5d5fd5-fd9d-4dba-9d9e-4b908f6d2d4a"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro> \[Patterns 02\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d2526a4-9ce3-4fbc-bb0e-901bc66dbcb5"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro> \[Philion 03\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89cf34fe-ee00-42aa-a004-3995bdc5b527"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro> \[Phillips 05\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1eb2c946-63ea-4dda-bf45-d733523d5b53"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02ba03c0-23ac-4976-b455-0d56ccb963d8"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 02\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b96c2f3-eea5-4758-947a-cd3c5056e615"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro> \[Pugh 08\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30e131ad-7b63-4bc1-a412-6c0382c03dcc"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 06\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9957fb8-67b1-4deb-a343-30c8bc65bdc7"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro> \[Roubtsov 03\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc07e65c-7b77-4cff-ab6b-0569f53d9759"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro> \[Roubtsov 03b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b034301b-d706-4851-b0a8-005acfe6bbeb"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19e9d62b-6164-4297-8b4d-1fa153ae4c14"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 07\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46fc0216-c96c-4501-95fc-fd02743a3f41"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro> \[Schwarz 04\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e273e1d-ad1d-4c7f-829f-7f985a0bf428"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro> \[Schweisguth 03\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by Dave Schweisguth. Javaworld.com. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a5c80c4-879e-433b-9589-40167e93e2f1"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 05\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5897cfd-d2e5-4c45-828a-2f903c12abef"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79d7d8b6-8576-4bdd-ab3e-1f5f5c2d06f4"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9542e81-4a07-4a9a-b61c-3b03a9556fd7"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 08\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html] (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2f25b86-8e4d-4b15-8c22-b047e7fcbaa4"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6fe8ad8-afaa-4dfe-8eff-697c4db36b63"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 08\] [SUN Developer Network|http://developers.sun.com/] (1994-2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b605cc31-1321-4eb2-b13c-496cc387dcc6"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro> \[Steinberg 05\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], January 4, 2005, by Daniel H. Steinberg. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c43b3bb-0df1-45ad-bc8d-dc1646ebd261"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro> \[Sun 03\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/] (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10c076a7-1ffe-489e-b9bc-db8e5a391739"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 07\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36113a7e-e950-488b-a36a-36a261622218"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5558d34a-ddad-4295-bd34-140434eed0df"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro> \[Venners 03\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a000c14d-da36-4bf5-bdf8-5073c0ab1de9"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e29bc979-4b81-4b0d-8f1c-37ca00c94b3d"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro> \[Zukowski 04\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], May 18, 2004, by John Zukowski. |