<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ef79afe-1c98-4e99-a192-9dec6de7a57a"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering 22(1):6â“15 (1996).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2911e5c8-013c-400a-8107-1f5256e991aa"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification
. Oracle (2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a570b869-995e-4fe9-8efd-ef754d73e2ec"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
[API 2011] Java Platform, Standard Edition 7 API Specification
. Oracle (2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee27b4ee-022e-41b4-aae7-05d6d8a786a8"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Austin, Calvin, and Monica Pawlan. Advanced Programming for the Java 2 Platform
. Boston: Addison-Wesley Longman (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c755fd6f-2708-4aaa-8e25-349e87c82bc6"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "partial order." In Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. http://xlinux.nist.gov/dads/HTML/partialorder.html
(2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="729f899f-f7cb-4cda-a852-4fb52a4503e1"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Black, Paul E., and Paul J. Tanenbaum. "total order." In Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. http://xlinux.nist.gov/dads/HTML/totalorder.html
(2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de35643e-526d-461b-9b43-28e50b531aa1"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60ff9d5e-af10-43ee-b607-7c82e93c1b77"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07baa155-6bee-4e3a-a66e-dd8348cfe3ea"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Bloch, Joshua, and Neal Gafter. Yet More Programming Puzzlers
. JavaOne Conference (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0a5c627-b157-4b97-a93d-21754674ba8b"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Bloch, Joshua. Effective Java⢠Reloaded: This Time It's (Not) for Real
. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e882bcd-c6c3-41f2-b478-edf1169431f7"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Bloch, Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b90401b-1f26-420f-8962-faa07f7c54c4"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Bloch, Joshua, and Neal Gafter. Return of the Puzzlers: Schlock and Awe
. JavaOne Conference (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4abb8d8-125a-4212-9262-ff43c6599840"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Boehm, Hans-J. Finalization, Threads, and the Java⢠Technology-Based Memory Model. JavaOne Conference (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6fb4adc-9715-40fb-bb8e-1cc7fc60a303"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="078a1d01-be90-494c-bcf8-b74b0f8e667d"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT (International Telegraph and Telephone Consultative Committee). CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva: International Telecommunication Union (1988).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="043640cb-b3d4-4a0c-b61b-7fb9f22c81b4"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1465ec3-b76e-4f94-b530-c79637014738"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Upper Saddle River, NJ: Addison-Wesley Professional (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72be7266-736e-4ff4-970e-27aba27895ef"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Christudas, Binildas. Internals of Java Class Loading
, ONJava (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="104e9737-5a8c-4b48-9dfc-f0d4aac537be"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace
, IEEE Computer, 14(10):48â“54 (1981).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e92e16bc-1b2b-4e5c-9cc9-63502be604b1"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language
. Oracle (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6ae6c08-f51e-4edc-972a-e8d76e7baa69"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming
. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cf5806c-5b30-4a2b-9e05-4edab34f86d1"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Horstmann, Cay S., and Gary Cornell. _Core Java⢠2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7937d1d5-6ef5-4730-bbea-6cdfc6480115"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In Pattern Languages of Program Design, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58f218af-d393-47be-aeee-90adb028c339"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 2008] MITRE Corporation. [Common Vulnerabilities and Exposures|http://cve.mitre.org/index.html] (2008/2012).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b588330-c330-454b-a91f-9ca951e63dcf"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Daconta, Michael C. When Runtime.exec() Won't
. JavaWorld.com (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f7e56bc-c4ad-4707-a17f-bd3fdb9e75f2"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls. Indianapolis: Wiley (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71059f3c-0efb-4a6f-a35d-e11ffdb3c83b"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Darwin, Ian F. Java Cookbook, 2nd ed. Sebastopol, CA: OâReilly (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49dc9d8d-74e7-40e4-a774-950e7be6848e"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008] Davis, Mark, and Martin Dürst. Unicode Standard Annex #15: Unicode Normalization Forms
(2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13032760-1d8d-4552-9f4e-5747137c1bed"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Davis, Mark, and Michel Suignard. Unicode Technical Report #36, Unicode Security Considerations
(2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86504507-eea2-4e6b-a257-1fac8fed50a9"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143â“155 (1966). doi: 10.1145/365230.365252.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aef07ced-fb33-4c50-a08a-e59d84098dc6"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] U.S. Department of Homeland Security. Build Security In
. https://buildsecurityin.us-cert.gov
(2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23eb7d80-e97a-4061-b5bf-419c207caaf2"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Dormann, Will. Signed Java Applet Security: Worse Than ActiveX?
CERT Vulnerability Analysis Blog (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b78f1c23-83ce-493b-9095-786cd2579ee5"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Doshi, Gunjan. Best Practices for Exception Handling
. ONJava (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6cc32afe-68e0-4af5-8eb3-9662f5cbfadf"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns
. CMU/SEI-2009-TR-010 (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2f791f4-817a-482c-b572-233ba7828251"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] The Eclipse Platform
, The Eclipse Foundation (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92cddf55-0d73-4f86-8ad9-73465f4a5803"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings
, Oracle (2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="670fffa5-4b37-4a85-9183-c7cd377c9d78"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] Eckstein, Robert. Java Enterprise Best Practices. Sebastopol, CA: O'Reilly (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c75c0d39-716f-421c-8b2c-ae82c3fefb9b"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] ESA (European Space Agency). Java Coding Standards
. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="244a1970-6079-4110-9065-5501b603ad43"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Fairbanks, George. Design Fragments
. PhD thesis, Carnegie Mellon University (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3920d857-b3cb-4da5-8732-db7a22a11082"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions
(2008/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="534085c2-ce89-41b2-8925-2a568b73b362"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. JDBC API Tutorial and Reference, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60a2a8ad-7fc7-44c4-ad0c-818f27e5cc74"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1768951e-c8ce-4436-8bd4-7a7519546a37"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security
(see Java/JSP) (2008/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b57c803d-8d12-47fb-8f1c-0b6d82e2fec7"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Fox, Joshua. When Is a Singleton Not a Singleton?
. JavaWorld (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5cf3ecf-4500-4201-8bfd-ef6704ea7ead"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table
: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d8b0371-d1d4-4d77-a4b2-b915bf387b44"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Gafter, Neal. Neal Gafter's blog
(2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46132435-6d17-409d-8fe7-7d4fbc58bca4"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Reading, MA: Addison-Wesley (1995).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8904c75d-7978-4651-8889-c26fb48c55ba"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Garms, Jess, and Daniel Somerfield. Professional Java Security. Birmingham, UK: Wrox Press (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e9fd94e-b288-4f3e-84e1-2e5784e94f31"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Goetz, Brian. Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction
. IBM developerWorks (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b150a3de-ed05-4169-b431-3caa3da5f01a"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes
. IBM developerWorks (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5896c7b7-0c1b-4b58-a139-a26db15f1644"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Goetz, Brian. Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?
IBM developerWorks (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82de1660-9294-4eab-98f8-d0fba3133f96"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Goetz, Brian. Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent
. IBM developerWorks (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e537792-0271-4a11-84c1-b2c44668fabd"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005] Goetz, Brian. Java Theory and Practice: Be a Good (event) Listener, Guidelines for Writing and Supporting Event Listeners
. IBM developerWorks (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb0e6cb6-65e6-459b-b72a-e9b61820a462"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Goetz, Brian. Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships
. IBM developerWorks (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d195a17-d2f3-4c2f-b5dd-8e83e2931626"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ed57662-0585-48d1-a007-a3c3c9c95c71"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Goetz, Brian. Java Theory and Practice: Good Housekeeping Practices
. IBM developerWorks (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de4e2bd9-658b-4ecb-831c-c9d7259a49b0"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables
. IBM developerWorks (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4dcbe27e-4686-4ac1-89cb-7caf905c581b"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic
. ©Sun Microsystems (1991/2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7868691d-0c6e-45f6-8cab-c927f951ea70"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="967f845f-a85c-4919-93b3-7468c9ad03fc"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Grand, Mark. Patterns in Java, Vol. 1, 2nd ed. New York: Wiley (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c26f545e-9c74-4e46-8648-99241a3359a9"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Greanier, Todd. Discover the Secrets of the Java Serialization API
. Sun Developer Network (SDN) (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c9bc5b5-c5c4-45be-a405-d5edec8279a5"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Green, Roedy. Canadian Mind Products Java & Internet Glossary
(2008/2012).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b58abe4a-d503-44ae-9bb6-f265be5c7d14"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Grigg, Jeffery. Reflection on Inner Classes
(2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7950d3c0-7898-4bfa-bf5e-aa0fdf81a5d2"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] Grosso, William. Java RMI
. Sebastopol, CA: O'Reilly (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e148518e-2974-4a0d-a951-39ad0ef3a167"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Gupta, Satish Chandra, and Rajeev Palanki. Java Memory Leaksâ”Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0
. IBM developerWorks (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3703a33c-2fd6-450a-a868-b1f96c0c7bb1"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. Immutable Objects in Java
(research report). Radboud University Nijmegen (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="070642ea-3fdb-4cb6-bf63-152210eaa09b"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Haggar, Peter. _Practical Java⢠Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f39cea8-c0f0-4b2f-8767-e942b396e569"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Halloway, Stuart. Java Developer Connection Tech Tips
, March 28, 2000. ©Sun Microsystems (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="348052b2-d8c9-4cbc-8912-c089828a6369"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Halloway, Stuart. Java Developer Connection Tech Tips
, January 30, 2001. ©Sun Microsystems (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8737d17-19cf-4d96-b163-0cfc3c6a1fbe"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Harold, Elliotte Rusty. Java Secrets. Foster City, CA: IDG Books Worldwide (1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c13dc4b-3943-4a58-b177-79804ef76a7d"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Harold, Elliotte Rusty. Java I/O. Sebastopol, CA: O'Reilly (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59f8c2e7-fc55-4d4d-9e72-49f71083d1fa"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Harold, Elliotte Rusty. Java I/O, 2nd ed. Sebastopol, CA: O'Reilley (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25ffa9bc-5a16-4255-bd72-44dff9b2f873"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Hawtin, Thomas. Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities
. Sun Microsystems, Make It Fly. London (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b37ed73-f04f-4df7-9d28-9c11b8e6b822"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Henney, Kevlin. Null Object, Something for Nothing
(2003).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f3372e6-5ceb-430b-9d64-b57ef99ec961"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Hitchens, Ron. _Java⢠NIO_. Cambridge, MA: O'Reilly (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b08934f0-70c7-4de9-980b-a35a5db2a1c4"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Hornig, Charles. Advanced Java⢠Globalization
. JavaOne Conference (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f44a1b7-a16f-45d4-81e0-3cb78d32bec0"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE), San Diego (2007).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19ac177f-2a8e-4e42-bc48-a928ca5e3c29"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. IEE Proceedings: Software 145(2/3):41â“50 (1998).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ede15f91-2583-4b5a-a9fd-5cee60f25eac"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] IEE (International Electrotechnical Commission). Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed. Geneva: IEC (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b1b1eef-7aef-4032-b2ea-8721a4abe800"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE (Institute of Electrical and Electronics Engineers). Standard for Binary Floating-Point Arithmetic
(IEEE 754-1985). New York: IEEE (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c26bd57-4f10-496c-b211-b65077c4b5b8"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] JavaTM 2 SDK, Standard Edition Documentation, J2SE Documentation version 1.3
. Sun Microsystems/Oracle (2000/2010).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="270ec705-3c64-421f-b408-550e071d25bf"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification
. Oracle (2008/2010).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="667e0633-51b5-4a2b-8a9d-dd0febb2c8c2"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] java: The Java Application Launcher
. Oracle (2006/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22c31fc9-8cd0-4b02-bdad-930d64a43b19"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Upper Saddle River, NJ: Prentice Hall (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d47ea03f-1e89-40f1-8b79-dbab38026bb1"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Java Generics
. Oracle (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a87c9137-847f-472a-9539-632aeccee95b"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Oaks, Scott, and Henry Wong. Java Threads, 2nd ed. Sebastopol, CA: O'Reilly (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4d3b46e-ab2b-41f2-8c82-fef9fd4673e0"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Oaks, Scott, and Henry Wong. Java Threads, 3rd ed. Sebastopol, CA: O'Reilly (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01d4daef-dccc-461d-92a7-82557466702d"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java⢠Platform, Standard Edition 7 Documentation
. Oracle (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d708476f-c3aa-4071-bad3-bc625e23596f"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. Java Language Specification, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b189267f-66e0-4163-8786-c1315014d83d"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
[JLS 2011] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition
. Oracle America (2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6febac23-4734-4bd8-9b7a-08aad91e7f2c"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform
. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9af918a4-4c46-4b92-906c-e1cf2739210c"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide
. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1ce5fc1-0ae0-404c-bebc-1382f4a6c304"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface
. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b708fa7-a94a-4dce-8136-c0f172fec196"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258â“263, May 21â“24, Oakland, CA (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="efb489fe-6b8b-413e-8712-de1a56a6b680"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA)
. Oracle (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd596916-78c5-4be1-87aa-7c52b032ad14"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] Arnold, Ken, James Gosling, and David Holmes. _The Java⢠Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0963ca60-fa43-426c-bc35-bf08b0071806"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: JavaTM Memory Model and Thread Specification
(2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47d1cef3-9854-4592-ae73-0719d0a896bd"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI)
. Oracle (2006).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcecf047-46dd-4111-9e79-162ef2080bb9"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification
. Oracle (1999).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9de157ea-16d4-4afb-899d-3a73692fdb8e"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler
(2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e7363f2-84ee-4c07-a4e1-48aa3a09afbb"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] Kabutz, Heinz M. The Java Specialists' Newsletter. (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a56f2759-4ab7-4f96-89bc-0802cb1a5d0f"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01cbb890-97ff-4b9f-bcf9-54bb864790ca"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Knoernschild, Kirk. _Java⢠Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca27c566-50b0-4bee-8b5c-ed1562eda5c7"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 2008] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. IEEE Software 25(1):13â“19 (2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4feca0c-e591-4828-b21e-ef5e020dac6a"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] Langer, Angelica, trainer and consultant. http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html
(2008).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6df993e4-8d92-4d2f-a142-34287a62799c"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Reading, MA: Addison-Wesley (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfb1ebd9-9983-4a91-acf2-32c02751399e"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Lea, Doug, and William Pugh. Correct and Efficient Synchronization of Java⢠Technologyâ“based Threads
. JavaOne Conference (2000).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="637069d3-1931-4266-a568-e3859aa0e052"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] Lea, Doug. The JSR-133 Cookbook for Compiler Writers
(2008/2011).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c17e6c2f-8ab2-4641-8614-51d1c39a131b"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. Robust and Scalable Concurrent Programming: Lessons from the Trenches
. JavaOne Conference (2009).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03e0f8fb-c93b-42d6-a8dd-1da99e548686"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] Liang, Sheng. _The Java⢠Native Interface, Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a50c6cbb-9bd1-4266-bc5a-c0cf3f469cf4"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Liang, Sheng, and Gilad Bracha. Dynamic Class Loading in the Java⢠Virtual Machine
. In Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, New York (1998).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f4721dd-bb3c-4805-996c-795a7ab86057"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Lieberman, Henry. Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems
. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 214â“223, Portland, OR (1986).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e2ddd59-76d3-496b-938e-3a6dd23d9e02"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Lo, Chia-Tien Dan, Srisa-an, Witawas, and Chang, J. Morris. Security Issues in Garbage Collection
. STSC Crosstalk, (2005, October).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ddb640f-53ea-455f-a865-426bf779ce86"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Long, Fred. Software Vulnerabilities in Java
. CMU/SEI-2005-TN-044 (2005).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a95ae5b-9236-4089-8da9-731597b172ff"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
[Long 2011] Long, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e1a03cc-637d-4332-aa2e-f75d8cf0539f"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Low, Douglas. Protecting Java Code via Obfuscation. Crossroads 4(3):21â“23 (1997).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd5f61ef-b034-4ea5-bbc2-ff0f13ff8199"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 1998] Macgregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. Java Network Security. Upper Saddle River, NJ: Prentice Hall PTR (1998).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04c402b2-cc68-467a-afa2-111536c70a35"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Mahmoud, H. Qusay. Compressing and Decompressing Data Using Java APIs
. Oracle (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69530221-fbfa-42cc-a7a4-f34901948640"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Mak, Ronald. Java Number Cruncher: The Java Programmer's Guide to Numerical Computing. Upper Saddle River, NJ: Prentice Hall (2002).
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1a33465-c554-4242-8970-daef2fb5db12"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] JSR 133 (Java Memory Model) FAQ
, by Jeremy Manson and Brian Goetz. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcd4f32a-04ec-49b3-b3ec-307a2c616d56"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] The Java⢠Memory Model: the building block of concurrency
, by Jeremy Manson and William Pugh, JavaOne Conference. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f583acd7-0764-4b88-9a59-ab3ac29c3a6b"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Granularity
, by Robert C. Martin. (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="943eaefc-b3ab-4ca6-ab2a-5f4309f48d2d"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6589780-d93d-4414-9b21-226dd8b29b39"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="646d3b7b-1208-430b-ae1b-cb47515b436e"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] Twelve rules for developing more secure Java code
, Gary McGraw and Edward Felten, JavaWorld.com. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d0c042d-21e1-4ab6-a089-9192ccd7ebb0"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Java⢠Platform Concurrency Gotchas
, by Alex Miller, Terracotta. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70c08428-f42a-425d-9bce-f851313d1c89"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
[MITRE 2009] Common Weakness Enumeration
, MITRE Corporation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="422a08e1-72b1-4eae-96c6-cf94d2a5e2aa"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71475a13-f183-4f07-a6e3-642a36d45cb8"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Ruining Security with java.util.Random
Version 1.0, by Jan P. Monsch. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e97c6451-b590-4da9-afdb-d118d511ff34"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Using SQL Escape Sequences
, Microsoft Corporation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2356494e-4529-4dd3-b078-ff4ae4e4467e"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] MIDlet Packaging with J2ME
, by John W. Muchow (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="134c6ccb-93ca-4286-8627-cb2ec5043fa9"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Exception Handling: Common Problems and Best Practice with Java 1.4
by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0813016-4e94-49ed-9f3f-4c15a5dae7bd"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78261755-7512-4913-8e10-cd1faf279d3c"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Java⢠Generics and Collections: Tools for Productivity
, by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29ef14af-3819-481f-82e3-573d7432e6c5"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] What Are Race Conditions? Some Issues and Formalization
, by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin — Madison. (1992)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="263c3cae-883e-4f8a-a177-fb58262474bc"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8c82bea-9022-44d7-84c2-7baef0e1ef54"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference
(2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9dee02a-5b28-43a0-a05f-f8b0c12e7eab"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Decompiling Java, by Godfrey Nolan, Apress
. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eea6b84c-563b-45c4-a35b-51090ae9e801"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="077cea6a-a2fe-40af-b0f9-be3aa9d3ff93"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning
, Oracle Corporation. (2010)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c28a4bd-92c6-4eac-ad5a-26b8f5375dcb"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] A Guide to Building Secure Web Applications and Web Services
. The Open Web Application Security Project. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09ae4d78-f920-443e-97d9-51298c0e2528"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] OWASP TOP 10 FOR JAVA EE
. The Open Web Application Security Project. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2d0103e4-099c-429e-83bf-200bdf660691"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 2008] OWASP
. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78368489-1d27-4f49-92bf-b030992a9c0f"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK)
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9911170d-53fb-415f-a42d-d86dbc86d165"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Beware the dangers of generic Exceptions
, by Paul Philion, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35a0a500-b103-49d5-a67b-7f7a93de9290"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Are We Counting Bytes Yet?
at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1c1f017-d2b7-4dc9-924a-d691070b6e67"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b319cc2e-0b89-4a8d-ac84-257cef5940bc"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Default Policy Implementation and Policy File Syntax
, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13446110-9125-4902-90f3-f569c84bf801"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] The Java Memory Model (discussions reference)
by William Pugh, Univ. of Maryland. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89a8e27a-133d-43bb-bc2b-a0742f2dcede"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] Defective Java Code: Turning WTF Code into a Learning Experience
, by William Pugh, Univ. of Maryland. JavaOne Conference. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b4262a6-2ece-4090-9896-998aeb0b4aea"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] Defective Java Code: Mistakes That Matter
, by William Pugh, Univ. of Maryland. JavaOne Conference. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eefc2aa1-6c7e-4b10-a459-751ccac5b399"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data Tomcat v 1.4.24
, Reasoning. 14 Nov 2003. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56fd1150-622f-4f21-a6b6-10d095f628a7"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Reflection
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8078ccdb-b973-4109-ab26-4df8af4e48a3"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] The Elements of Java Style
, by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0e746e4-3fe0-4bb8-928b-44c1adb7d8ba"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Fallacies of Distributed Computing Explained
, by Arnon Rotem-Gal-Oz. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c5e00fe-c468-4bc8-97e9-3471993f0c4b"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003] Breaking Java exception-handling rules is easy
, by Vladimir Roubtsov, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ca11b53-998e-4fb0-bd39-1224e22d59ce"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Into the mist of serialization myths
, by Vladimir Roubtsov, JavaWorld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c542846-7c14-48c7-896d-e420f0da1017"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17, 7 (July 1974): 388---402.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0befc76f-2bc9-4a4a-823a-fcde010e860a"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." Proceedings of the IEEE 63, 9 (September 1975): 1278-1308.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="472445d0-88a5-41ca-9bd2-5dd41ff57aed"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c65eba5-0fe0-4198-9008-23331d7570e4"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0
, Sun Microsystems, Inc. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d7a6dd7-9185-4475-9a27-d24a9978701f"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ded2e18-88f0-4f81-824c-e04b49ad804c"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="127a30f5-6dac-406a-9cd6-6f36c207bf60"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
[Schoenefeld 2004] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a3a940a-7b22-47db-9ac7-229ff9086800"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Avoiding Checked Exceptions
, by Don Schwarz, ONJava (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d5797ac-f77b-4fb0-99f3-349980e2a092"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Java Tip 134: When catching exceptions, don't cast your net too wide
, by Dave Schweisguth. Javaworld.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c90c23ac-82b7-4fae-bfe5-9aabbb291ea9"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] SUN Developer Network
, Sun Microsystems, Inc. (1994-2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43a3f83d-af41-4cce-bdea-8984f5aac319"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
See http://www.cert.org/books/secure-coding
for news and errata.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2992a328-cfe8-427d-ba03-141a191e07b8"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Java 2 Platform Security Architecture
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bbc20b50-bee6-4aa3-9b86-8fc2ee9a388a"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46d9a34a-ef31-4ed0-a103-46045e5185c5"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e3683c4-4e49-4c22-ae2e-303d3b978bc6"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Avoid the dangers of XPath injection
, by Robi Sen, IBM developerWorks. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36ea45fd-d611-4400-84c2-10daa41f4253"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72f0219a-e7bb-4be1-b508-a3e7e7b1cc78"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] Steele, G. L. "Arithmetic shifting considered harmful
." SIGPLAN Not. 12, 11 (November 1977), 61-69.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61cba239-9c00-4ac9-8a8b-513ac052bb89"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Java Developer Connection Tech Tips "Using the Varargs Language Feature"
, Daniel H. Steinberg, January 4, 2005. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="320be209-635a-498b-bca1-a20168f59fc0"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Secure Coding Antipatterns: Avoiding Vulnerabilities
, by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de154dcb-59cb-4910-84ed-573edfe92602"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] XXE (Xml eXternal Entity) attack
, by Gregory Steuck (www.securityfocus.com). (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b74600c5-904d-4cfd-9324-9d6624b73c32"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?
, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d78e9880-3eed-4233-bc57-c4ed880ad0dc"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide
, Sun Microsystems, Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dabae8d0-42d9-4de9-a49e-16f53cfd059a"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java⢠Platform, Standard Edition 6 documentation
, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a6552cc-12cf-4f60-9791-25c9afbb1b1d"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java⢠Plug-in and Applet Architecture
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9c46391-bd82-4aa9-9e52-7b741557a840"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Composable thread coloring
, by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bda29157-aa4c-494b-b1d0-9e65fb5f2ad9"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Andrew S. Tanenbaum, Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2/E
. March, 2003. ISBN-10: 0132392275.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec9f2166-ea1b-4206-aa3e-3896d5843bd6"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.
, by Josh Bloch and William Pugh, JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0bdd80ed-b867-4a16-a036-5ee6c367b206"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Tomcat documentation, Changelog
and Security fixes
, the Apache Software Foundation. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="688b1b97-d939-4ad3-ab35-928af0a65f65"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
[Tools 2011] JDK Tools and Utilities Specification
, Oracle Inc. (2011)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c102aa8c-bbcf-4cf0-96d9-e45e4e59a9e0"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials
, Sun Microsystems, Inc. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4feb4e4-74e0-4ba9-871a-802e6ef11217"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: The Unicode Standard, Version 5.2
, Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bbefa57a-c2c5-495b-84fa-76c11820ee7d"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Security and the class loader architecture
Java World.com, by Bill Venners. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6149d345-c86a-4bfc-bd82-c25f33bbd5ed"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Failure and Exceptions, A Conversation with James Gosling, Part II
, by Bill Venners. Artima.com. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdee16cd-c559-4685-a122-953ac5464837"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Extensible Markup Language (XML) 1.0 (Fifth Edition)
, W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24bea351-4f48-40bc-baef-fd7981a61ff7"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools
, Michael S. Ware. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="797cf811-ac18-4d5a-9d43-68e514267618"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Exploiting Unicode-enabled Software
, by Chris Weber, Casaba Security. CanSecWest March 2009. (2009)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0456d48c-784b-46e1-a5cb-77c15d0c4d66"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] Secure Programming for Linux and Unix HOWTO
, David A. Wheeler. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1806e6ed-85e1-4c35-a6c9-86d783e66331"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] Java Developer Connection Tech Tips "Creating Custom Security Permissions"
, John Zukowski, May 18, 2004. (2004)