Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5c1372215572d20-ce8156f0-49784414-a5e4a7ed-2f6cb9ce7e63dbb29d54980c"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d0276b9a88559d7-1b4de839-43f24a59-bdbfa3c8-be5989daab9489c940c8648e"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c30738452d8364ac-b786e46a-42044469-b9c3ab3f-a5405e260ba81cde569b5a6e"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c9a6b4fb780a1f1-59cef376-4a2a4146-a05bbf7a-26e0c006d82d88855026c9e7"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro> \[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f33e5a327cd380d9-442ca572-4ce94459-9bad92e0-f3ac45dfe38fd475ffd8abd0"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro> \[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66f7cfaa648f24df-657979df-4f26426e-8fc5b5cd-bb1f69cc25a0198946685c64"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro> \[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dff0514c45e4fd22-ca788363-4dd14048-b6e9b158-b733b7dd9f70cf213e5061dd"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro> \[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fa71355a265b2a2-e60ddfb8-41ef4787-99a0a147-dd4b35858302904d00c0f34b"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b08574fa01e15cf9-015484d5-4bbf4100-9803a671-176f6c0b4fc9d43e96bb4d0e"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f72c64ba7b5b4e92-7455ccd8-4fc34541-adc6a393-1e4048d4420bd38d9a33985a"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ce27f1276b6f183-ba97d252-445542fc-9c12a013-fef7553cc9a35afb755e01d8"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="458c05e9cc223019-3bfcca4d-4d5b419b-a745a82f-fc80e1a726ec24ad8419c129"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="389472f643818db9-96087c96-45854d49-85699dc5-bf8c074cd545d10c8eda0672"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro> \[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b9cac2a9de4bf16-e53e5425-4f244998-9813b48e-c886224c54f339ab47cde5e8"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro> \[JNI 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93fd6682756c34d5-6f77aab0-4fa349b2-921f8870-eaa109a7181a30603c12299b"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> \[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90bae812f0a7e92e-7a7829ff-4bd24113-8ea9a331-22cba6375e82a0e55e5149b2"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f400e7f453dedfb9-26a9f112-4d594037-a1958523-568bdc1b423792779c8dbfda"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7468b9a7fcee6546-f048fafe-4df54988-b907a277-71494356a1696441e6bb8131"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e5561975c44b628c-b41aaca6-49404bad-a1768d4f-9b26aea8a3ccd869567a451c"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3c7b90123e59e12-609ad346-48934cf8-81f1b599-83cc8426ed9ac084937b3ca2"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro> \[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8a2cda503945b91-1e821754-4b2f4a40-8c90bf58-10ea01498c957a5c98a1c49e"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro> \[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="711fabe8630debea-9450f887-49a543c3-a35dad0f-1cc3fba5346d1d9aa6fc1700"><ac:parameter ac:name="">SecArch>SCG 06<07</ac:parameter></ac:structured-macro> \[SecArchSCG 0607\] [Secure Coding Guidelines for the Java 2Programming PlatformLanguage, Securityversion Architecture2.0|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.docseccodeguide.html] (20062007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49d98394f007e3a5-ee80bdb6-43bf4ec3-826ba396-2e4381b15fc53d9e0680ebc8"><ac:parameter ac:name="">Secrets>SecArch 97<06</ac:parameter></ac:structured-macro> \[SecretsSecArch 9706\] [Java Secrets2 byPlatform Elliotte Rusty Harold. Wiley. (1997Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4d1c38cfc895ee7-cb61f93c-43324063-8720a375-28a96656e9305a293e8fe8c1"><ac:parameter ac:name="">Security>Secrets 06<97</ac:parameter></ac:structured-macro> \[SecuritySecrets 0697\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006 Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="667ee1d0c1c1075e-421f2219-430a4f20-8f9784c4-5e53a20b9c580c2e3f0be5e2"><ac:parameter ac:name="">SCG>Security 07<06</ac:parameter></ac:structured-macro> \[SCGSecurity 0706\] [Secure Coding Guidelines for the Java Programming Language, version 2.0Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/seccodeguide.html] (20072006) |