Anchor | ||||
---|---|---|---|---|
|
[Abadi 1996] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8e88fc0-9553-4ae7-9646-ea949eae3a3e"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://docs.oracle.com/javase/6/docs/api/]. Oracle (2006/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09da7149-851b-4ae3-be7f-179830c034ed"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
\[API 2011\] [Java Platform, Standard Edition 7 API Specification|http://download.oracle.com/javase/7/docs/api/index.html]. Oracle (2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f127aa08-c9fb-46ac-af2d-1da270963e00"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
\[Austin 2000\] Austin, Calvin, and Monica Pawlan. [_Advanced Programming for the Java 2 Platform_|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents]. Boston: Addison-Wesley Longman (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bb60b1c-4ede-48e2-ae4e-e719918547f7"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
\[Black 2004\] Black, Paul E., and Paul J. Tanenbaum. "partial order." In [_Dictionary of Algorithms and Data Structures_|http://xlinux.nist.gov/dads/HTML/partialorder.html] \[online\]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3208d959-578e-481f-95ad-0774c0ecb4d0"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
\[Black 2006\] Black, Paul E., and Paul J. Tanenbaum. "total order." In [_Dictionary of Algorithms and Data Structures_|http://xlinux.nist.gov/dads/HTML/totalorder.html] \[online\]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0f68cc8-1a3d-4aa2-8fc0-74d969c938e2"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
\[Bloch 2001\] Bloch, Joshua. _Effective Java: Programming Language Guide_. Boston: Addison-Wesley (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99f52b01-1591-4375-9a29-a959165b23f4"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 2005\] Bloch, Joshua, and Neal Gafter. _Java Puzzlers: Traps, Pitfalls, and Corner Cases_. Upper Saddle River, NJ: Addison-Wesley (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="365305eb-eee5-4d25-8912-d92ca263b023"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
\[Bloch 2005b\] Bloch, Joshua, and Neal Gafter. [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/]. JavaOne Conference (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef8d249b-d003-4cb5-a00e-e9030fcc5a23"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
\[Bloch 2007\] Bloch, Joshua. [Effective Java⢠Reloaded: This Time It's (Not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf]. JavaOne Conference (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94774cfb-6160-487c-9db8-b3b36a53aee8"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 2008\] Bloch, Joshua. _Effective Java_, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9e22dec-87e0-4c45-acf8-4d8f6e0cb068"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
\[Bloch 2009\] Bloch, Joshua, and Neal Gafter. [Return of the Puzzlers: Schlock and Awe|http://www.oracle.com/technetwork/server-storage/ts-5186-159197.pdf]. JavaOne Conference (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a76f2564-01de-44d0-b7a2-28a48ebaa70c"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
\[Boehm 2005\] Boehm, Hans-J. Finalization, Threads, and the Java⢠Technology-Based Memory Model. JavaOne Conference (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d67e5bb7-fef7-4c16-b724-fb2b5325ae7d"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 1996\] Campione, Mary, and Kathy Walrath. _The Java Tutorial: Object-Oriented Programming for the Internet_. Reading, MA: Addison-Wesley (1996). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12db7812-7d24-4499-8801-a360a7a1653b"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
\[CCITT 1988\] CCITT (International Telegraph and Telephone Consultative Committee). _CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework_. Geneva: International Telecommunication Union (1988). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48baa291-b147-425a-961a-8c5998efc8cf"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 1999\] Chan, Patrick, Rosanna Lee, and Douglas Kramer. _The Java Class Libraries: Supplement for the Java 2 Platform, v1.2_, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74f4e3e7-795a-4b0e-919c-057b95b35d24"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
\[Chess 2007\] Chess, Brian, and Jacob West. _Secure Programming with Static Analysis_. Upper Saddle River, NJ: Addison-Wesley Professional (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c817b3e-b568-415c-b5b5-d65dd496c444"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
\[Christudas 2005\] Christudas, Binildas. [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], _ONJava_ (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d37f25b4-4347-4a67-975d-8dd73f9a6fe2"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
\[Cohen 1981\] Cohen, D. [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], _IEEE Computer_, 14(10):48â54 (1981). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da5639d1-4380-4797-a6bf-f5171353005a"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
\[Conventions 2009\] [Code Conventions for the Java Programming Language|http://www.oracle.com/technetwork/java/codeconv-138413.html]. Oracle (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0824f2aa-942f-4433-bee5-b33bb0473ca3"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
\[Coomes 2007\] Coomes, John, Peter Kessler, and Tony Printezis. [Garbage Collection-Friendly Programming|http://docs.huihoo.com/javaone/2007/java-se/TS-2906.pdf]. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e5ae1a4-57b5-4537-a49f-df268aeaf6ca"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
\[Core Java 2004\] Horstmann, Cay S., and Gary Cornell. _Core Java⢠2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3d04df2-14f8-435d-808c-26da11bd2a70"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
\[Cunningham 1995\] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In _Pattern Languages of Program Design_, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9029f8fb-19b7-4a97-b26c-c0ab1eb7c40c"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
\[CVE 2008\] MITRE Corporation. [Common Vulnerabilities and Exposures|http://cve.mitre.org/index.html] (2008/2012). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33ec2650-a8e4-4daf-ab8c-4fab1262d5ce"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
\[Daconta 2000\] Daconta, Michael C. [When Runtime.exec() Won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html]. _JavaWorld.com_ (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb39e734-5f1a-4b68-9a68-8a44f94f4355"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
\[Daconta 2003\] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. _More Java Pitfalls_. Indianapolis: Wiley (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5ffc960-d39a-4f85-9b65-553cbe394cad"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
\[Darwin 2004\] Darwin, Ian F. _Java Cookbook_, 2nd ed. Sebastopol, CA: OâReilly (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="905fe89c-0c12-4eef-9078-3d45393ddb55"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
\[Davis 2008\] Davis, Mark, and Martin Dürst. [Unicode Standard Annex #15: Unicode Normalization Forms|http://unicode.org/reports/tr15/] (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="112c3e91-f66e-4721-9dda-8156760ccb6e"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
\[Davis 2008b\] Davis, Mark, and Michel Suignard. [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/] (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2e18cc5-b59a-4c75-b7ca-9d0c2ac9795b"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
\[Dennis 1966\] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. _Communications of the ACM_, 9(3):143â155 (1966). doi: 10.1145/365230.365252. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="546325e1-f3cb-4603-b015-bc4527913ab5"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
\[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/] (2006/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="627fa546-b955-43c7-96ba-ceca609269e7"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
\[Dormann 2008\] Dormann, Will. [Signed Java Applet Security: Worse Than ActiveX?|http://www.cert.org/blo gs/vuls/2008/06/signed_java_security_worse_tha.html] CERT Vulnerability Analysis Blog (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b1d52e4-ee7d-435c-b927-5f411749d592"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
\[Doshi 2003\] Doshi, Gunjan. [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html]. _ONJava_ (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="321e736c-1a99-42fc-a184-8a8b2be9c9c1"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
\[Dougherty 2009\] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. [Secure Design Patterns|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]. CMU/SEI-2009-TR-010 (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1340fbd9-b088-4b39-9b44-285ddee4ca5f"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
\[Eclipse 2008\] [Eclipse Platform|http://www.eclipse.org/platform/], The Eclipse Foundation (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9c451d8-456c-4e94-bf9e-6c05f15efba7"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
\[Encodings 2006\] [Supported Encodings|http://docs.oracle.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Oracle (2006/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8d5727a-9b0e-44d7-b18b-2f2b4709099b"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 2003\] Eckstein, Robert. _Java Enterprise Best Practices_. Sebastopol, CA: O'Reilly (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93ba94fb-9522-460d-9114-b5c8eeb81b61"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
\[ESA 2005\] ESA (European Space Agency). [Java Coding Standards|http://software.ucv.ro/~eganea/SoftE/JavaCodingStandards.pdf]. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e51227d5-f688-4734-ad31-37bb62ffd348"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
\[Fairbanks 2007\] Fairbanks, George. [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html]. PhD thesis, Carnegie Mellon University (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e326b9bd-e79f-4ce0-a3e4-8baaeb1dab51"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
\[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61655679-ffdd-4a00-aad4-d5126bb7bc98"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
