Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05d1871d051962ca-45a7b77c-41504fe1-b10baeea-6add885757bca7affcb9d5d3"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a079ef14413ab003-05bc62bd-4cf742fd-8e638871-60f48aa32ebda3a51921fb76"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8cd9bb804978e07-4591b830-4a3c4f29-82ce8e92-3d0ef332be910fba013421b8"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
\[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="696373606dd6ec4a-4899dfe3-41ec4f91-b5d5a181-079a38aced470857da2d0416"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
\[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec993b15ced6b330-473ca245-428c4a24-b7c78b7a-870d6ca313dc78005a30edc5"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
\[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e63194921ea0dea5-9640539f-4fc34ded-b7eb9e3e-9cca9f25f81b3058c834562a"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
\[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a00e7af0dc5da510-a02e6ad2-4bd34b62-ba4db11b-7a8102c99fa0c3e4ed0fb350"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="794e5477b1f965b5-1b4ef6d1-4f144a9d-aa7ca877-d1e95cfb8a966b1f4b08ae55"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a190ff3f83bd6d1-611337ec-43324f47-b8d38c68-64a712a673c765de6933d436"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71ffa8f8-2ac2-4451-85dc-0b74f4d570b0"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88046033-d63b-411f-bc49-5556b8bf8817"8c3ccf90-2ff8-4642-ba63-b1f70630a6f9"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40557677d5f398dc-ef2b89ec-467a4e40-829f942d-6909a8e1000ad5d0df53c243"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9362b3707ab74f2c-e94eae35-4c814c94-9b77b79a-13d59112ac5a9f3885b91b7c"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
\[JNI 97\] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2481e9eed44a82a-d95c995c-49304427-88bdbaae-f5c7d8338ff4d8b945090b16"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> 
\[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f4f60d4d8eb55f7-b4f95b38-4a3c4e3a-ab26bdcf-cf6fbbd91b3f90d06919d5e1"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fa4ddefffbb4c45-d34c1b10-4e32441e-b476a81f-e4496066370f39138c7767fa"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b173ae6274dae4b-d7411447-4f9f40d2-a5eab2aa-e041dd68ab29fc414a44f25e"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b970a42df48a46f-269c3c64-48364e20-bfbb9086-f51c44031c8495d798a3ffb5"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a43a0b02745cd6be-fb25d45b-477d4cd1-bffb9c5a-097509e231314fe575192a8a"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
\[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8eeb5601af29178-5ceb2126-4f9749ca-b0158deb-eef159e22c0b408f89e602a0"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
\[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06987ac3c34d47ed-ca435866-44a84564-8667ae9d-d1600c7ba7690e805cd6be2e"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bf66424fdbb81ab-4ea471d5-4f32492f-bbb39b6b-b131348b6427cc4334171c96"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro>
\[Secrets 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d41f4f2c3d561d1-90c4ec38-4fa248d6-85f08721-33937c90daca36f5572a4fda"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006)