<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11492e75-0fc6-4e5c-b9ed-3764fc41298d"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 96] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50218b6e-9a76-4488-a866-903d7e44eeec"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e3b6f00-b8ea-4173-ab60-ed1db42cbc88"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform
, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b8026c2-c6fd-4d26-b403-7af64a33fa23"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro>
[Bea 08] Packaging WebLogic Server J2EE Applications
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="590f4441-4d49-4f8d-9d81-68316237183f"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19445ea7-86e3-448c-8c27-bc20eaec3c98"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="856b524a-5017-40f9-bc37-b033db46fc60"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bf29acb-50fb-4dcc-9baa-98a738e51ae2"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath
(1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2db97b77-9020-4f3a-9dfe-3378de77a3bf"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 88] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="81543b79-8b0b-49f5-a71d-36b250a90406"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26d974f0-1847-4d5e-b970-538cd7ba3dca"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading
, ONJava (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="963f73e5-0b80-48c8-9828-dcc99963478e"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 08] Common Vulnerability Exposure, MITRE Corporation (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f3ff78d-eb3b-4347-91b8-e800546c4a8a"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 07] Garbage Collection-Friendly Programming
by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="acde4d29-6a30-4471-8d6d-5e5ef1f454e2"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 04] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42ecce16-04cf-4995-8524-91b9793bd113"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 95] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb93919e-8a1b-4fea-bd6e-966d27bd2883"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't
, by Michael C. Daconta, JavaWorld.com. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d362bfd-025a-484e-9c5a-025757994540"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f51c395-2236-4302-97ba-5d06c2bf98c0"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0eb523db-7b29-4d4f-bc79-04e4b49f99d8"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling
by Gunjan Doshi. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b148febb-f874-47cf-8522-42d09169df1e"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 08] The Eclipse Platform (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bca6977-7605-43ed-ad07-528c1f00d82b"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="002e6f11-9a1a-4393-9330-e8cf89b05f48"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c4ac6a7-4275-45d4-947a-acf5d0f2c2e3"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0e55c5c-71c7-4fae-94a6-c00c592345de"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab062dd5-5efb-467f-a165-7b44974b9d88"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 01] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ec05a9d-fad7-423c-91c8-a72fdf9332ab"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 08] Function Table
Class FunctionTable, Field detail, public static FuncLoader m_functions
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e487540-587f-433f-87dd-9a054166b31a"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 95] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="470635de-1894-4450-957a-8aca957a9444"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1caffd55-8334-4ecc-a7a5-0561f43dc36e"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 05] Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners
, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b80f633b-9de4-4fd9-9da4-006702871450"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="576c5bdf-7abc-4f25-9690-173fc68c3cfe"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic
. Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce15af86-abab-41f5-8f89-a823fa9b384e"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd151f4b-5445-49a0-9eae-72d72423207b"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API
, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="719a0976-b343-4332-8518-b7d9292fdd72"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary
by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3f02a5c-547e-48ff-a454-b2d51fd4915d"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can
, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="284aa151-f81c-4c83-8dcb-9ca91d144548"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 00] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="465dd6ee-e81f-4189-ab77-15aa74e2a366"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 01] Java Developer Connection Tech Tips
, January 30, 2001, by Stuart Halloway.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be90045a-7dd5-412e-a3bd-736e6e9dcf97"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8857f138-d308-4eae-9fc6-eec767dc3d61"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b84b8aef-8cab-4522-877a-c8ec5cf0ccdb"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 03] Null Object, Something for Nothing
, by Kevlin Henney (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c1529ff-139d-4ff4-aa74-5230453c74b4"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 08] J2SE Documentation version 1.5, Sun Microsystems. Jar File Specification
(2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b920846a-c964-4f21-b773-af24a2bff503"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 99] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1aef029-49f9-423d-a2d8-c0618792ed6f"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3
(2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="616b3219-48a7-4ef5-8485-fb801a5fd056"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html
], Sun Microsystems (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="469aa393-5e3c-464e-9def-6884126cddf5"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 99] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5b3f151-d4d0-4c16-acdc-6c6f9931bf6e"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 04] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86cd4aa2-23c9-4000-aa2e-8aade9b16bbc"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 08] Java⢠Platform, Standard Edition 7 documentation
, 19 Dec 2008. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b2febe8-7b4d-4e21-807b-da16d894cd71"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification.