\[Fisher 2003\] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. _JDBC API Tutorial and Reference_, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d7ca03f-ec33-4e8c-8de5-84ded160d946"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
\[Flanagan 2005\] Flanagan, David. _Java in a Nutshell_, 5th ed. Sebastopol, CA: O'Reilly Media (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="415fbb88-34b4-4f4c-8ae5-8c7e0023158f"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
\[Fortify 2008\] Fortify Software Security Research Group with Gary McGraw. [A Taxonomy of Coding Errors That Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] (see Java/JSP) (2008/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f04745b-feb9-4a57-88b5-18d1a249ac3f"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
\[Fox 2001\] Fox, Joshua. [When Is a Singleton Not a Singleton?|http://www.javaworld.com/javaworld/jw-01-2001/jw-0112-singleton.html] _JavaWorld_ (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a9eb2a6-24fb-4188-b509-87d9bbab0a48"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
\[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm]: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2de7faa3-7b09-44fe-93c1-d9f858f76fd9"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
\[Gafter 2006\] Gafter, Neal. [Neal Gafter's blog|http://gafter.blogspot.com/] (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ddb64248-fc6a-4adf-b719-dd9b7a807b73"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
\[Gamma 1995\] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. _Design Patterns: Elements of Reusable Object-Oriented Software_. Reading, MA: Addison-Wesley (1995). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="534dd2b6-bfe7-4b54-92c6-a06544b6a3ce"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 2001\] Garms, Jess, and Daniel Somerfield. _Professional Java Security_. Birmingham, UK: Wrox Press (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de411323-c248-4d13-b7b0-efd0304e6b9e"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
\[Goetz 2002\] Goetz, Brian. [Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html]. IBM developerWorks (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3bc9c11-07f0-410e-b11e-705941ed947c"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
\[Goetz 2004\] Goetz, Brian. [Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes|http://www.ibm.com/developerworks/java/library/j-jtp01274.html]. IBM developerWorks (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c1c546e-6269-4e71-876f-9a92b1bd8b27"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
\[Goetz 2004b\] Goetz, Brian. [Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?|http://www.ibm.com/developerworks/library/j-jtp05254.html] IBM developerWorks (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72d957e6-bc3e-4287-930b-b4e6d7cbad8b"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
\[Goetz 2004c\] Goetz, Brian. [Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent|http://www.ibm.com/developerworks/java/library/j-jtp11234/]. IBM developerWorks (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6ca8a24-4cd0-4cba-afc0-78e477f27e0e"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
\[Goetz 2005\] Goetz, Brian. [Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html]. IBM developerWorks (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c01185c0-d25e-4c39-8439-dadea37fcf05"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
\[Goetz 2005b\] Goetz, Brian. [Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships|http://www.ibm.com/developerworks/java/library/j-jtp11225/]. IBM developerWorks (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a1ea2ae-07d1-4573-8273-c1862ccbb44f"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
\[Goetz 2006\] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. _Java Concurrency in Practice_. Upper Saddle River, NJ: Addison-Wesley Professional (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79423996-0dd7-46c9-a5d6-e0e8e1582e86"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
\[Goetz 2006b\] Goetz, Brian. [Java Theory and Practice: Good Housekeeping Practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html]. IBM developerWorks (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9399faa4-ca26-4f5b-95bc-6137652e1305"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
\[Goetz 2007\] Goetz, Brian. [Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html]. IBM developerWorks (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a135613c-1732-413b-b6f4-0e3c440027d5"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic| http://docs.oracle.com/cd/E19957-01/806-3568/ncg_goldberg.html]. Sun Microsystems (1991/2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65fe4b8f-64c8-4868-8e4b-82f021efa59d"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 2003\] Gong, Li, Gary Ellison, and Mary Dageforde. _Inside Java 2 Platform Security: Architecture, API Design, and Implementation_, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b712c94f-064e-4f25-bf0b-70db88b9e5df"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
\[Grand 2002\] Grand, Mark. _Patterns in Java, Vol. 1_, 2nd ed. New York: Wiley (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6806c6f2-153e-4183-8525-b153a64a17a2"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
\[Greanier 2000\] Greanier, Todd. [Discover the Secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/]. Sun Developer Network (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce7b3258-0313-4ceb-a851-dc658bfc2954"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
\[Green 2008\] Green, Roedy. [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] (2008/2012). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b22c055a-1229-474c-8507-24f15852d90c"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
\[Grigg 2006\] Grigg, Jeffery. [Reflection on Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b663b005-9eec-48ac-8732-2cc4d970bde7"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
\[Grosso 2001\] Grosso, William. [_Java RMI_|http://oreilly.com/catalog/javarmi/chapter/ch10.html]. Sebastopol, CA: O'Reilly (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b4c12c3-086f-45f3-a901-52300e7c8eac"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
\[Gupta 2005\] Gupta, Satish Chandra, and Rajeev Palanki. [Java Memory LeaksâCatch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/]. IBM developerWorks (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9a838af-026a-43ab-8e77-cad50d6b2940"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
\[Haack 2006\] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. [Immutable Objects in Java|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable]. Research report, Radboud University Nijmegen (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e85ef80e-4c6c-47a8-977e-528b3ff1a026"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
\[Haggar 2000\] Haggar, Peter. _Practical Java⢠Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5783d554-a360-40bd-b4f7-54f0506a6668"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
\[Halloway 2000\] Halloway, Stuart. [Java Developer Connection Tech Tips|http://javaservice.net/~java/bbs/read.cgi?m=devtip&b=jdc&c=r_p_p&n=954297433], March 28, 2000. Sun Microsystems (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a7fadec-97cd-4f0a-9e22-7650f7dec82c"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
\[Halloway 2001\] Halloway, Stuart. [Java Developer Connection Tech Tips|http://www.javaservice.net/~java/bbs/read.cgi?m=devtip&b=jdc&c=r_p&n=981107352&p=1&s=t], January 30, 2001. Sun Microsystems (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba0d9568-3b42-451f-9dfb-99830080cc24"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
\[Harold 1997\] Harold, Elliotte Rusty. _Java Secrets_. Foster City, CA: IDG Books Worldwide (1997). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2e9b2f3-1e18-4f21-863b-39410e66f913"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
\[Harold 1999\] Harold, Elliotte Rusty. _Java I/O_. Sebastopol, CA: O'Reilly (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6666d78d-1a68-4101-81bc-9b928cacf103"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
\[Harold 2006\] Harold, Elliotte Rusty. _Java I/O_, 2nd ed. Sebastopol, CA: O'Reilley (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b45cba11-289a-4904-a7c1-c4c1a42f75d0"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
\[Hawtin 2008\] Hawtin, Thomas. [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf]. Sun Microsystems, Make It Fly, London (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32a2f4ba-e9bb-4f84-85e5-c7c7b41cbb59"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
\[Henney 2003\] Henney, Kevlin. [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf] (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8400b0b1-3362-4874-9bca-73c205fce877"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
\[Hitchens 2002\] Hitchens, Ron. _Java⢠NIO_. Cambridge, MA: O'Reilly (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e653d91f-9865-4197-936c-b9eecc90b6d7"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
\[Hornig 2007\] Hornig, Charles. [Advanced Java⢠Globalization|http://61.153.44.88/javaone/2007/java-se/TS-2873.pdf]. JavaOne Conference (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff9a3ab6-7f5b-401b-88a7-ce4c9f47b1fd"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
\[Hovemeyer 2007\] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In _Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE)_, San Diego (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e803fd6a-077b-4d46-a09d-49e0be6a03d0"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
\[Hunt 1998\] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. _IEE Proceedings: Software_ 145(2/3):41â50 (1998). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc1e2e49-5d8f-4b49-a318-76fa672b5fe8"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
\[IEC 60812 2006\] IEE (International Electrotechnical Commission). _Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA)_, 2nd ed. Geneva: IEC (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="778de44c-461d-4964-bb49-9b3117594d5f"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
\[IEEE 754 2006\] IEEE (Institute of Electrical and Electronics Engineers). [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985). New York: IEEE (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71198871-1c00-4952-97fb-08cc86ae97d9"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 2000\] JavaTM 2 SDK, Standard Edition Documentation, [J2SE Documentation version 1.3|http://docs.oracle.com/javase/1.3/docs/guide/]. Sun Microsystems/Oracle (2000/2010). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f4f5147-9ca7-429d-a78c-1c9b71d2f336"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
