 
                            <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7f2dc68-553f-4085-8475-7babc7bb0c31"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 96] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78f47ce8-f93d-4a61-a664-3eeb53144872"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)
 (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3d27d58-acf1-4436-bb8c-07ed5b7bbe0c"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform , by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aee161d3-73c4-44ab-b6af-6e291f3f52b2"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro>
[Bea 08] Packaging WebLogic Server J2EE Applications (2008)
 (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dd17c25-6ff8-4459-83d9-3fd9b18e0a61"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8bd1425-81eb-49d1-a722-d0c217a28bdb"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f58cc8f7-aa95-4a34-adc9-4390604c7f8a"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05c42054-c71b-4d4a-bb57-19eeefdcdd16"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)
 (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b82f0a7-212d-44c9-9a5a-fef0b7908d96"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 88] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva.  (1988)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b6f063c-255e-427b-8c9a-d983a4fb0db0"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6051ce81-9a91-4002-968b-406cdeb6d2c2"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading , ONJava (2005)
, ONJava (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42d5badf-e4f1-4607-96f3-5cbe6550cd21"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 08] Common Vulnerability Exposure, MITRE Corporation (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfe5906c-1fc1-4fbb-bc0d-32076b9900e5"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 04] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="723d6c26-2a69-491a-b494-f0f69124caf3"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 95] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f028358f-9080-4171-8ff8-9dd231b3cc4e"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't , by Michael C. Daconta, JavaWorld.com.  (2000)
, by Michael C. Daconta, JavaWorld.com.  (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c319b49-2400-4a64-8662-a0e8debdfe10"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a4654ea-ce37-4002-906c-944258e51b7e"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f0eb545-15ea-48f8-a312-97a181b7b4bd"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)
 by Gunjan Doshi. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36157968-2a7e-4e11-8812-82756a92d442"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 08] The Eclipse Platform (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c9f2387-add8-4bac-9aeb-745f54305db1"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1cfd34b-1669-4f5c-88ae-7ac62aa3d65c"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)
 (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e848496a-91ec-4bb8-87ee-0bc9a0fcae13"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a8e0c72-9b75-4ec5-82ca-cac61e255c67"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f81b3ac-04a5-4d25-9620-75000a24bede"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 01] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb785077-ea80-49d0-95c8-a9d11fbe3636"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 08] Function Table Class FunctionTable, Field detail, public static FuncLoader m_functions
 Class FunctionTable, Field detail, public static FuncLoader m_functions
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ef99137-9385-4f2c-99d4-f5ce887817aa"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 95] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f11a9253-f675-4eb5-a711-0f18d2076b71"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfef7d6e-994a-4122-804d-936d1fa02f7a"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ad925da-011a-416c-a816-81869925b5d0"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic . Sun Microsystems, March 1991.
. Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b06912fc-3927-4d1b-a1d4-280bc0062bbb"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1609fbea-09e7-4bf0-bda0-5420d05e622c"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API , by Todd Greanier, Sun Developer Network (SDN). (2000)
, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cba7daf2-5fea-4f0a-acee-7767f5824476"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)
 by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c0551c6-5bf3-46dd-80bc-3c2f47be9884"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can , by Satish Chandra Gupta and Rajeev Palanki. (2005)
, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b38bc0b9-daf3-48aa-8333-9915d8a35859"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 00] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d1c7f49-7e1c-4237-94d3-1bff874f4db1"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 01] Java Developer Connection Tech Tips , January 30, 2001, by Stuart Halloway.
