<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cab076a-88f6-45d6-a601-600ddb84e730"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f72cdaf-977d-4d9e-a19d-142fc156d636"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform
, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec5a6c24-f252-4303-94d0-b30fb237c21a"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07f10ff3-cb3b-4858-85a8-2453e8033b3c"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29710de4-4717-40d4-b7ef-a01d49f35552"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcf64c2d-373d-4ab2-950b-c296de60b164"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath
(1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba075ff8-2d3b-4dfd-a399-6f5233950daa"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2789ccbc-41fa-4a0b-8825-6b72c393769b"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't
, by Michael C. Daconta, JavaWorld.com. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6128352e-2bd2-4220-8f3b-e3f0eb12e77d"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8925b02-0e8f-4423-bc08-7f20fa96a049"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d189fadc-322a-480c-8156-250972389d88"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling
by Gunjan Doshi. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="add63468-d0de-44ac-b977-1223e678b4a3"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b786f6ac-3ab4-42f2-83da-91f9a8d6b951"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions
(2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e3fd6fe-8407-4e9d-852d-374110c6cf10"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ef20c53-f981-4e4e-909c-eadb3bb242c2"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7df7cd49-2a5e-4e83-ba19-66129100e820"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f729fdcf-4421-447e-8229-bf35e581bdfd"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93e4f048-49f4-4422-9dd5-61f593a8320b"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic
. Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d79e7d83-c17f-48d5-810e-a8fc7266e6f7"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf562b7d-c6c5-4add-a79f-1ca1edb2a01d"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API
, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ede8d069-ebd1-4f0f-b8ea-1f4c53d648bc"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary
by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="005222dd-bdf9-4958-9ee2-90098cb12c03"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can
, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="737a00a8-1de1-4d1f-9236-7a4532cd0ee4"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43a7020a-1eb2-4052-8fe5-8f6150b966ed"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7968073-42e0-407f-b93c-d03dade4ff63"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3
(2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3da7ef23-f666-475d-afd4-9af874878038"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification.
(2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a4e74a8-6608-468f-a117-0d9a5383e627"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77dd8095-8554-4384-aad3-e066972dc420"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="752067a9-58de-45b3-bea7-358dd7640280"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57a7e7ef-c5f9-4f62-82a0-bcbb6324f4a9"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="606ece0e-74f8-4e5c-bec2-1112e9f9d935"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA)
, Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dce32006-402a-4a07-b033-d62d8f80543c"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI)
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24929b02-5f60-47b5-8abb-c0d20d41f984"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="447050fd-519e-4198-9453-37652778acdd"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9cac3e5f-ad85-42bd-869a-6e86a7749ae6"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30933950-bace-4875-aac3-b82b84933be0"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04f176b2-99b1-430b-bfc6-3ef13a169aad"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7210ed3d-78a4-4e15-a4cd-60b370976fe2"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java
, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c8a93a9-11cc-48e7-a51d-98308744fe3d"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation
, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3bde9e1-815d-4ac9-a099-41da9c7c8cde"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b38d0c4a-83f2-4156-9cee-d17672910653"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="935405ce-4588-47c2-adb8-f3d1a0d9a1c9"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74688e2f-51d1-4001-bce6-3e675dd417cf"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ba9de70-0582-41f5-8e8a-cd08a080a1fc"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4
by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84579941-462c-4f3d-b812-55aa1ac49a68"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2135db76-ee2a-4178-8b2e-d9fad45ace6c"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="722a110a-1b7e-49cc-9280-311209f2d7b9"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77b95887-a1fa-44e5-a999-16ce3064af9c"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax
, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d54ceca5-d4e7-462a-b8c5-892bc4100816"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb3f7fd3-57c6-475a-b299-60a1d7eb47ad"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b22be141-14d7-48d5-8051-505018a487a4"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="822cdd86-82d2-4daa-87d1-23168264fb98"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a730cbed-1f80-4d44-9cf8-51648d080949"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides
(2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c91f6bdd-595e-4691-84a4-e411719e2a7a"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bb2c442-2312-46ea-a95c-499347115946"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials
(2008)
[Christudas 05] Internals of Java Class Loading
, ONJava (2005)