\[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://docs.oracle.com/javase/1.5.0/docs/guide/jar/jar.html]. Oracle (2008/2010). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="833d9925-cb2d-4d96-a0ad-6d893c9903e5"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
\[Java 2006\] [java: The Java Application Launcher|http://docs.oracle.com/javase/6/docs/technotes/tools/windows/java.html]. Oracle (2006/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c64880ce-5716-4c25-8dbe-c79a855b695f"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
\[Java2NS 1999\] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. _Java 2 Network Security_. Upper Saddle River, NJ: Prentice Hall (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd7b56a7-a6ad-4635-bfc7-2be169d4afb4"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
\[JavaGenerics 2004\] [Java Generics|http://docs.oracle.com/javase/1.5.0/docs/guide/language/generics.html]. Oracle (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6eca98e7-4104-4004-8ef0-4c9e7e815dbc"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
\[JavaThreads 1999\] Oaks, Scott, and Henry Wong. _Java Threads_, 2nd ed. Sebastopol, CA: O'Reilly (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24bacde8-93a1-4aa8-b0d6-fcbbc240ddfa"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
\[JavaThreads 2004\] Oaks, Scott, and Henry Wong. _Java Threads_, 3rd ed. Sebastopol, CA: O'Reilly (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b239046-2116-4aa0-bc50-11f4c5654b4a"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
\[JDK7 2008\] [Java⢠Platform, Standard Edition 7 Documentation|http://docs.oracle.com/javase/7/docs/]. Oracle (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a3c20f4-d894-47e7-9910-bc14eeec06a8"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 2005\] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. _Java Language Specification_, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32d77717-aec8-42ae-921c-aeaab6eec6fb"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
\[JLS 2011\] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. [_Java Language Specification: Java SE 7 Edition_|http://docs.oracle.com/javase/specs/jls/se7/html/index.html]. Oracle America (2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb6db9dd-c3c2-4728-aeb6-9f826bec4518"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
\[JMX 2006\] [Monitoring and Management for the Java Platform|http://docs.oracle.com/javase/6/docs/technotes/guides/management/index.html]. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d546073-801c-4009-8fb9-d5816ad9307f"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
\[JMXG 2006\] [Java SE Monitoring and Management Guide|http://docs.oracle.com/javase/6/docs/technotes/guides/management/toc.html]. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="091abd50-91c1-46ea-86a1-49a4b317883c"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
\[JNI 2006\] [Java Native Interface|http://docs.oracle.com/javase/6/docs/technotes/guides/jni/index.html]. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58fd23dd-644b-4ae0-9cfe-c876ce6ce497"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
\[Jovanovic 2006\] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29]. In _Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)_, pp. 258â263, May 21â24, Oakland, CA (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56f2fd32-9f4e-423c-86f1-86bf82442b45"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
\[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://docs.oracle.com/javase/6/docs/technotes/guides/jpda/index.html]. Oracle (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e81c472-26cd-45fd-8f43-7476cc81d8f6"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
\[JPL 2006\] Arnold, Ken, James Gosling, and David Holmes. _The Java⢠Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04033583-d1db-4fac-bbf2-e0d74631a0a6"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
\[JSR-133 2004\] [JSR-133: JavaTM Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf] (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a74bef9-0e66-4078-8be7-0addbe5720f5"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
\[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://docs.oracle.com/javase/6/docs/technotes/guides/jvmti/index.html]. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a879a34a-101c-4184-abc9-debd17f0cadd"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
\[JVMSpec 1999\] [The Java Virtual Machine Specification|http://docs.oracle.com/javase/specs/]. Oracle (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae0552ee-1d0c-48de-9db4-96929d98d348"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
\[Kabanov 2009\] Kabanov, Jevgeni. [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d432fc72-afbb-4e7d-be19-d0d409f1b4e8"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
\[Kabutz 2001\] Kabutz, Heinz M. _The Java Specialists' Newsletter_. (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d11a4c60-8f41-479e-a6c6-102e27dc0bbd"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 2004\] Kalinovsky, Alex. _Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering_. Indianapolis: SAMS (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b4d85d6-64ec-4732-8569-298162952b59"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
\[Knoernschild 2001\] Knoernschild, Kirk. _Java⢠Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bbfe7cd-a0f8-423b-a3ff-a41483d73d28"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
\[Lai 2008\] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. _IEEE Software_ 25(1):13â19 (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="248f035c-dd61-486d-8842-8127076c29ed"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
\[Langer 2008\] Langer, Angelica, trainer and consultant. [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html] (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6cca669f-3dc8-41f0-8f94-4c3a8c12377a"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 2000\] Lea, Doug. _Concurrent Programming in Java: Design Principles and Patterns_, 2nd ed. Reading, MA: Addison-Wesley (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be5a9539-09a7-4e7c-84aa-4c705ffd38f9"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
\[Lea 2000b\] Lea, Doug, and William Pugh. [Correct and Efficient Synchronization of Java⢠Technologyâbased Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf]. JavaOne Conference (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3e2148b-70ba-4f83-8295-dfdf7f243b66"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
\[Lea 2008\] Lea, Doug. [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html] (2008/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7a67a8a-f354-40c9-afbd-cd1b78b9ba48"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
\[Lee 2009\] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf]. JavaOne Conference (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17ef6410-d6cc-4208-8aa6-900722f35b6f"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
\[Liang 1997\] Liang, Sheng. _The Java⢠Native Interface, Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2693645-de70-4775-b667-2e6f220f5ca7"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
\[Liang 1998\] Liang, Sheng, and Gilad Bracha. [Dynamic Class Loading in the Java⢠Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945]. In _Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications_, New York (1998). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77151701-ac36-4662-a79b-90cb13ef15ff"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
\[Lieberman 1986\] Lieberman, Henry. [Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems|http://portal.acm.org/citation.cfm?id=28718]. In _Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications_, pp. 214â223, Portland, OR (1986). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4007093a-d550-4ef3-85bf-9ae9562fdfa2"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
\[Lo 2005\] Lo, Chia-Tien Dan, Srisa-an, Witawas, and Chang, J. Morris. [Security Issues in Garbage Collection|http://www.eng.auburn.edu/users/hamilton/security/papers/STSC%20CrossTalk%20-%20Security%20Issues%20in%20Garbage%20Collection%20-%20Oct%A02005.pdf]. _STSC Crosstalk_, (2005, October). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bab10af5-42b0-4c1f-80b4-d43506bf642d"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
\[Long 2005\] Long, Fred. [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html]. CMU/SEI-2005-TN-044 (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45e7c707-6891-42dd-b175-d377762b9880"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
\[Long 2011\] Long, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland. _The CERT Oracle Secure Coding Standard for Java_, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0fe27e8-6613-421a-84cf-a0c0fb001f43"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
\[Low 1997\] Low, Douglas. Protecting Java Code via Obfuscation. _Crossroads_ 4(3):21â23 (1997). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af28f064-e96e-4e86-b56c-03945cab8591"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
\[Macgregor 1998\] MacGregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. _Java Network Security_. Upper Saddle River, NJ: Prentice Hall PTR (1998). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cbd2a9b0-007e-4068-ba5d-b80e2c24b550"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
\[Mahmoud 2002\] Mahmoud, H. Qusay. [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/]. Oracle (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d18351e-2665-4d6d-8899-6470d7de38e4"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
\[Mak 2002\] Mak, Ronald. _Java Number Cruncher: The Java Programmer's Guide to Numerical Computing_. Upper Saddle River, NJ: Prentice Hall (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43bafb37-5072-446f-9e5c-da06c48ebee2"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
\[Manson 2004\] Manson, Jeremy, and Brian Goetz. [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight] (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0ef576e-47b7-4c6b-b740-15f2a0d0dc3d"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