, January 30, 2001, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f3835d6-0722-4b3a-a8eb-64535d28be9b"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c196f9d3-1b91-40e0-8a60-966da85dbf6b"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5981ec06-4deb-40da-bf40-4e99ead834d6"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 03] Null Object, Something for Nothing , by Kevlin Henney (2003)
, by Kevlin Henney (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fc0d1de-0412-47a5-8bb9-583111f14d9c"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 08] J2SE Documentation version 1.5, Sun Microsystems. Jar File Specification (2000)
 (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72512e70-565c-4e4b-bc42-3f152c26bf30"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 99] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f12ea3a4-3d91-4251-9e0d-06b6c1e67781"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)
 (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="579a8b8b-6ce0-462c-b163-2d6b10fefebc"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html ], Sun Microsystems (2004)
], Sun Microsystems (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5e20cba-ccfb-4997-9b6c-cb4a56cd9ad8"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 99] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6fc6a6a-1611-4c48-9da1-840b34d91d0f"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 04] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2652a8b7-8752-4b7b-952a-c675a955c821"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 08] Java⢠Platform, Standard Edition 7 documentation , 19 Dec 2008. (2008)
, 19 Dec 2008. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7125371-bdaf-43f6-8885-e27da156c2b7"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)
 (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28cee8d0-8ba0-452c-b674-2aa036512188"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4783572-85db-4c75-b541-96d539a1276b"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro>
[JPL 05] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005) 
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7ade4bd-d011-4bd8-bc4c-98bfa77e0b5b"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform , Sun Microsystems, Inc. (2006)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a1587ec-6d9b-4a3f-885d-50b7d941ed00"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide , Sun Microsystems, Inc. (2006)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80147af6-4e57-4922-b5ae-5da962bbe3ea"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface , Sun Microsystems, Inc. (2006)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cd2fe05-b0a0-4a25-8828-e2663acf6e24"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA) , Sun Microsystems, Inc. (2004)
, Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a54edc28-0d18-447d-94bc-6c92e5a181fa"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI) , Sun Microsystems, Inc. (2006)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6699c63-842b-48e7-8a6b-45240bf5034b"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification , Sun Microsystems, Inc. (1999)
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac60aa8d-18d9-4c8b-bfa5-895fb907450c"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="944ade7d-8ce1-4754-9187-a8df645a81b6"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75f0f469-d5b3-4cb4-938f-8c07a13342fa"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 08] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems (2008)
  (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6609492f-bdec-4b98-9402-08fd1d4c1045"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html , Angelica Langer (2008)
, Angelica Langer (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="877b4bfe-fb68-4be0-8fec-b3acd7f7256b"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c6b5784-bd42-4912-a746-53e31d1377b3"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df8dc0f9-1529-4087-ba59-05be9711c954"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java , by Fred Long, CMU/SEI-2005-TN-044. (2005)
, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1904305-c0f9-4162-91c0-eabaeb3d0129"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation , by Douglas Low. (1997)
, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="058ed9bf-a9fd-41cd-b2ad-66d94bba976f"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9954a049-fb9f-4621-adac-cf6ff4bc5dec"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6292c355-620c-4214-a3c4-12f5fe6de35c"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 01] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4e633d7-bf7a-442f-acc1-c18381e5f17e"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba8ae8b2-a23c-4b84-a307-08e5ea094502"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code , Gary Mcgraw and Edward Felten, JavaWorld.com (1998)
, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4fcb6e0-5ebc-4d4d-a5a5-19609f4039b0"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)
 (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="280222aa-674f-444f-9c90-8b9cef93e691"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 01] MIDlet Packaging with J2ME , by John W. Muchow (2001)
, by John W. Muchow (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fad516f0-055e-4059-98fa-954c978e73d3"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82ddd4e8-a81d-4bc3-b5a8-e23495b10ce4"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and  Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce035158-e754-467b-9234-ac11f829ba3b"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 04] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60d3c1d0-5107-4b6c-a195-6641687088b7"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 07] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference (2007)
 (2007) 
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ee0d50f-4d78-4268-921a-57010be39ee6"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc39b4d9-3bf2-464e-b0a2-1b39aa433539"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP . (2008)
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="771f7cc8-feeb-45e3-9545-7c24de057013"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro>
[Patterns 02] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a833c9a-5a6a-4df0-b14e-1b49a7b4c974"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 05] Are We Counting Bytes Yet? at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
 at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bfb3a9d-31c1-4392-87fb-4f27e9c1f50e"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef1600c7-b14a-4418-bb52-64462e283acf"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax , Document revision 1.6, Sun Microsystems, Inc. (2002)
, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcfe2c18-4ba1-4d60-86a0-23c74654e02c"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection , Sun Microsystems, Inc. (2006)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5fe2bcec-17cc-46f8-8163-e847d2aaddf3"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)
 (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fde8a90d-9a30-411c-882d-93d84df6ab8c"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0921bc2-26ae-4956-819d-8efab398e99e"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="831b3049-6282-47fd-982d-1fc2eef358c5"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)
 (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00444762-dee4-4335-b1e6-8dd9b74455cb"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)
 (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96dcafe7-bcd3-47c5-9bc6-cd123af209b2"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 08] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html (2008)
 (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74559318-e5b2-48f7-aa43-d4ee528760a6"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b29b43ac-1afc-4ff4-9aae-6df9eb88826e"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 08] SUN Developer Network (1994-2008)
 (1994-2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="746328f4-97ed-4776-a2ee-8bdba311b4bc"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 07] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift. , by Josh Bloch and William Pugh, JavaOne Conference (2007)
, by Josh Bloch and William Pugh, JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c64f5546-58fc-48cc-a78d-049e83907a73"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)
 (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36172c8a-01d0-4803-85f8-fe517c63d9a7"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html Secure Programming for Linux and Unix HOWTO
Secure Programming for Linux and Unix HOWTO , David A. Wheeler (2003)
, David A. Wheeler (2003)