...
[Grosso 2001] Grosso, William.
Java RMI. Sebastopol, CA: O'Reilly (2001).
Anchor |
---|
| Guillardoy 12 |
---|
| Guillardoy 12 |
---|
|
[Guillardoy 2012] Guillardoy, Esteban (Immunity Products). Java 0-day analysis (CVE-2012-4681) (August 28, 2012). [Gupta 2005] Gupta, Satish Chandra, and Rajeev Palanki.
Java Memory Leaks—Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0. IBM developerWorks (2005).
...
[Mak 2002] Mak, Ronald.
Java Number Cruncher: The Java Programmer's Guide to Numerical Computing. Upper Saddle River, NJ: Prentice Hall (2002
).[Manion 2013] Manion, Art. Anatomy of Java Exploits, CERT/CC Blog (January 15, 2013).
[Manson 2004] Manson, Jeremy, and Brian Goetz.
JSR 133 (Java Memory Model) FAQ (2004).
...
[Oracle 2012b]
Java Platform Standard Edition 7 Documentation. Oracle (2012
).[Oracle 2013] Oracle Security Alert for CVE-2013-0422. Oracle (2013).
[OWASP 2005] OWASP (Open Web Application Security Project).
A Guide to Building Secure Web Applications and Web Services (2005).
...