...
[McGraw 1998] McGraw, Gary, and Edward W. Felten.
Twelve Rules for Developing More Secure Java Code.
JavaWorld.com (1998).
[Mettler 2010a] Adrian Mettler, David Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, 17th Network & Distributed System Security Symposium, 2010. [Mettler 2010b] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI 10.1145/1814217.1814224, 2010. [Miller 2009] Miller, Alex.
Java⢠Java™ Platform Concurrency Gotchas. JavaOne Conference (2009).
[MISRA 2004] MISRA Limited.
" MISRA C: 2004 Guidelines for the Use of the C Language in Critical Systems.
" Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X).
...
[Muchow 2001] Muchow, John W.
MIDlet Packaging with J2ME.
ONJava (2001).
Anchor |
---|
| Müller Muller 02Müller |
---|
| Muller 02 |
---|
|
[
Müller Müller 2002]
MüllerMüller, Andreas, and Geoffrey Simmons.
Exception Handling: Common Problems and Best Practice with Java 1.4. Sun Microsystems (2002).
...
[Naftalin 2006b] Naftalin, Maurice, and Philip Wadler.
Java⢠Java™ Generics and Collections: Tools for Productivity. JavaOne Conference (2007).
[Netzer 1992] Netzer, Robert H. B., and Barton P. Miller.
What Are Race Conditions? Some Issues and Formalization.
ACM Letters on Programming Languages and Systems 1(1):
74â“88 74–88 (1992).
[Neward 2004] Neward, Ted.
Effective Enterprise Java. Boston: Addison-Wesley (2004).
...