\[Manson 2006\] Manson, Jeremy, and William Pugh. [The Java⢠Memory Model: The Building Block of Concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf]. JavaOne Conference (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b43ff3e6-b7a9-4661-b0bc-96bdac2f303f"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
\[Martin 1996\] Martin, Robert C. [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf]. _The C++ Report_ 8(10):57â62 (1996). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="006bc6d9-8eb9-4269-ab1d-ce49dc4bd877"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
\[McCluskey 2001\] McCluskey, Glen. Java Developer Connection Tech Tips. (2001, April 10). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2dddf140-62eb-4ce1-bf15-22a8eaa84837"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 1999\] McGraw, Gary, and Edward W. Felten. _Securing Java: Getting Down to Business with Mobile Code_. New York: Wiley (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18716a40-74ed-4679-8155-4abb00d5b265"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
\[McGraw 1998\] McGraw, Gary, and Edward W. Felten. [Twelve Rules for Developing More Secure Java Code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html]. _JavaWorld.com_ (1998). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8dab4cb-8408-495f-b4fd-6038839033bf"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
\[Miller 2009\] Miller, Alex. [Java⢠Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf]. JavaOne Conference (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d71c87d-3d7a-46fa-8412-8e800f12de10"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
\[MITRE 2009\] MITRE Corporation. [Common Weakness Enumeration|http://cwe.mitre.org/] (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd18d2fd-0458-44be-81e0-f9fe7cf54460"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56257b13-8290-41c9-9e9c-3885fcfa3ee4"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
\[Monsch 2006\] Monsch, Jan P. [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p], Version 1.0 (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73a35f3e-3f43-4258-a515-6f0e91ab5239"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
\[MSDN 2009\] Microsoft. [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx] (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f40344e-9fed-4bf7-85d4-4a136bed6c79"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
\[Muchow 2001\] Muchow, John W. [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html]. _ONJava_ (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dec3d368-2eb0-4e0f-a158-b8a501296751"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro>
\[Müller 2002\] Müller, Andreas, and Geoffrey Simmons. [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf]. Sun Microsystems (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7321b6cf-070d-45d5-89dc-27907863489f"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
\[Naftalin 2006\] Naftalin, Maurice, and Philip Wadler. _Java Generics and Collections_. Sebastopol, CA: O'Reilly (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1510085-4717-4a3c-8db8-6ddad0bc0e0a"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
\[Naftalin 2006b\] Naftalin, Maurice, and Philip Wadler. [Java⢠Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf]. JavaOne Conference (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="376c75e5-103f-49ad-a6a2-d66fb273d3e5"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
\[Netzer 1992\] Netzer, Robert H. B., and Barton P. Miller. [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623]. _ACM Letters on Programming Languages and Systems_ 1(1):74â88 (1992). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37afd1a3-9c97-45c5-ab1f-1d9da69c49d2"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
\[Neward 2004\] Neward, Ted. _Effective Enterprise Java_. Boston: Addison-Wesley (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b21e1b4-a10c-4f56-9b89-8b42d8d68dee"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
\[Nisewanger 2007\] Nisewanger, Jeff. [Avoiding Antipatterns|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf]. JavaOne Conference (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70b88d9f-c0bc-43cb-a6ed-bd52800600a7"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
\[Nolan 2004\] Nolan, Godfrey. _Decompiling Java_. Berkeley, CA: Apress (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3015b70-37ca-49af-b893-ff6a6d3c2b50"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 2001\] Oaks, Scott. _Java Security_. Sebastopol, CA: O'Reilly (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6494e311-ccb8-469a-b4ae-ad6ba5b8991a"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
\[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://www.oracle.com/technetwork/java/javase/gc-tuning-6-140523.html]. Oracle (2010). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c6107bd-80e4-4126-9e6a-ee79778a42de"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
\[OWASP 2005\] OWASP (Open Web Application Security Project). [A Guide to Building Secure Web Applications and Web Services|https://www.owasp.org/index.php/OWASP_Guide_Project] (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d74f7fc1-841a-45c1-ae1c-fb1117ffef07"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
\[OWASP 2007\] OWASP (Open Web Application Security Project). [OWASP Top 10 for JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf] (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7dc84294-4578-45e2-9fd6-df535f8253fe"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
\[OWASP 2008\] [OWASP (Open Web Application Security Project).|http://www.owasp.org/index.php/Main_Page] (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df1db6bd-57ed-45da-8c91-4406df377657"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
\[Permissions 2008\] [Permissions in the Java⢠SE 6 Development Kit (JDK)|http://docs.oracle.com/javase/6/docs/technotes/guides/security/permissions.html]. Oracle (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbeaf94c-c7cb-49f7-9251-9eb299c99adf"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
\[Philion 2003\] Philion, Paul. [Beware the Dangers of Generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1]. _JavaWorld.com_ (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a2903c4-d254-4d94-bdfb-6105f6baa578"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
\[Phillips 2005\] Phillips, Addison P. [Are We Counting Bytes Yet? Writing Encoding Converters Using Java NIO|http://www.inter-locale.com/whitepaper/IUC27-a303.html]. Paper presented at the 27th Internationalization and Unicode Conference, April 6â8, Berlin (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1a2321f-3815-4356-8979-be43331d9e1b"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
\[Pistoia 2004\] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. _Enterprise Java Security: Building Secure J2EE Applications_. Boston: Addison-Wesley (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de87082e-d4eb-454e-8524-63d246d66c5c"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
\[Policy 2002\] [Default Policy Implementation and Policy File Syntax| http://docs.oracle.com/javase/1.4.2/docs/guide/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems/Oracle (2002/2010). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="335d12f3-8738-4449-be5f-cd8b50d0abd9"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
\[Pugh 2004\] Pugh, William. [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/]. Discussion based on work supported by the National Science Foundation under Grant No. 0098162 (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="105da916-118b-44e4-ba16-434d4d2b965a"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
\[Pugh 2008\] Pugh, William. [Defective Java Code: Turning WTF Code into a Learning Experience|http://www.oracle.com/technetwork/java/j1sessn-jsp-156302.html]. JavaOne Conference (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57b538c6-20d1-4c02-830c-7eaef31ffff2"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
\[Pugh 2009\] Pugh, William. [Defective Java Code: Mistakes That Matter|http://www.oracle.com/technetwork/java/j1sessn-jsp-156297.html]. JavaOne Conference (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57ee6092-f801-465a-b9f8-758c042db027"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
\[Reasoning 2003\] [Reasoning Inspection Service Defect Data: Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf] (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a2927c9-9138-4c40-9b5b-961d01924c71"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
\[Reflect 2006\] [Reflection|http://docs.oracle.com/javase/7/docs/technotes/guides/reflection/index.html]. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9997b8f8-895c-4350-9249-33c465cf4d33"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
\[Rogue 2000\] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner and Eldon Metz. _The Elements of Java Style_. New York: Cambridge University Press (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ebd63c9a-be3e-4e52-b332-5a7e8944518a"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
\[Rotem 2008\] Rotem-Gal-Oz, Arnon. [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf] (white paper) (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce195822-c9b6-4c08-88d9-f96723bae8af"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
\[Roubtsov 2003\] Roubtsov, Vladimir. [Breaking Java Exception-Handling Rules Is Easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html]. _JavaWorld.com_ (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9f3678d-a332-4927-9cc3-cd1d7b34dc63"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
\[Roubtsov 2003b\] Roubtsov, Vladimir. [Into the Mist of Serialization Myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1]. _JavaWorld.com_ (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2761194-4b0c-4176-b860-c36e086f7ec1"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
\[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM_ 17(7):388â402 (1974). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4448734a-3385-49c9-b0b5-41abe1ba17c9"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
\[Saltzer 1975\] Saltzer, J. H., and M. D. Schroeder. The Protection of Information in Computer Systems. In _Proceedings of the IEEE_ 63(9):1278â1308. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7b5049e-828b-4cf1-828c-9dc9ff1452da"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 2007\] Secure Coding Guidelines for the Java Programming Language, version 2.0. Sun Microsystems (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95ff374d-5a99-4734-b1d6-423dbad36d8d"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
