| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c93591b2-9de6-4a5c-b50f-bbc28a1ebfc7"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80688f6b-990e-4a8b-86d2-1cd273c08827"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e536598-ea51-44f0-9b35-08ee24b8370f"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b20539d3-6da5-4e3a-aa32-2fa4cd0539a4"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9229d562-62b4-480b-bbd7-edd5abbff974"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6689a567-f603-4eb7-8a7d-a64d549d64bd"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc8d1f9a-4667-43e8-a278-4a6c8a1c2964"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db79c96b-9285-49ee-bcf8-32ded471aace"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="612bfbc8-2615-4380-8eeb-58530da4ae60"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32986d90-86fd-47ac-b1a4-aafbd6773b2d"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf1adeb9-6708-4023-ad75-87d8cf221e91"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ada45d75-0190-4593-a099-95521668c2a4"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52a41861-448f-48f0-bc2c-c72d62625c85"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c851dc2f-2374-4ca8-a134-b3e1f9112de1"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71e181ae-50a4-499a-b200-727db79b53b8"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffce08f5-c1b6-4ac7-9676-f1586b1d2bac"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 00\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82f4b10f-6810-4989-ac88-06c2652989c9"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77d5aa56-7e15-4342-afd6-376b6eb75b76"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15f3b9f8-bccd-495b-8e08-b3478fc7a866"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9203d9d4-9f6e-4219-b891-91cf5dcc8c6a"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 99\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b828ae8b-49c0-4868-9cb9-0d4c42afdf7c"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2f4531b-34e9-4f0f-9c9c-ab6cb0010134"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2405ab2b-b3ce-48dc-b0c2-57832bd6b4a1"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro> \[JLS 06\] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a1233d0-f404-4090-bb01-d9f4020af9a5"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 01\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18822ba2-50e3-4946-ba98-680822b6197a"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="521ef9d1-88e5-4c44-a389-8c3ecdb5a174"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de73d412-12d9-41ff-94e3-3d7821b95d60"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f866479d-d4ed-408a-a50b-85e9fd2876db"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac369ac7-c957-478a-b2ad-52b9bff6a845"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55284354-b971-4ccd-9997-3cebda984b3e"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd3e4f20-e655-4505-a875-59a16b6657c1"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6103b5ed-49ea-422e-bed1-d37b411b2068"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c0f4bf0-fb34-41bc-8699-19032b0f3d6b"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85a9d41d-fe4e-4628-a594-8eb91ebdefbd"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74bbb0b4-93d6-4911-90b2-68e32e19a78d"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f0e3485-9c8b-4025-a93e-c9e28cfcf671"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19d0cd99-2328-4e00-965d-8bb4569a727c"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f886dcb5-9e42-4d17-855d-b2c55e6bc118"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fbd3477-f993-4eb6-a9ef-a506c01b7160"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) | 
| <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05c64d72-debc-4d02-a0bc-09ccd5ad6692"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |