Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7eb1dc0e51dca29-17a36873-455c4b7b-8f93aa19-da380dd61646bf701b07b6c8"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 1996\] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d144d4b67fe62fa-6565b85d-46f64eeb-a57a9799-f58414f406888bc93a08f0c2"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f19d51357f48d7f-3480edf4-4ceb4160-ad8c81fb-410402d2fd7fc2bfaea161d2"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 2000\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b98e0a64718391d-d7f880a8-47da488b-8f279f2e-397b70ce47d99f0b7bd287ea"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro> \[Black 2004\] Paul E. Black and Paul J. Tanenbaum, "partial order", in Dictionary of Algorithms and Data Structures \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 17 December 2004. (accessed TODAY) Available from: [http://xlinux.nist.gov/dads/HTML/partialorder.html] |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3545f9c93ba06052-ba3441fc-4a2842e1-b9618396-d73657171cf68fe7560db5b2"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro> \[Black 2006\] Paul E. Black and Paul J. Tanenbaum, "total order", in Dictionary of Algorithms and Data Structures \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 30 March 2006. (accessed TODAY) Available from: [http://xlinux.nist.gov/dads/HTML/totalorder.html] |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eea75dd4796f977f-ae72a8e8-46894e62-b4559379-12ccca7b33cfb3f185d379be"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 2001\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53385a4a7086dfcb-19fdcdd4-416e4e45-97a9b55d-b5a1c3b757f591108fb6663e"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 2005\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc5097158d02bbfa-4d9555d4-4bd74559-8d7cb015-b7f99c69d83bc6ebdacd3ce8"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro> \[Bloch 2005b\] [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/], by Joshua Bloch and Neal Gafter. JavaOne Conference. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ba6ba35d64b9c17-12156136-47234ac1-994fa28e-4b140933ea8951db607427c0"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro> \[Bloch 2007\] [Effective Java⢠Reloaded: This Time It's (not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf], by Joshua Bloch. JavaOne Conference. (2007) <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b559d3ae5cff9aa6-ac1f3903-432e43cd-82a0a4cf-6f113505191d60ef21e7d7ca"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c6771156bbd8f66-a7e5272b-4a244c47-959b8123-b8de3236494dfd9e97d44eab"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 2008\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
...
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="870e581ae30fbbf3-ac0806b4-47784e76-a554a1e8-e5dc18d774d1e0d26251fcfc"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro> \[Boehm 2005\] Finalization, Threads, and the Java⢠Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2dc47c1b0d5c8b40-91a8c007-4c124d85-b28cbb81-9ad01bfcecfe5fd8cbda749b"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 1996\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e65213e3cf06a020-c34d9756-408b46c9-8bf7bb79-6e8687bfbe821e885da8c881"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro> \[CCITT 1988\] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0aacbdc0ed501f89-4a60de9b-43634ca8-8b568d76-e673f24b25dde7cdf0bf5d88"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 1999\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5609ff71c3cce285-aa51b97e-40834384-b4eb90db-96cbc731863cf6970baf29f3"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro> \[Chess 2007\] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e40dcc614ca57f4-f097724e-4e364ef2-97759a52-584096e0de87aaed33c57981"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 2005\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37583b9ea2b61ddc-56f93fc3-48e44a3c-a7a48c68-6964d4cc6cbea7b062d19465"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro> \[Cohen 1981\] [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], IEEE Computer, vol. 14 issue 10 (1981) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1cfdc3cf98df0f1-8bbe0ae5-45a64d63-af4987e0-f5729826ee986aaaaa72a048"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro> \[Conventions 2009\] [Code Conventions for the Java Programming Language|http://java.sun.com/docs/codeconv/]. Sun Microsystems, Inc. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9f1ec4ea95cad22-939ccaf9-4cde4f6e-98b99937-e0279e9a10487e41d3612a2a"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro> \[CVE 2008\] Common Vulnerability Exposure, MITRE Corporation. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="300090deec26ab1f-5e2f46bf-406c4617-8d8a89d1-5f9476cc50c53bc8ef8e6c7c"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro> \[Coomes 2007\] [Garbage Collection-Friendly Programming|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2906.pdf] by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40cca4cee657c5cc-5637cffa-48714265-9908a1ad-e558f1f116cc780775e778b1"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 2004\] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b1762d344774755-fedc0f91-4dfe4ddf-8a37a58c-8da43b24bf0b1073b3777281"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro> \[Cunningham 1995\] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f086f7655133335-9e873564-4cb04835-a87b8767-03d6dde8b8677e8d168fc698"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 2000\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03c501c4fc4f3620-13b995cd-4b7445d4-ba8db319-fb6d527cd41628e09e4f435b"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 2003\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cba0324df30b98b9-4acc00fd-41fc4db2-a2099ef9-e6e30ca9c96dafbd5d2ea1c6"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 2004\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="340e1d70ed754b2a-4a0a7e0b-4a1943c4-99058851-4268922bdebb87f059f199bd"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro> \[Davis 2008\] [Unicode Standard Annex #15, Unicode Normalization Forms|http://unicode.org/reports/tr15/], by Mark Davis and Martin Dürst. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb126057acd5af17-2da85a8a-40194843-ac1d863d-cbb8b6cd15b640138ec1d806"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro> \[Davis 2008b\] [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/], by Mark Davis and Michel Suignard. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d17116943a863e8-69437f96-4f034334-b0faac51-06510375178bf08563614874"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro> \[Dennis 1966\] Jack B. Dennis and Earl C. Van Horn. 1966. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (March 1966), 143-155. DOI=10.1145/365230.365252 [http://doi.acm.org/10.1145/365230.365252] |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67f0a5f1bab65f89-a6bac734-4a614c0a-96548c87-b577cde8d2bf6eaf3d03a8e7"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro> \[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/]. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dca16d40e375f487-f2708b70-45964ac7-b1dba33d-1d9590369d61201295ccb1dd"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro> \[Dormann 2008\] [Signed Java Applet Security: Worse than ActiveX?|http://www.cert.org/blogs/vuls/2008/06/signed_java_security_worse_tha.html], by Will Dormann. CERT Vulnerability Analysis Blog. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d94f99c0a50f316-3dc27ea4-469b41ee-ab7eaf07-beec6fcd89cd0fbd50de0307"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 2003\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2647351899f5d8c-11054992-4c8f47c0-864c878d-f5ba7f3c3cd076dfc0b69a9c"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro> \[Dougherty 2009\] Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, Kazuya Togashi. [Secure Design Patterns|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]. CMU/SEI-2009-TR-010. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0a973a2d56e6cd2-af50c264-48e342e5-bc5e9af7-77480c73779e7fc291b071db"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro> \[Eclipse 2008\] The Eclipse Platform (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b53754763d3459b-55f44260-428741ca-8d36887e-c1837a2e2c73f7e898005968"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro> \[Encodings 2006\] [Supported Encodings|http://java.sun.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a02eda4444a37eee-203ba8dd-48d446db-a95a8824-c0c993714c474cdbc1324743"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 2003\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d05a2a7f3e542f1-4ac75553-45c74049-82c3a230-541c4e74b588e769837b17fd"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro> \[ESA 2005\] [Java Coding Standards|ftp://ftp.estec.esa.nl/pub/wm/wme/bssc/Java-Coding-Standards-20050303-releaseA.pdf], prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17955ab40410b620-68a0b3d5-4f824a8d-bd21856c-a94fd3ef6fe795e28a71e605"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro> \[Fairbanks 2007\] [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c27e288ad444937b-4a533752-42da4aa4-98728e4e-ef4559be2a1aea77d304a928"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df2c204c24092f23-20881979-449744b0-8185a31f-add0cae26216d3cdaf2f348f"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 2003\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffbbadb42322516f-a6c26d16-48e84fcc-9f3fb542-903569936986f32b68f60b1b"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 2005\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec8a9fe207d9e07f-f067d739-44094d55-94148536-16dc93eb8f524cd757e35470"><ac:parameter ac:name="">Fortify>Forman 08<05</ac:parameter></ac:structured-macro> \[FortifyForman 200805\] [A Taxonomy of Coding Errors that Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] Java/JSP, Fortify Software. (2008) Forman, Ira R. & Forman, Nate. Java Reflection in Action. Greenwich, CT: Manning Publications Co., 2005. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0da7ce79-7c83-44dc-8018-a7f802d469c4"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
\[Fortify 2008\] [A Taxonomy of Coding Errors that Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] Java/JSP, Fortify Software. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e0b1116-a079-40c5-a039-4bb1c547c357906c4386-7b7a-4cb0-a93a-93259530ec60"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 2001\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e79f49464de8d160-5c19ab69-49d44618-8a55afa7-671c1307313937a465a8a39b"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro> \[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="342c59ceab56115b-18600ed1-4ecc4e5a-8608b572-d91e50ab6719c61ecb7ad1f6"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro> \[Gafter 2006\] [Neal Gafter's blog|http://gafter.blogspot.com/], by Neal Gafter's. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3a360cedd3d8866-4265558c-44114c5b-9731b9c5-4eb69a4d9b9f15476c473a62"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro> \[Gamma 1995\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b7cbeb1e90a979a-76772875-4e494ad3-b52691c9-2b960fd39d0a6431e96e6a46"><ac:parameter ac:name="">Garfinkel 96</ac:parameter></ac:structured-macro> \[Garfinkel 1996\] Garfinkel, Simson & Spafford, Gene. _Practical UNIX & Internet Security_, 2nd Edition. Sebastopol, CA: O'Reilly Media, April 1996 (ISBN 1-56592-148-8). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29d7d32b5323f6ac-469ade9d-4aca4a35-899c8677-1a8a1df49f327e75ed2b260b"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 2001\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cc14e234b73cdb56-1bf9ecad-4b44457e-9890b7fb-cd9748972adb583d5da7ee99"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro> \[Goetz 2002\] [Java theory and practice: Don't let the "this" reference escape during construction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6d825fb7cbd63aa-9ef081f3-477142cb-b65398ee-61c3f076430ea139718905d5"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro> \[Goetz 2004\] [Java theory and practice: Garbage collection and performance|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33c42a42e25b08c1-0fe1e307-42894266-a0e48937-f33e18b78062ed936f9cb1df"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro> \[Goetz 2004b\] [Java theory and practice: The exceptions debate: To check, or not to check?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0876a3cb544b6db-170f4452-429c495e-b544aa30-ed9f9e6f9071aa60f4382e44"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro> \[Goetz 2004c\] [Java theory and practice: Going atomic|http://www.ibm.com/developerworks/java/library/j-jtp11234/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89c3964e5bab9c1a-bce703b2-406442e4-98cd8c8e-038b571a0bd01dad93c7a8e0"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro> \[Goetz 2005\] [Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="859fb8a1097420cc-7d60ff42-4bef499a-825790cf-32638b9268e3c0735aa150d9"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro> \[Goetz 2005b\] [Java theory and practice: Plugging memory leaks with weak references|http://www.ibm.com/developerworks/java/library/j-jtp11225/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba083d7e4466c532-b2cb3352-4c394001-98afbd85-b9e2302b688b6dbdf234e479"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 2006\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="003e8fc83f660a4e-85bf6709-40c44e39-b489913d-742e866bf746b7b782eac1ec"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro> \[Goetz 2006b\] [Java theory and practice: Good housekeeping practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8b7d132a1ccfc15-4de0e13e-4d8646fa-88ab8bf3-7b659509f68a67c711a8f098"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro> \[Goetz 2007\] [Java theory and practice: Managing volatility, Guidelines for using volatile variables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html], by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology). (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93a92821f15aa69a-6d4236a0-4f4a4f2a-94fdaa0e-9e074509bfe26723810f3a72"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, Inc. March 1991. (1991) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e70a7e6eb2bbce23-36861734-494e4bd4-9d7081b1-22d4477a3bd4f4094690887c"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 2003\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f371fffef4ed55d-7303c484-4a754c57-aa19b834-a558dd4673a95badb3f796f3"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro> \[Grand 2002\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27baa86b6f05d644-3acdaa0e-4b5c4e4a-ab258cec-4f0ffd1d137eb70062ed7c87"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 2000\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32358a073fe59701-7eb46055-4f37400b-99d7aa4c-df6cf6a7d762095f6de707c7"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 2008\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef8b4e17ba7eceb5-e244872a-44c04338-8763836a-5f07653a9799584d52c35e5a"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro> \[Grigg 2006\] [Reflection On Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] by Jeffery Grigg. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b7e03bd07acc93e-fa317a08-4e6444fa-8799aa06-f71d2dc530430caca4b99257"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro> \[Grosso 2001\] [Java RMI|http://oreilly.com/catalog/javarmi/chapter/ch10.html], by William Grosso. O'Reilly. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf87f2f238737c6f-21c70efd-43f847e9-be519c8c-fdd1ac5969af3206eea98036"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 2005\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="603b7affbaa612c5-a55ef17c-42794bb3-8cb0a525-65eccdf079b7794da9f9c68e"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro> \[Haack 2006\] [Immutable Objects in Java|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable], by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="647108eefdbb77b9-8acc3163-4a2e41e2-a787bb6c-dab8ffa1d40c6e11422ebd48"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro> \[Haggar 2000\] Practical Java⢠Programming Language Guide, by Peter Haggar. Addison-Wesley Professional. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61d3a5369a0fa33e-db3d9a27-4e9c477d-8f68bddb-fd9dfed5543282354e2a75de"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 2000\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/TechTips/2000/tt0328.html], March 28, 2000, by Stuart Halloway. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9ffaa269e21855d-07feabd5-43524a55-a6cb9539-0a324bec3bdf1271882e98e1"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro> \[Halloway 2001\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/JDCTechTips/2001/tt0130.html], January 30, 2001, by Stuart Halloway. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="820a4f6840f08248-a81281ab-477a4f48-91e198b7-c1fe9f6e08b33bd43ea2cfb6"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 1997\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41001776fd2621f7-4a3608eb-4d364fd9-83889d4d-34af52b6a7573549a6b2ba2b"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 1999\] Java I/O, by Elliotte Rusty Harold. O'Reilley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a913fb158ae39b02-40416c7a-47154144-bb5f894f-aac34e5cdcd3eb78eed744a8"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro> \[Harold 2006\] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32ea532b460f90b7-ee25b7ab-4ea745e8-911492e5-91109c67e73cfdc30df9bdac"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro> \[Hawtin 2008\] [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf] by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af9e800946e90e51-ba5084fc-4fc34f37-a4a3b1a6-2849232d30793eafe7d7833c"><ac:parameter ac:name="">Heffley 2004</ac:parameter></ac:structured-macro> \[Heffley 2004\] Heffley, J. & Meunier, P. âCan Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security?â Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSSâ04) - Track 9 - Volume 9. Island of Hawaii, January 2004. IEEE Computer Society, 2004. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="918b20d51873aa7e-91143d69-44b246ac-8974aee3-0794621b3fdccaf84917c778"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro> \[Henney 2003\] [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19307787e6615bc6-55de6f51-40b84a8a-9bd69ca2-5186d1e492206c8682336fb5"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro> \[Hitchens 2002\] Java⢠NIO, by Ron Hitchens. O'Reilly. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdd7ee2449b06347-eb5b411b-49aa41a2-a2f186c6-a4d8663090f082f218eb7213"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro> \[Hornig 2007\] [Advanced Java⢠Globalization|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2873.pdf], by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="307319b35b2ac832-a1258af1-47a7430e-af7a9414-06f4d8ef888fb6323c098923"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro> \[Hovemeyer 2007\] Finding more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97ad93bf69ecd801-6c517eba-4f3a4275-8b69a866-8451fe7638f6a8a3e8bb2760"><ac:parameter ac:name="">Howard 02</ac:parameter></ac:structured-macro> \[Howard 2002\] Howard, Michael, & LeBlanc, David C. _[_Writing Secure Code, 2nd ed. Redmond, WA:_|http://www.microsoft.com/mspress/books/5957.aspx]_. Microsoft Press, December 2002. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ddfe614c5a9682f4-eb7543b2-4da74713-96e4bc97-97d25ca4369a5cd08ffcaa3b"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro> \[Hunt 1998\] Java's reliability: an analysis of software defects in Java, by J. Hunt and F. Long. Software IEE Proceedings. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bedc4a83e49553e3-c879b482-4d434ad2-9cc4a4c2-a90e04193568d40c872e758b"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro> \[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc5c0324d0b11923-39a13739-4f074eee-b16c91a6-edb827f30cefd6d0ec7d2ada"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro> \[IEEE 754 2006\] IEEE. [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1055e4b409ffea62-8d9fcf8e-47b549a9-9551a63e-8f83c37f69e6e7a550dfba44"><ac:parameter ac:name="">ISO/IEC TR 24772-2010</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24772:2010\] ISO/IEC TR 24772. _Information Technology_ --- _Programming Languages_ --- _Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use_, October, 2010. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc6ef3424b993196-7c442dc8-48ce4da4-be679b81-c1fb49bf23505bc3e7710f42"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 2000\] Java⢠2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/], Sun Microsystems, Inc. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="063296b0f48ffe64-61b0c091-43f74979-acd68051-11027e4675f0d38c60600b14"><ac:parameter ac:name="">J2SE 11</ac:parameter></ac:structured-macro> \[J2SE 2011\] Java⢠SE 7 Documentation, [J2SE Documentation version 1.7|http://download.java.net/jdk7/docs/], Oracle Corp. (2011) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83c238a8107a8e22-d78b3088-4eaf4f47-aaeb8e07-21ee27e567f795132912e60b"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro> \[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html], Sun Microsystems, Inc. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b420f7650c82d634-1c2d09be-41c143a4-b045bb8d-d719710b4bdf748b8fbff0ef"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro> \[Java 2006\] [java - the Java application launcher|http://java.sun.com/javase/6/docs/technotes/tools/windows/java.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8eb12ba2c3b22d45-293ca669-414a4e7d-b5f48653-415b1361e99795fc6945a55d"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro> \[Java2NS 1999\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4692631aea72adcb-9c60a0fe-4edd4493-b2d59bc7-315822431b66dfc0810e29a2"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 2004\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems, Inc. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="042ad8abfb7e18e0-75876a85-42fe4ae4-9c1a9714-65b6cc63490949af1889b797"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro> \[JavaThreads 1999\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ffbff5c4909e78e-65f9797f-455743ee-aa4f9fdd-31c88e938ea45d378a4fb699"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaThreads 2004\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6f6887e0741c6a5-0b8d70dd-49894420-97f3a18c-55e65d62d4ceac97e89d353f"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 2008\] [Java⢠Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], Sun Microsystems, Inc., 19 Dec 2008. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f1cf99da38a352c-40d0d6ea-484843d0-b4e8ab2d-f792d123169e2394168ee342"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 2005\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="005f1ae19bcf1a90-9dc7c105-4c65402e-90f0bb28-d35ca54e96e17ab0145bc2de"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 2006\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19c3f5f1c6800d69-ffecc195-49194950-b7049202-571126f29499cff71ced4c28"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 2006\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7194e82ef03b184-580315d2-4e9f4a92-9ed6a070-f4c14d1e0a61326015987d37"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 2006\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7477da247cfe1cb-29617e4a-4e00470c-ac8aba15-cab1d0e40719e7bce3f1a2cb"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro> \[Jovanovic 2006\] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29], Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="378b468c74fd89fb-dfd2a14e-48b84eae-8f128fcf-b2a83aaa8a210d4512e687ec"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74fc7b288490b4af-fd3fef66-4863463d-9af5b05e-cc875f56872babeb29c3fba9"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro> \[JPL 2006\] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="302bf73086a60583-36d22caf-4a3e47e3-a6cc8021-cb0d6566530700ec3f5556b6"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro> \[JSR-133 2004\] [JSR-133: Java⢠Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf]. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cbdb708c40db72d2-0302950e-42a14dbd-9278a18d-f50d1ee879ac5ce2a959675b"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9919c23181ade7d7-daccfdeb-45e24878-81b798e6-cdc564e202e37b05a309a731"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 1999\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8de016410695d09d-942b9056-4a5148c7-a3fdaad4-c7dd22d2d8855357640a95a8"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro> \[Kabanov 2009\] [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ba7e844c14c68d3-2254c98c-4dcf46db-b2db8eb2-81edb636433244be79775adc"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 2001\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="584af318ce21d6d5-d72ec45c-462847aa-9bac96c4-5e6a90d75b0c49f18c38b8c3"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 2004\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbb005cc2f88d874-c780e411-42a047a2-af5ab988-0ae02a640f2520d0b3afea8d"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro> \[Knoernschild 2001\] Java⢠Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001) |
...