\[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|https://blogs.oracle.com/mullan/entry/secure_coding_guidelines_for_the]. Oracle (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5dadaf2-1ff8-409c-8a0e-6b122ba1ed04"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
\[Schildt 2007\] Schildt, Herb. _Herb Schildt's Java Programming Cookbook_. New York: McGraw-Hill (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="280b5883-24b9-4320-83f2-9340f0a3fc5f"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
\[Schneier 2000\] Schneier, Bruce. _Secrets and LiesâDigital Security in a Networked World_. New York: Wiley (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc59fe60-ebab-46c3-bd46-11b92db17800"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
\[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com) (2004, November). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6638b087-933e-40ff-bcd0-b69d2bcd9562"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
\[Schwarz 2004\] Schwarz, Don. [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html]. _ONJava_ (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ea634ff-dad2-4053-8b7c-c7455f1292ec"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
\[Schweisguth 2003\] Schweisguth, Dave. [Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2]. _JavaWorld.com_ (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f8c446e-6096-4d57-982c-500c5c2f1980"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
\[SDN 2008\] [Sun Developer Network|http://developers.sun.com/]. Sun Microsystems (1994/2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cffa791d-c253-4aab-aec5-7508e1592667"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
\[Seacord 2005\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston: Addison-Wesley (2005). See [http://www.cert.org/books/secure-coding] for news and errata. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6841594-454c-4957-97e0-4cece8e9fbcd"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 2006\] [Java 2 Platform Security Architecture|http://docs.oracle.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html]. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e2690df-2b4a-48c0-b881-d195b79893c2"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 2006\] [Java Security Guides|http://docs.oracle.com/javase/6/docs/technotes/guides/security/]. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a59cbb0-77ea-4d43-b2e6-0a96c669245f"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
\[SecuritySpec 2008\] [Java Security Architecture|http://docs.oracle.com/javase/1.5.0/docs/guide/security/spec/security-specTOC.fm.html]. Oracle (2008/2010). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8d468c2-1c60-4a3f-8e33-1032e0347ec1"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
\[Sen 2007\] Sen, Robi. [Avoid the Dangers of XPath Injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html]. IBM developerWorks (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52523a42-3110-483b-923c-a93242dd3e54"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
\[Steel 2005\] Steel, Christopher, Ramesh Nagappan, and Ray Lai. _Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management_. Upper Saddle River, NJ: Prentice Hall PTR (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7db8806f-af44-452a-ab58-7ae44a5e1e33"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
\[Steele 1977\] Steele, Guy Lewis. [Arithmetic Shifting Considered Harmful|http://doi.acm.org/10.1145/956641.956647]. _SIGPLAN Notices_ 12(11):61â69 (1977). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42f9ad7b-9f2d-4fa0-8762-67bdb56dec9f"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
\[Steinberg 2005\] Steinberg, Daniel H. Java Developer Connection Tech Tips: Using the Varargs Language Feature. (2005, January 4). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e216ffb-dc0c-41ab-8a2c-20c76a5379f5"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
\[Sterbenz 2006\] Sterbenz, Andreas, and Charlie Lai. [Secure Coding Antipatterns: Avoiding Vulnerabilities| https://confluence.ucdavis.edu/confluence/download/attachments/16218/TS-1238.pdf?version=1&modificationDate=1180213302000]. JavaOne Conference (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e32b0597-8ad3-4ad8-944e-517886b0bb18"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
\[Steuck 2002\] Steuck, Gregory. [XXE (Xml eXternal Entity) Attack|http://www.securityfocus.com/archive/1/297714]. SecurityFocus (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f35e97fd-c7b3-4fe3-be6c-539cb9fa5c69"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
\[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://docs.oracle.com/javase/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html] Oracle (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1dc4397d-0585-4477-9475-d9d1b35ea21f"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
\[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.oracle.com/cd/E19199-01/817-2180-10/]. Oracle (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d95c193-62bb-4c08-b252-73c935b0eebc"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
\[Sun 2006\] [Java⢠Platform, Standard Edition 6 Documentation|http://docs.oracle.com/javase/6/docs/index.html]. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3bc42e42-6c7f-407a-9334-7af2de0bb7d5"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
\[Sun 2008\] [Java⢠Plug-in and Applet Architecture|http://docs.oracle.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html]. Oracle (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb1c7b80-fef5-4bbe-9c22-5ca857eb2b58"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
\[Sutherland 2010\] Sutherland, Dean F., and William L. Scherlis. [Composable Thread Coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485]. In _Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming_. New York: ACM (2010). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4c28101-c048-481d-a751-ba4cacc51391"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
\[Tanenbaum 2003\] Tanenbaum, Andrew S., and Maarten Van Steen. _Distributed Systems: Principles and Paradigms_, 2nd. ed. Upper Saddle River, NJ: Prentice Hall. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5e81c76-aaac-4cd2-b608-1a7249a8cfd1"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
\[Techtalk 2007\] Bloch, Josh, and William Pugh. The Phantom-Reference Menace, Attack of the Clone, Revenge of the Shift. JavaOne Conference (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2119f654-93cb-47ab-83d2-b07de99d366a"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
\[Tomcat 2009\] Tomcat Documentation: [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security Fixes|http://tomcat.apache.org/security-6.html]. Apache Software Foundation (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c680f631-baec-49cc-8525-6e8bfaf9dff3"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
\[Tools 2011\] [JDK Tools and Utilities Specification|http://download.oracle.com/javase/7/docs/technotes/tools/index.html]. Oracle (2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5af560c7-71ba-4df7-b875-82041bbe72f8"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
\[Tutorials 2008\] [The Java Tutorials|http://docs.oracle.com/javase/tutorial/index.html]. Oracle (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49404e5f-0c57-47f7-bedc-0d781e0ef986"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
\[Unicode 2009\] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by [_The Unicode Standard, Version 5.2_|http://www.unicode.org/versions/Unicode5.2.0/]. Mountain View, CA: The Unicode Consortium (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1231c88b-7201-4816-8406-ab52711e1ced"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
\[Venners 1997\] Venners, Bill. [Security and the Class Loader Architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1]. _Java World.com_ (1997). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68060a3d-68e2-4086-944f-54eee817e5f7"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
\[Venners 2003\] Venners, Bill. [Failure and Exceptions: A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html]. (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3be8a7ff-02c0-44a8-b277-8b282f1b3be0"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
\[W3C 2008\] Bray, Tim, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau. [Extensible Markup Language (XML) 1.0, 5th ed|http://www.w3.org/TR/2008/REC-xml-20081126/]. W3C Recommendation (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6f8c8e7-87dd-422f-af9a-da9fdc5d7a0b"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
\[Ware 2008\] Ware, Michael S. [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/] (thesis). James Madison University (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="683fa3af-a413-4111-95c1-cd4be45113c0"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
\[Weber 2009\] Weber, Chris. [Exploiting Unicode-Enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf]. CanSecWest (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbf3ea5f-c2a9-4b60-bd32-04c2178aa4b2"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
\[Wheeler 2003\] Wheeler, David A. [Secure Programming for Linux and UNIX HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html] (2003). |
Anchor | ||||
---|---|---|---|---|
|
[API 2006] Java Platform, Standard Edition 6 API Specification. Oracle (2006/2011).
Anchor | ||||
---|---|---|---|---|
|
[API 2011] Java Platform, Standard Edition 7 API Specification. Oracle (2011).
Anchor | ||||
---|---|---|---|---|
|
[Austin 2000] Austin, Calvin, and Monica Pawlan. Advanced Programming for the Java 2 Platform. Boston: Addison-Wesley Longman (2000).
Anchor | ||||
---|---|---|---|---|
|
[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).
Anchor | ||||
---|---|---|---|---|
|
[Black 2006] Black, Paul E., and Paul J. Tanenbaum. "total order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2006).
Anchor | ||||
---|---|---|---|---|
|
[Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001).
Anchor | ||||
---|---|---|---|---|
|
[Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005).
Anchor | ||||
---|---|---|---|---|
|
[Bloch 2005b] Bloch, Joshua, and Neal Gafter. Yet More Programming Puzzlers. JavaOne Conference (2005).
Anchor | ||||
---|---|---|---|---|
|
[Bloch 2007] Bloch, Joshua. Effective Java⢠Reloaded: This Time It's (Not) for Real. JavaOne Conference (2007).
Anchor | ||||
---|---|---|---|---|
|
[Bloch 2008] Bloch, Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).
Anchor | ||||
---|---|---|---|---|
|
[Bloch 2009] Bloch, Joshua, and Neal Gafter. Return of the Puzzlers: Schlock and Awe. JavaOne Conference (2009).
Anchor | ||||
---|---|---|---|---|
|
[Boehm 2005] Boehm, Hans-J. Finalization, Threads, and the Java⢠Technology-Based Memory Model. JavaOne Conference (2005).
Anchor | ||||
---|---|---|---|---|
|
[Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).
Anchor | ||||
---|---|---|---|---|
|
[CCITT 1988] CCITT (International Telegraph and Telephone Consultative Committee). CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva: International Telecommunication Union (1988).
Anchor | ||||
---|---|---|---|---|
|
[Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).
Anchor | ||||
---|---|---|---|---|
|
[Chess 2007] Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Upper Saddle River, NJ: Addison-Wesley Professional (2007).
Anchor | ||||
---|---|---|---|---|
|
[Christudas 2005] Christudas, Binildas. Internals of Java Class Loading, ONJava (2005).
Anchor | ||||
---|---|---|---|---|
|
[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48â“54 (1981).
Anchor | ||||
---|---|---|---|---|
|
[Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009).
Anchor | ||||
---|---|---|---|---|
|
[Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).
Anchor | ||||
---|---|---|---|---|
|
[Core Java 2004] Horstmann, Cay S., and Gary Cornell. _Core Java⢠2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).
Anchor | ||||
---|---|---|---|---|
|
[Cunningham 1995] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In Pattern Languages of Program Design, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995).
Anchor | ||||
---|---|---|---|---|
|
[CVE 2008] MITRE Corporation. Common Vulnerabilities and Exposures (2008/2012).
Anchor | ||||
---|---|---|---|---|
|
[Daconta 2000] Daconta, Michael C. When Runtime.exec() Won't. JavaWorld.com (2000).
Anchor | ||||
---|---|---|---|---|
|
[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls. Indianapolis: Wiley (2003).
Anchor | ||||
---|---|---|---|---|
|
[Darwin 2004] Darwin, Ian F. Java Cookbook, 2nd ed. Sebastopol, CA: OâReilly (2004).
Anchor | ||||
---|---|---|---|---|
|
[Davis 2008] Davis, Mark, and Martin Dürst. Unicode Standard Annex #15: Unicode Normalization Forms (2008).
Anchor | ||||
---|---|---|---|---|
|
[Davis 2008b] Davis, Mark, and Michel Suignard. Unicode Technical Report #36, Unicode Security Considerations (2008).
Anchor | ||||
---|---|---|---|---|
|
[Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143â“155 (1966). doi: 10.1145/365230.365252.
Anchor | ||||
---|---|---|---|---|
|
[DHS 2006] U.S. Department of Homeland Security. Build Security In (2006/2011).
Anchor | ||||
---|---|---|---|---|
|
[Dormann 2008] Dormann, Will. Signed Java Applet Security: Worse Than ActiveX? CERT Vulnerability Analysis Blog (2008).
Anchor | ||||
---|---|---|---|---|
|
[Doshi 2003] Doshi, Gunjan. Best Practices for Exception Handling. ONJava (2003).
Anchor | ||||
---|---|---|---|---|
|
[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).
Anchor | ||||
---|---|---|---|---|
|
[Eclipse 2008] Eclipse Platform, The Eclipse Foundation (2008).
Anchor | ||||
---|---|---|---|---|
|
[Encodings 2006] Supported Encodings, Oracle (2006/2011).
Anchor | ||||
---|---|---|---|---|
|
[Enterprise 2003] Eckstein, Robert. Java Enterprise Best Practices. Sebastopol, CA: O'Reilly (2003).
Anchor | ||||
---|---|---|---|---|
|
[ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005).
Anchor | ||||
---|---|---|---|---|
|
[Fairbanks 2007] Fairbanks, George. Design Fragments. PhD thesis, Carnegie Mellon University (2007).
Anchor | ||||
---|---|---|---|---|
|
[FindBugs 2008] FindBugs Bug Descriptions (2008/2011).
Anchor | ||||
---|---|---|---|---|
|
[Fisher 2003] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. JDBC API Tutorial and Reference, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003).
Anchor | ||||
---|---|---|---|---|
|
[Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005).
Anchor | ||||
---|---|---|---|---|
|
[Fortify 2008] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2011).
Anchor | ||||
---|---|---|---|---|
|
[Fox 2001] Fox, Joshua. When Is a Singleton Not a Singleton? JavaWorld (2001).
Anchor | ||||
---|---|---|---|---|
|
[FT 2008] Function Table: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008).
Anchor | ||||
---|---|---|---|---|
|
[Gafter 2006] Gafter, Neal. Neal Gafter's blog (2006).
Anchor | ||||
---|---|---|---|---|
|
[Gamma 1995] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Reading, MA: Addison-Wesley (1995).
Anchor | ||||
---|---|---|---|---|
|
[Garms 2001] Garms, Jess, and Daniel Somerfield. Professional Java Security. Birmingham, UK: Wrox Press (2001).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2002] Goetz, Brian. Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction. IBM developerWorks (2002).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2004b] Goetz, Brian. Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check? IBM developerWorks (2004).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2004c] Goetz, Brian. Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent. IBM developerWorks (2004).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2005] Goetz, Brian. Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners. IBM developerWorks (2005).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2005b] Goetz, Brian. Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships. IBM developerWorks (2005).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional (2006).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2006b] Goetz, Brian. Java Theory and Practice: Good Housekeeping Practices. IBM developerWorks (2006).
Anchor | ||||
---|---|---|---|---|
|
[Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2006).
Anchor | ||||
---|---|---|---|---|
|
[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems (1991/2000).
Anchor | ||||
---|---|---|---|---|
|
[Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003).
Anchor | ||||
---|---|---|---|---|
|
[Grand 2002] Grand, Mark. Patterns in Java, Vol. 1, 2nd ed. New York: Wiley (2002).
Anchor | ||||
---|---|---|---|---|
|
[Greanier 2000] Greanier, Todd. Discover the Secrets of the Java Serialization API. Sun Developer Network (2000).
Anchor | ||||
---|---|---|---|---|
|
[Green 2008] Green, Roedy. Canadian Mind Products Java & Internet Glossary (2008/2012).
Anchor | ||||
---|---|---|---|---|
|
[Grigg 2006] Grigg, Jeffery. Reflection on Inner Classes (2006).
Anchor | ||||
---|---|---|---|---|
|
[Grosso 2001] Grosso, William. Java RMI. Sebastopol, CA: O'Reilly (2001).
Anchor | ||||
---|---|---|---|---|
|
[Gupta 2005] Gupta, Satish Chandra, and Rajeev Palanki. Java Memory Leaksâ”Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0. IBM developerWorks (2005).
Anchor | ||||
---|---|---|---|---|
|
[Haack 2006] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. Immutable Objects in Java. Research report, Radboud University Nijmegen (2006).
Anchor | ||||
---|---|---|---|---|
|
[Haggar 2000] Haggar, Peter. _Practical Java⢠Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000).
Anchor | ||||
---|---|---|---|---|
|
[Halloway 2000] Halloway, Stuart. Java Developer Connection Tech Tips, March 28, 2000. Sun Microsystems (2000).
Anchor | ||||
---|---|---|---|---|
|
[Halloway 2001] Halloway, Stuart. Java Developer Connection Tech Tips, January 30, 2001. Sun Microsystems (2001).
Anchor | ||||
---|---|---|---|---|
|
[Harold 1997] Harold, Elliotte Rusty. Java Secrets. Foster City, CA: IDG Books Worldwide (1997).
Anchor | ||||
---|---|---|---|---|
|
[Harold 1999] Harold, Elliotte Rusty. Java I/O. Sebastopol, CA: O'Reilly (1999).
Anchor | ||||
---|---|---|---|---|
|
[Harold 2006] Harold, Elliotte Rusty. Java I/O, 2nd ed. Sebastopol, CA: O'Reilley (2006).
Anchor | ||||
---|---|---|---|---|
|
[Hawtin 2008] Hawtin, Thomas. Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities. Sun Microsystems, Make It Fly, London (2008).
