<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f83a3bce-36a5-4fa9-9798-66a2e2992e75"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="450aaf7c-2a18-4857-8703-d26a8e14594e"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 00\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc3368a8-9db2-40f6-a777-2f9d0640458a"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 01\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43a17a27-8cc4-4f9d-b11e-e91c829abcd8"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="700bc2fe-b4fb-42da-850a-4aa7e906254b"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12ff7b80-f4ed-4b21-b664-e63026c262ed"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a9ac1d9-a819-44e1-961e-d98cdc57c793"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a54233d-204d-47c1-88f4-ac961c2f79ad"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e3225b1-7abb-4aa8-b28f-68a34bbd8b9f"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed8f08e9-85e3-49a1-a847-924b751a2734"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0ba6534-9267-4076-a14e-a8145eb0460f"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="903969b1-8467-4bb2-beca-e150786c64c7"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17bf448e-b063-4b23-8c27-203c45a26e87"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d15e2cc-3f7b-4ea2-bf6e-67cb8e97ac8a"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 03\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aaeb3c33-fb6a-491e-996e-f73c0adc7552"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3bda974-3da8-491c-a091-9648f98896f1"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65b425cf-45bf-475e-bf71-575a29b1773e"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d92a8ab1-6546-480b-8779-2bfee14fca4c"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 91\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73aa1b5e-4c20-459b-a56f-d45bccc83318"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="131b71b8-8ef4-4c07-af27-d188e8ee76b3"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 00\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1214d72-31e9-4ab0-ae1b-94fe654a75e9"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0705a64f-549e-47ba-aba5-10b0de8ac00d"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 05\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="012c2b1d-730e-4a00-8475-5b11443d4223"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4fa3f6e1-3117-42ed-b7ba-48c0fa6ca3d3"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 99\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8d8f702-6181-477b-b417-a70c9303afd7"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8cb00793-3777-4849-b72b-3827bbf5114f"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7c381e6-96cf-408b-8539-3385290df717"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro> \[JLS 06\] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0987b343-e9ff-47f5-b881-3047e1c16f7e"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 06\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="531708c5-323a-488c-8cdf-fca94d2e44a7"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 06\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13803706-4732-4264-8023-1ec5aee72cb3"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 06\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e7be033-0dc9-4f07-81fa-8dca104ad591"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 04\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc6d2c5c-2408-49be-a2c1-0ee0a1e87c93"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 06\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c79f6096-6eb0-4fc6-8006-be59944f7908"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 99\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="149f5f22-d971-4d63-b391-49e068887950"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 01\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9952efcf-90a2-4698-b66d-9df437892bfc"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="158cc124-e824-458e-99f1-e4ccc6b7261c"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79337345-d6bc-446c-bdd9-6d41c188ae62"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48427d1c-f9f5-45d7-9fbe-0dc42cc3a83d"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 05\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fe1e7a1-d00d-44d6-9ec2-28ed43f53c54"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2272e80e-b55e-4ce6-9861-310fff09b324"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c19b35dd-849d-4f08-910c-5acc78d7f147"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71003a3c-b35e-486c-92a0-d654c7d9f519"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="229747bf-6f3e-4558-8a2a-b04d3dbd0274"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78c8357c-1acc-4894-a272-61ac1d6e9dce"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7c5ca45-1354-4f16-ad85-57520fdd0f77"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6eca5fb-b4c3-4357-bb12-7589d70e91fd"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf2c2cb3-fb27-4181-8f39-1f93c5efeeda"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="943875e6-8d1a-45e2-9904-bfc45f6610ca"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 02\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e40ec1d-8559-43d6-9c01-9a7a5c819b18"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 06\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2476e5ac-9249-4fe4-bc58-20562ca7f2bc"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02a51608-e787-4c32-a15c-9c54f58470f5"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9f9060c-7e1d-4159-bd66-755866755757"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 05\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e9fbd80-7bae-4e52-9f0b-cb0c9ed4950b"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8d0822d-2d32-4576-b0b9-c78c3b5ac146"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3943be8-bdf2-4217-8c51-7e14e095c13f"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="309c3bcf-e712-471d-9ad5-8690b21abf2a"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 05\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava (2005) \\ |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4a512de-5b3d-4982-ad37-4c21ff095d87"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro> \[Mcgraw 98\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com (1998) \\ |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abc7ef5a-1ed5-4e05-aa69-b50e2aeb5b5b"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] [|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html][Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler (2003)\\ |