(2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c20379a-5fa2-448d-804b-4a50a26be308"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40170dfe-700f-42f8-bd68-aae0d0d7f607"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro>
[JPL 05] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4faee83-e16f-46c6-ab0c-9aec0eeb91fa"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03cc6e66-2cdc-422b-9cc8-9719d4de3e76"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee2694f8-0cf9-4ed2-b09a-f313f12b9bcf"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17e4e929-0846-467c-98b2-10883b8c3d85"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab785969-037a-43b3-8697-42a1dc4014a9"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49550735-ac5d-4e13-bb2b-eeafc3234628"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7eb28eb6-dc75-454b-a069-80ccccf049b9"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfc46b6a-b018-4352-bd4e-f313b3d601ec"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="711cbfd1-03eb-4e4d-83e2-eefb29d264b4"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 08] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="539f508c-479d-4d51-b68e-d0f86469ebca"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html
, Angelica Langer (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f058d11-f358-49e8-b54a-b5815f74af94"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="911960e3-7c9a-42bd-b226-dc527a6f239f"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1db61c7-707c-4e65-afad-73d4f6bc8cc3"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java
, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="388bdfb6-5e6d-4887-99ee-52122d150ef0"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation
, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7cca0c46-b713-4cdc-b49b-b3a7b1301cff"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="460efa0a-ee44-46b0-8984-fe7630722d13"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 01] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e90220e-e02e-4060-8717-67b63de8c476"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58809fc1-1932-4887-ac89-0b49db309b08"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code
, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eac02795-2fdb-4e1e-b269-8207961f8024"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2d97cea-80de-41fc-b986-1fdee60b5ae1"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 01] MIDlet Packaging with J2ME
, by John W. Muchow (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64695dbf-28ee-4979-bb7f-33a484db4249"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4
by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67c96b2e-8cdd-4c37-93e0-fc248323211f"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="436acec6-a0e6-4949-b60d-7b9345a14fd4"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 04] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="197cb8f7-12a2-45bf-8830-3c0a7650914e"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 07] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ea76d06-41ba-43a7-badf-c1c1b964f459"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 04] Decompiling Java, by Godfrey Nolan, Apress
. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cea56dd-519a-4a7c-b1fa-ffe0efe49cfb"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fe16dc0-cdf3-4c94-8a5a-dd58a715d99b"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69852b15-aad6-4381-8224-3bdfdde84c95"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro>
[Patterns 02] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ebd2aee8-441b-4dbc-8c20-c99b45202dae"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 05] Are We Counting Bytes Yet?
at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73a883a3-f5a3-44b6-9500-0ed4cdec886a"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b86290b5-5e2b-40ee-a767-852152d12d22"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax
, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a58b8033-4680-4d16-9da1-0e0601933699"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20aaa797-91ce-4d83-bf80-b17da649ca3e"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35f8c9d8-5566-40eb-999a-86c0d55c4163"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79d1ba38-2711-49d5-805b-1301a5a65eeb"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="577da72a-5caa-4945-a132-cf097526336c"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c81aabe7-be50-43f3-9ec0-c5e62e046e26"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f78630af-113f-41c0-a119-82f3c7fe4d9e"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 08] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d767f8a-0421-4a0d-b7f2-57831ec5879c"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66c3ed2d-f22c-4f3b-9201-dc711bf4c3a7"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 08] SUN Developer Network
(1994-2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01f43235-a8d0-4442-9f37-6762036fcd27"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 07] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, by Josh Bloch and William Pugh, JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0403c7c2-4435-4169-93fa-8f449d31cfc8"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7da861e-5d43-4c7e-8f07-76ba8b68133d"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html
Secure Programming for Linux and Unix HOWTO
, David A. Wheeler (2003)