Anchor | ||||
---|---|---|---|---|
|
[Henney 2003] Henney, Kevlin. Null Object, Something for Nothing (2003).
Anchor | ||||
---|---|---|---|---|
|
[Hitchens 2002] Hitchens, Ron. _Java⢠NIO_. Cambridge, MA: O'Reilly (2002).
Anchor | ||||
---|---|---|---|---|
|
[Hornig 2007] Hornig, Charles. Advanced Java⢠Globalization. JavaOne Conference (2007).
Anchor | ||||
---|---|---|---|---|
|
[Hovemeyer 2007] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE), San Diego (2007).
Anchor | ||||
---|---|---|---|---|
|
[Hunt 1998] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. IEE Proceedings: Software 145(2/3):41â“50 (1998).
Anchor | ||||
---|---|---|---|---|
|
[IEC 60812 2006] IEE (International Electrotechnical Commission). Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed. Geneva: IEC (2006).
Anchor | ||||
---|---|---|---|---|
|
[IEEE 754 2006] IEEE (Institute of Electrical and Electronics Engineers). Standard for Binary Floating-Point Arithmetic (IEEE 754-1985). New York: IEEE (2006).
Anchor | ||||
---|---|---|---|---|
|
[J2SE 2000] JavaTM 2 SDK, Standard Edition Documentation, J2SE Documentation version 1.3. Sun Microsystems/Oracle (2000/2010).
Anchor | ||||
---|---|---|---|---|
|
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification. Oracle (2008/2010).
Anchor | ||||
---|---|---|---|---|
|
[Java 2006] java: The Java Application Launcher. Oracle (2006/2011).
Anchor | ||||
---|---|---|---|---|
|
[Java2NS 1999] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Upper Saddle River, NJ: Prentice Hall (1999).
Anchor | ||||
---|---|---|---|---|
|
[JavaGenerics 2004] Java Generics. Oracle (2004).
Anchor | ||||
---|---|---|---|---|
|
[JavaThreads 1999] Oaks, Scott, and Henry Wong. Java Threads, 2nd ed. Sebastopol, CA: O'Reilly (1999).
Anchor | ||||
---|---|---|---|---|
|
[JavaThreads 2004] Oaks, Scott, and Henry Wong. Java Threads, 3rd ed. Sebastopol, CA: O'Reilly (2004).
Anchor | ||||
---|---|---|---|---|
|
[JDK7 2008] Java⢠Platform, Standard Edition 7 Documentation. Oracle (2008).
Anchor | ||||
---|---|---|---|---|
|
[JLS 2005] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. Java Language Specification, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005).
Anchor | ||||
---|---|---|---|---|
|
[JLS 2011] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2011).
Anchor | ||||
---|---|---|---|---|
|
[JMX 2006] Monitoring and Management for the Java Platform. Oracle (2006).
Anchor | ||||
---|---|---|---|---|
|
[JMXG 2006] Java SE Monitoring and Management Guide. Oracle (2006).
Anchor | ||||
---|---|---|---|---|
|
[JNI 2006] Java Native Interface. Oracle (2006).
Anchor | ||||
---|---|---|---|---|
|
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258â“263, May 21â“24, Oakland, CA (2006).
Anchor | ||||
---|---|---|---|---|
|
[JPDA 2004] Java Platform Debugger Architecture (JPDA). Oracle (2004).
Anchor | ||||
---|---|---|---|---|
|
[JPL 2006] Arnold, Ken, James Gosling, and David Holmes. _The Java⢠Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006).
Anchor | ||||
---|---|---|---|---|
|
[JSR-133 2004] JSR-133: JavaTM Memory Model and Thread Specification (2004).
Anchor | ||||
---|---|---|---|---|
|
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI). Oracle (2006).
Anchor | ||||
---|---|---|---|---|
|
[JVMSpec 1999] The Java Virtual Machine Specification. Oracle (1999).
Anchor | ||||
---|---|---|---|---|
|
[Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009).
Anchor | ||||
---|---|---|---|---|
|
[Kabutz 2001] Kabutz, Heinz M. The Java Specialists' Newsletter. (2001).
Anchor | ||||
---|---|---|---|---|
|
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004).
Anchor | ||||
---|---|---|---|---|
|
[Knoernschild 2001] Knoernschild, Kirk. _Java⢠Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001).
Anchor | ||||
---|---|---|---|---|
|
[Lai 2008] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. IEEE Software 25(1):13â“19 (2008).
Anchor | ||||
---|---|---|---|---|
|
[Langer 2008] Langer, Angelica, trainer and consultant. http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html (2008).
Anchor | ||||
---|---|---|---|---|
|
[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Reading, MA: Addison-Wesley (2000).
Anchor | ||||
---|---|---|---|---|
|
[Lea 2000b] Lea, Doug, and William Pugh. Correct and Efficient Synchronization of Java⢠Technologyâ“based Threads. JavaOne Conference (2000).
Anchor | ||||
---|---|---|---|---|
|
[Lea 2008] Lea, Doug. The JSR-133 Cookbook for Compiler Writers (2008/2011).
Anchor | ||||
---|---|---|---|---|
|
[Lee 2009] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. Robust and Scalable Concurrent Programming: Lessons from the Trenches. JavaOne Conference (2009).
Anchor | ||||
---|---|---|---|---|
|
[Liang 1997] Liang, Sheng. _The Java⢠Native Interface, Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997).
Anchor | ||||
---|---|---|---|---|
|
[Liang 1998] Liang, Sheng, and Gilad Bracha. Dynamic Class Loading in the Java⢠Virtual Machine. In Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, New York (1998).
Anchor | ||||
---|---|---|---|---|
|
[Lieberman 1986] Lieberman, Henry. Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 214â“223, Portland, OR (1986).
Anchor | ||||
---|---|---|---|---|
|
[Lo 2005] Lo, Chia-Tien Dan, Srisa-an, Witawas, and Chang, J. Morris. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October).
Anchor | ||||
---|---|---|---|---|
|
[Long 2005] Long, Fred. Software Vulnerabilities in Java. CMU/SEI-2005-TN-044 (2005).
Anchor | ||||
---|---|---|---|---|
|
[Long 2011] Long, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011)
Anchor | ||||
---|---|---|---|---|
|
[Low 1997] Low, Douglas. Protecting Java Code via Obfuscation. Crossroads 4(3):21â“23 (1997).
Anchor | ||||
---|---|---|---|---|
|
[Macgregor 1998] MacGregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. Java Network Security. Upper Saddle River, NJ: Prentice Hall PTR (1998).
Anchor | ||||
---|---|---|---|---|
|
[Mahmoud 2002] Mahmoud, H. Qusay. Compressing and Decompressing Data Using Java APIs. Oracle (2002).
Anchor | ||||
---|---|---|---|---|
|
[Mak 2002] Mak, Ronald. Java Number Cruncher: The Java Programmer's Guide to Numerical Computing. Upper Saddle River, NJ: Prentice Hall (2002).
Anchor | ||||
---|---|---|---|---|
|
[Manson 2004] Manson, Jeremy, and Brian Goetz. JSR 133 (Java Memory Model) FAQ (2004).
Anchor | ||||
---|---|---|---|---|
|
[Manson 2006] Manson, Jeremy, and William Pugh. The Java⢠Memory Model: The Building Block of Concurrency. JavaOne Conference (2006).
Anchor | ||||
---|---|---|---|---|
|
[Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57â“62 (1996).
Anchor | ||||
---|---|---|---|---|
|
[McCluskey 2001] McCluskey, Glen. Java Developer Connection Tech Tips. (2001, April 10).
Anchor | ||||
---|---|---|---|---|
|
[McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code. New York: Wiley (1999).
Anchor | ||||
---|---|---|---|---|
|
[McGraw 1998] McGraw, Gary, and Edward W. Felten. Twelve Rules for Developing More Secure Java Code. JavaWorld.com (1998).
Anchor | ||||
---|---|---|---|---|
|
[Miller 2009] Miller, Alex. Java⢠Platform Concurrency Gotchas. JavaOne Conference (2009).
Anchor | ||||
---|---|---|---|---|
|
[MITRE 2009] MITRE Corporation. Common Weakness Enumeration (2009).