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60f152560e6b8be3-87adbd29-4e7a4736-8c74aeac-3e41053c62e10fc56b235f11"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 2008\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a049a02d4d08c25-48575bf4-441f4b24-ac918e48-9ac6c3a481ef8d8e5a6003ae"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 2000\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="365ec6c4c9d2d8ea-e9b1ab4f-46134c7a-a0d5af6e-d321c661c7602439346b6fed"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro> \[Lea 2000b\] [Correct and Efficient Synchronization of Java⢠Technology based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf], by Doug Lea and William Pugh. JavaOne Conference. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c0fe9b66db8ca93-29b982f0-449e4d32-8b5aa1f7-73f743cfd68dd988198b4abc"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro> \[Lea 2008\] [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html], by Doug Lea. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcdfc050a3ffcb2a-41891ec0-4ba74143-bd68b079-551afcd454f1913a41bdecf0"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro> \[Lee 2009\] [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf], by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d279ed522ae6b96-292ce7d9-400545e1-9aa99bde-90354581fd7f9a2e30539454"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 1997\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c50bb7b07426b0a5-0b94d251-4e4e4f7d-91ddb292-cfd12ba2061268e25746e142"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro> \[Liang 1998\] [Dynamic Class Loading in the Java⢠Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945], by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42dfba80f810208f-7dc94371-46154b4f-996e82a1-138a76b3f2eaffe90fd16874"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro> \[Lieberman 1986\] [Using prototypical objects to implement shared behavior in object-oriented systems|http://portal.acm.org/citation.cfm?id=28718]. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fd7e7690c9df1cb-3938d875-4d72473a-b5e281fe-40af08ca255e8670f0db5bc2"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro> \[Lo 2005\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a0f06f1580924b3-1bdca538-45234979-b2929f4e-cd3207b8bd3934d2d22f999e"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 2005\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="744dce955aef953d-45564cf7-495943e0-9da3a03c-8d894320a86afc3ba8d13381"><ac:parameter ac:name="">LSOD 02</ac:parameter></ac:structured-macro> \[LSOD 02\] Last Stage of Delirium Research Group. Java and Java Virtual Machine Security. Poland: Last Stage of Delirium Research Group, 2002. [http://www.lsd-pl.net/documents/javasecurity-1.0.0.pdf]. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d94ec9afd30b03fc-e150f21e-4a224b40-8d658146-407eeb8c84a01ef577e9e0ac"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 1997\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="670dc41ae399de35-29f024be-4e404b2d-998f9cf2-25831ffbfae5b71a69b728e8"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 1998\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96aa17e2df036b86-6c4fa03f-48d742c3-bb45bab9-70f913f2772e092eec215345"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro> \[Mahmoud 2002\] [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/], by Qusay H. Mahmoud. Oracle. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a027eb9978810ff9-d61ad984-4ba545b7-a266b2b4-d768031e0500b92fadafba73"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro> \[Mak 2002\] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f329ab92d81c36e-80548c20-423f4d36-8aecb1fa-586404611264ca42fe625465"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro> \[Manson 2004\] [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight], by Jeremy Manson and Brian Goetz. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="406c89d38b000d5d-c4b68546-41114077-a9fe8861-e8ea011acb1f3243fb6d2d9e"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro> \[Manson 2006\] [The Java⢠Memory Model: the building block of concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf], by Jeremy Manson and William Pugh, JavaOne Conference. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5146eb6e88702304-1c9fbda3-4b3747a0-854da123-9641297e71b79c40413936f5"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro> \[Martin 1996\] [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf], by Robert C. Martin. (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6768b2840651045e-daef4b69-4de246e3-9968bb45-5a25ff4169ac505fcefc3bc9"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 2001\] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e301aaa46226d0d6-066758a7-430a49f9-ad988bcf-3f3fb080ea5e666df1e194d0"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 1999\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="497754163e2b543e-03e01244-44424478-aa8a8f98-38057c9c89338704e5cd3f6f"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro> \[McGraw 1998\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary McGraw and Edward W. Felten, JavaWorld.com. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ad2a624e54f642e-626443e0-41b04948-b35e9651-59944fd71229971ab3be89eb"><ac:parameter ac:name="">Mettler 2010A</ac:parameter></ac:structured-macro> \[Mettler 2010A\] A. Mettler, D. Wagner, and T. Close. Joe-E: A security-oriented subset of Java. In 17th Network & Distributed System Security Symposium, 2010. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08308385825d1019-41e57656-476c450a-a490a8b0-a61f9a04199238dcc83b35ff"><ac:parameter ac:name="">Mettler 2010B</ac:parameter></ac:structured-macro> \[Mettler 2010B\] Adrian Mettler and David Wagner. 2010. Class properties for security review in an object-capability subset of Java: (short paper). In Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, New York, NY, USA, , Article 7 , 7 pages. DOI=10.1145/1814217.1814224 [http://doi.acm.org/10.1145/1814217.1814224] |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cae7a577a9843737-54966ea3-433c4e83-bd0eb6fd-e36f6749bb07b28403019075"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro> \[Miller 2009\] [Java⢠Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf], by Alex Miller, Terracotta. JavaOne Conference. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2332938f2abb6c72-5a1289ac-41fb4c8c-bed8b1fb-5658def4f7d3d642fb491c4a"><ac:parameter ac:name="">MITRE 2011</ac:parameter></ac:structured-macro> \[MITRE 2011\] [Common Weakness Enumeration|http://cwe.mitre.org/], MITRE Corporation. (2011) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4149148c136714b1-fc5fd895-4cb44536-bc9db80c-1c6775ec2180ddc9e2fd5639"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad6e15534e4a20ef-6309c940-46ba46e4-b08f8e61-93dd413616bff47344f126a2"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro> \[Monsch 2006\] [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p] Version 1.0, by Jan P. Monsch. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a65d2221dfcabd8-1ff10330-4ed14ed5-9207beb1-a91fc25a3db5e517342dd492"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro> \[MSDN 2009\] [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx], Microsoft Corporation. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d520ee7658836b60-566493ce-4f734244-b2529591-7db2d22b3f18c0612960236e"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro> \[Muchow 2001\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a534e158ca5875e-6660a52a-4ba5476a-8ab78bfc-94efbb14403e7dfeb8fc6f33"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro> \[Müller 2002\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82f765df3b224b51-9ee78d02-4c1543c8-8bc5b417-e6cb8bf3103a6a1f5967ccc8"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 2006\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21a9e84a4bae16f1-cf777cf0-49964a5d-aed397df-dafa8c364e7f56bcb914f655"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro> \[Naftalin 2006b\] [Java⢠Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7dd91d96482c8f5b-c4e456ed-47624ce8-8275a907-80631f572f9491bc86518499"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro> \[Netzer 1992\] [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623], by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin --- Madison. (1992) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="037b518bc929ac2d-8d3076cf-4737459c-af1490ab-0fc12b2c25a45d8d67776aec"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro> \[Neward 2004\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0931c061f5071db8-41344588-4fa8458b-b640a52c-5fadcd9773165e47b4330aea"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro> \[Nisewanger 2007\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77bbaff686112a93-4f9049dd-48b04fd3-a6169ed5-6ea25004be0462fff6a02436"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro> \[Nolan 2004\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be54a32e13fefa1c-3a1b37db-4b074d45-b98a96b4-49d4641878924f1bc960d470"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 2001\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c22ab76478194f74-8c5c94b3-42d6464b-a64b9090-1fbf92107a1497aaebeb74fa"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro> \[Open Group 2004\] [The Open Group Base Specifications Issue 6|http://pubs.opengroup.org/onlinepubs/009695399/mindex.html]. The IEEE and The Open Group. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac88a7c5c2965644-d2e93b1b-48d448ba-a9aa849d-03e47dc40e53f1673aa27f7a"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro> \[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://java.sun.com/javase/technologies/hotspot/gc/gc_tuning_6.html], Oracle Corporation. (2010) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21173deeb54ab94a-c4d3e4a4-48ab41a7-a3c1b96c-a25bce32b1f9c93bd2acd6f8"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro> \[OWASP 2005\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15e238475a8e4ae2-6acc15e1-45e54136-89ae967f-f83774fd346d6aad9ad10097"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro> \[OWASP 2007\] [OWASP TOP 10 FOR JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf]. The Open Web Application Security Project. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9908a2d219cebe1-f23be01b-4ee348b4-84008a24-b05121ff1b78ec730027f5a5"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 2008\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd80776c031456d2-6bb1eceb-4a1640a5-a8ba9e2c-47d4a7beecb79e738cfed8c7"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro> \[Permissions 2008\] [Permissions in the Java⢠SE 6 Development Kit (JDK)|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html], Sun Microsystems, Inc. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c38bf26cae9c71b-a155d0b1-41c14773-a5048c09-6c56c91d4dab0ca600525a5f"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro> \[Philion 2003\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb50219b0bfeafeb-df187d90-4c4b4aaf-87328565-0218a109c50071bb95aa9201"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro> \[Phillips 2005\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df4ad2a1ac67ba37-281a3d95-42654a89-a66199dc-98bba33e841a8597d081e6e7"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 2004\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aecd512f1d95b18d-38563aff-4de94268-97798d4d-45511041da048e27d7b773d7"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 2002\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f82465747dd6add8-e1b00cee-45b44f72-a6cc86cb-1b81b9c008f620737c47e775"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro> \[Pugh 2004\] [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/] by William Pugh, Univ. of Maryland. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a08bed20e84ea92b-16a65510-4f2f4ace-914693c7-b6e8bec79e96e8c604c87f81"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro> \[Pugh 2008\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83908deae3d89d0a-bcc4e23d-462f4cdb-9325b568-4a2bf97b6296101c2b041bef"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro> \[Pugh 2009\] [Defective Java Code: Mistakes That Matter|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5335.pdf], by William Pugh, Univ. of Maryland. JavaOne Conference. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="765a5809963627a3-15cf4466-447e4023-991cb356-3b30e246b6a82558119586b3"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro> \[Reasoning 2003\] [Reasoning Inspection Service Defect Data Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf], Reasoning. 14 Nov 2003. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="300d5677a039c03a-a7609c56-43c040a9-b9b7bb9a-adba9e1ebf76c49b5d93f98e"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 2006\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c89126961e7aa659-908c2e83-4f5c4221-92a3b3a2-d51d770c5f1cab4fc6a68d2f"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro> \[Rogue 2000\] [The Elements of Java Style|http://www.ambysoft.com/books/elementsJavaStyle.html], by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="259f5067482fe84d-989b8a15-4f8e4dbd-8da7bd42-5409f713a78550f6a8e4111d"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro> \[Rotem 2008\] [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf], by Arnon Rotem-Gal-Oz. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a330097d4270fd42-d059dc2b-49b34c86-904eb136-131539be199e57add1c383bc"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro> \[Roubtsov 2003\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e261a61a4edd344c-b47b41d2-4c0a4fd7-b30eb964-a3d3ccf9444390ca543c628e"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro> \[Roubtsov 2003b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8b9281032e13c51-7cf329d5-40dc451d-91039e78-11e0463c08328dd449a1b55a"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro> \[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fae2650a49a10a87-3fa66bfe-4d9c44ab-824fb3a5-df9fb161dd398c5e87d1b84a"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro> \[Saltzer 1975\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="957ee52a5d0bf311-7ca99fe3-4daf4dfd-985599b5-60f327ed3c8deea574224727"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro> \[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|http://java.sun.com/security/seccodeguide.html], Sun Microsystems, Inc. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c03bd0dea14df19-3402bbde-410740e6-ba3bb51d-dfc2c3dd69857af446990c0f"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 2007\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c21ee647ed4a36c6-47568dd5-4b994109-88b3a807-6ea4700352d754d12ae0e3f1"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro> \[Schneier 2000\] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1337d5dbfa1eda4d-811898d7-48484d90-8f9f93e8-edf4c5258b08b856aefdc3d1"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro> \[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6ac44c87a3b0b07-03c52d7c-47d7454a-9d53b8f2-362894b11680f25bd55e6d88"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro> \[Schwarz 2004\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cd1e60470fbb4c4-f48eb4a6-4d2e4cda-a31e8701-de44e3d65be7843b0993b6b1"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro> \[Schweisguth 2003\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by Dave Schweisguth. Javaworld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85250d66391496e1-39f816b3-4a6a4d1d-a5f985d1-5595b0a78778070585e89030"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 2008\] [SUN Developer Network|http://developers.sun.com/], Sun Microsystems, Inc. (1994-2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="937ea27cafd287bf-a8167921-46934d09-8f02beae-81e0061c92134f336ab0bf55"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 2005\] Seacord, Robert C. [_Secure Coding in C and C+\+_|http://www.cert.org/books/secure-coding]. Boston, MA: Addison-Wesley. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1fce5cb94376331-1aafa29a-429c4021-83ce9d3e-0301bbcefdea37133a5c4f02"><ac:parameter ac:name="">Seacord 2008</ac:parameter></ac:structured-macro> \[Seacord 2008\] Seacord, Robert C. _The CERT C Secure Coding Standard_. Boston, MA: Addison-Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc8d3c21252638ed-86b1bdd9-4f294ecd-95358ec1-4cfe9918083002a51571b02e"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 2006\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53dcf2b8e44083d5-06bcae2f-465e4183-a06fa3f2-dcfcd7c14632af9363394559"><ac:parameter ac:name="">Secunia 08</ac:parameter></ac:structured-macro> \[Secunia 2008\] [Secunia Advisories|http://secunia.com/advisories/]. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d057fc6ac6ac7ed1-196d3f9f-458a4824-bb629041-ab9983712d8c096aa87286d9"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 2006\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="663bc071f5220200-318b1a00-43b94f22-9517b5aa-d1d1e60bf2988387fc694a58"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 2008\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html], Sun Microsystems, Inc. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="773058b7dd7664d5-6326cebc-45cd414c-a2cd9a89-32703eceada884cad2c48f79"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro> \[Sen 2007\] [Avoid the dangers of XPath injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html], by Robi Sen, IBM developerWorks. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83f64150c8c27996-50c66c52-48a74231-aabb9643-174aa95967223757c9c33168"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 2005\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8bd273b090ec62c7-255bba15-42774297-84c28602-17a7093bd206f6cbb1075aa6"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro> \[Steele 1977\] Steele, G. L. "[Arithmetic shifting considered harmful|http://doi.acm.org/10.1145/956641.956647]." _SIGPLAN Not._ 12, 11 (November 1977), 61-69. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b58fa5a7232f5bc-7795b1ef-4b054f73-a0fca4d5-33df16d0db905ecd0453362a"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro> \[Steinberg 2005\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], Daniel H. Steinberg, January 4, 2005. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="926b0ca021b4f5ee-76c23b79-49bd470b-866e90b3-8ee2c9d3f7fed97bd4b73ec4"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro> \[Sterbenz 2006\] [Secure Coding Antipatterns: Avoiding Vulnerabilities|http://gceclub.sun.com.cn/java_one_online/2006/TS-1238/TS-1238.pdf], by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ef56361a7e39424-be8f5191-4c7c45d2-a5b39a7d-bcb7f239e867722811d26de2"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro> \[Steuck 2002\] [XXE (Xml eXternal Entity) attack|http://www.securityfocus.com/archive/1/297714], by Gregory Steuck (www.securityfocus.com). (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9959fc5f-4280-4f13-87a3-6388c62f1bf0"><ac:parameter ac:name=""> Sun 02</ac:parameter></ac:structured-macro>
\[Sun 02\] Sun Microsystems, Inc. Reflection.
[http://java.sun.com/j2se/1.5.0/docs/guide/reflection/index.html]
(2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d078d93-c3a0-47f9-88c6-2a2b103d7f58="4dd6545b-28e4-497a-8157-3be520621974"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro> \[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://java.sun.com/j2se/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html], Sun Microsystems, Inc. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ca08fee27d99d3a-192c54d6-43cb4035-b4bf8452-cea1c8a6bc04d42467c2c899"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro> \[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/], Sun Microsystems, Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf9910fa309ba6c3-716cc407-49c943f4-8efe8427-dd590575420d82417a2d6a21"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro> \[Sun 2006\] [Java⢠Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b4f9320f9b38ec9-284bde56-40b44fb3-93978721-763614e998e9dc0d84e03363"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro> \[Sun 2008\] [Java⢠Plug-in and Applet Architecture|http://java.sun.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html], Sun Microsystems, Inc. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0655047186b2492b-4004cc7a-413c4df8-88c39cbb-0561c9eb96a0323cc17fa45a"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro> \[Sutherland 2010\] [Composable thread coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485], by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60815ea3e42b7324-9025e602-45604e2a-b8df86d9-3220e089a8f7cb611a8cf2f3"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro> \[Tanenbaum 2003\] Andrew S. Tanenbaum, Maarten Van Steen. [Distributed Systems: Principles and Paradigms, 2/E|http://www.pearsonhighered.com/educator/academic/product/0,,0132392275,00%2ben-USS_01DBC.html]. March, 2003. ISBN-10: 0132392275. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="066aae4b2682a65c-bd476bd4-49c94224-80cb978d-105d3cebd078585d5d6fd9b3"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 2007\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6a9ccd1222c45ce-e342a7fe-41874722-8342887a-ddb2c382f4a303e3ceb58fe9"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro> \[Tomcat 2009\] Tomcat documentation, [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security fixes|http://tomcat.apache.org/security-6.html], the Apache Software Foundation. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8096a9cad4841b0e-4fe314d4-4d3f499e-919b95f3-5e4543c2eff79e95fd08e33d"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 2008\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html], Sun Microsystems, Inc. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a6b0e4518a6a482-63bc95d8-40b84b98-81d6bb38-c33d0c78216011fbde3c6b65"><ac:parameter ac:name="">Unicode 2003</ac:parameter></ac:structured-macro> \[Unicode 2003\] The Unicode Consortium. The Unicode Standard, Version 4.0.0, defined by: The Unicode Standard, Version 4.0 (Boston, MA, Addison-Wesley, 2003. ISBN 0-321-18578-1) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8df6900a3569e632-e2f4ab7f-46544095-89ad8574-fceb3660fcec9062304eeb76"><ac:parameter ac:name="">Unicode 2007</ac:parameter></ac:structured-macro> \[Unicode 2007\] The Unicode Consortium. The Unicode Standard, Version 5.1.0, defined by: The Unicode Standard, Version 5.0 (Boston, MA, Addison-Wesley, 2007. ISBN 0-321-48091-0), as amended by Unicode 5.1.0 ([http://www.unicode.org/versions/Unicode5.1.0/]). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75397f191aaf8760-97a86dad-49a74571-8e2fac53-14588f2918cbb25b72b92460"><ac:parameter ac:name="">Unicode 2011</ac:parameter></ac:structured-macro> \[Unicode 2011\] The Unicode Consortium. The Unicode Standard, Version 6.0.0, (Mountain View, CA: The Unicode Consortium, 2011. ISBN 978-1-936213-01-6)[http://www.unicode.org/versions/Unicode6.0.0/] |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e5d48109c8ea2711-40d172f0-40fd472b-b2739f50-94d1f4bb23e2bfd14c1ba295"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro> \[Venners 1997\] [Security and the class loader architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1] Java World.com, by Bill Venners. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="efc91b1d4173b576-7140505e-4ddb48a5-900ca41c-d53ed1ef02829927a683053a"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro> \[Venners 2003\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="feb43fabb0266773-e53adb27-4e5e46b7-ad9782f8-301ea13d293f2a709463ac2b"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro> \[W3C 2008\] [Extensible Markup Language (XML) 1.0 (Fifth Edition)|http://www.w3.org/TR/REC-xml/#include-if-valid], W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="389a477753634af8-0f296718-4c664c56-8017913a-4e7a9a5758363648b854467d"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro> \[Ware 2008\] [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/], Michael S. Ware. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de8be7c7a8e7b51c-5e78aa68-40e64287-8942ab7f-651da65694f82d064d01abee"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro> \[Weber 2009\] [Exploiting Unicode-enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf], by Chris Weber, Casaba Security. CanSecWest March 2009. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0d9d474250a8d7c-9b274a23-486f43e6-b7a5a454-d1fca4f45ade2e675ac6bb38"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 2003\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2239b0f8f335244-77169126-4e72448f-8bd68016-25863c72b2e1ff9906e9ceb5"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro> \[Zukowski 2004\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], John Zukowski, May 18, 2004. (2004) |