Anchor | ||||
---|---|---|---|---|
|
[Mocha 2007] Mocha, the Java Decompiler (2007).
Anchor | ||||
---|---|---|---|---|
|
[Monsch 2006] Monsch, Jan P. Ruining Security with java.util.Random, Version 1.0 (2006).
Anchor | ||||
---|---|---|---|---|
|
[MSDN 2009] Microsoft. Using SQL Escape Sequences (2009).
Anchor | ||||
---|---|---|---|---|
|
[Muchow 2001] Muchow, John W. MIDlet Packaging with J2ME. ONJava (2001).
Anchor | ||||
---|---|---|---|---|
|
[Müller 2002] Müller, Andreas, and Geoffrey Simmons. Exception Handling: Common Problems and Best Practice with Java 1.4. Sun Microsystems (2002).
Anchor | ||||
---|---|---|---|---|
|
[Naftalin 2006] Naftalin, Maurice, and Philip Wadler. Java Generics and Collections. Sebastopol, CA: O'Reilly (2006).
Anchor | ||||
---|---|---|---|---|
|
[Naftalin 2006b] Naftalin, Maurice, and Philip Wadler. Java⢠Generics and Collections: Tools for Productivity. JavaOne Conference (2007).
Anchor | ||||
---|---|---|---|---|
|
[Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74â“88 (1992).
Anchor | ||||
---|---|---|---|---|
|
[Neward 2004] Neward, Ted. Effective Enterprise Java. Boston: Addison-Wesley (2004).
Anchor | ||||
---|---|---|---|---|
|
[Nisewanger 2007] Nisewanger, Jeff. Avoiding Antipatterns. JavaOne Conference (2007).
Anchor | ||||
---|---|---|---|---|
|
[Nolan 2004] Nolan, Godfrey. Decompiling Java. Berkeley, CA: Apress (2004).
Anchor | ||||
---|---|---|---|---|
|
[Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001).
Anchor | ||||
---|---|---|---|---|
|
[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning. Oracle (2010).
Anchor | ||||
---|---|---|---|---|
|
[OWASP 2005] OWASP (Open Web Application Security Project). A Guide to Building Secure Web Applications and Web Services (2005).
Anchor | ||||
---|---|---|---|---|
|
[OWASP 2007] OWASP (Open Web Application Security Project). OWASP Top 10 for JAVA EE (2007).
Anchor | ||||
---|---|---|---|---|
|
[OWASP 2008] OWASP (Open Web Application Security Project). (2008).
Anchor | ||||
---|---|---|---|---|
|
[Permissions 2008] Permissions in the Java⢠SE 6 Development Kit (JDK). Oracle (2008).
Anchor | ||||
---|---|---|---|---|
|
[Philion 2003] Philion, Paul. Beware the Dangers of Generic Exceptions. JavaWorld.com (2003).
Anchor | ||||
---|---|---|---|---|
|
[Phillips 2005] Phillips, Addison P. Are We Counting Bytes Yet? Writing Encoding Converters Using Java NIO. Paper presented at the 27th Internationalization and Unicode Conference, April 6â“8, Berlin (2005).
Anchor | ||||
---|---|---|---|---|
|
[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004).
Anchor | ||||
---|---|---|---|---|
|
[Policy 2002] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems/Oracle (2002/2010).
Anchor | ||||
---|---|---|---|---|
|
[Pugh 2004] Pugh, William. The Java Memory Model (discussions reference). Discussion based on work supported by the National Science Foundation under Grant No. 0098162 (2004).
Anchor | ||||
---|---|---|---|---|
|
[Pugh 2008] Pugh, William. Defective Java Code: Turning WTF Code into a Learning Experience. JavaOne Conference (2008).
Anchor | ||||
---|---|---|---|---|
|
[Pugh 2009] Pugh, William. Defective Java Code: Mistakes That Matter. JavaOne Conference (2009).
Anchor | ||||
---|---|---|---|---|
|
[Reasoning 2003] Reasoning Inspection Service Defect Data: Tomcat v 1.4.24 (2003).
Anchor | ||||
---|---|---|---|---|
|
[Reflect 2006] Reflection. Oracle (2006).
Anchor | ||||
---|---|---|---|---|
|
[Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).
Anchor | ||||
---|---|---|---|---|
|
[Rotem 2008] Rotem-Gal-Oz, Arnon. Fallacies of Distributed Computing Explained (white paper) (2008).
Anchor | ||||
---|---|---|---|---|
|
[Roubtsov 2003] Roubtsov, Vladimir. Breaking Java Exception-Handling Rules Is Easy. JavaWorld.com (2003).
Anchor | ||||
---|---|---|---|---|
|
[Roubtsov 2003b] Roubtsov, Vladimir. Into the Mist of Serialization Myths. JavaWorld.com (2003).
Anchor | ||||
---|---|---|---|---|
|
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17(7):388â“402 (1974).
Anchor | ||||
---|---|---|---|---|
|
[Saltzer 1975] Saltzer, J. H., and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE 63(9):1278â“1308.
Anchor | ||||
---|---|---|---|---|
|
[SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0. Sun Microsystems (2007).
Anchor | ||||
---|---|---|---|---|
|
[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0. Oracle (2009).
Anchor | ||||
---|---|---|---|---|
|
[Schildt 2007] Schildt, Herb. Herb Schildt's Java Programming Cookbook. New York: McGraw-Hill (2007).
Anchor | ||||
---|---|---|---|---|
|
[Schneier 2000] Schneier, Bruce. _Secrets and Liesâ”Digital Security in a Networked World_. New York: Wiley (2000).
Anchor | ||||
---|---|---|---|---|
|
[Schoenefeld 2004] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com) (2004, November).
Anchor | ||||
---|---|---|---|---|
|
[Schwarz 2004] Schwarz, Don. Avoiding Checked Exceptions. ONJava (2004).
Anchor | ||||
---|---|---|---|---|
|
[Schweisguth 2003] Schweisguth, Dave. Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide. JavaWorld.com (2003).
Anchor | ||||
---|---|---|---|---|
|
[SDN 2008] Sun Developer Network. Sun Microsystems (1994/2008).
Anchor | ||||
---|---|---|---|---|
|
[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston: Addison-Wesley (2005). See http://www.cert.org/books/secure-coding for news and errata.
Anchor | ||||
---|---|---|---|---|
|
[SecArch 2006] Java 2 Platform Security Architecture. Oracle (2006).
Anchor | ||||
---|---|---|---|---|
|
[Security 2006] Java Security Guides. Oracle (2006).
Anchor | ||||
---|---|---|---|---|
|
[SecuritySpec 2008] Java Security Architecture. Oracle (2008/2010).
Anchor | ||||
---|---|---|---|---|
|
[Sen 2007] Sen, Robi. Avoid the Dangers of XPath Injection. IBM developerWorks (2007).
Anchor | ||||
---|---|---|---|---|
|
[Steel 2005] Steel, Christopher, Ramesh Nagappan, and Ray Lai. _Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management_. Upper Saddle River, NJ: Prentice Hall PTR (2005).
Anchor | ||||
---|---|---|---|---|
|
[Steele 1977] Steele, Guy Lewis. Arithmetic Shifting Considered Harmful. SIGPLAN Notices 12(11):61â“69 (1977).
Anchor | ||||
---|---|---|---|---|
|
[Steinberg 2005] Steinberg, Daniel H. Java Developer Connection Tech Tips: Using the Varargs Language Feature. (2005, January 4).
Anchor | ||||
---|---|---|---|---|
|
[Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006).
Anchor | ||||
---|---|---|---|---|
|
[Steuck 2002] Steuck, Gregory. XXE (Xml eXternal Entity) Attack. SecurityFocus (2002).
Anchor | ||||
---|---|---|---|---|
|
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated? Oracle (1999).
Anchor | ||||
---|---|---|---|---|
|
[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide. Oracle (2003).
Anchor | ||||
---|---|---|---|---|
|
[Sun 2006] Java⢠Platform, Standard Edition 6 Documentation. Oracle (2006).
Anchor | ||||
---|---|---|---|---|
|
[Sun 2008] Java⢠Plug-in and Applet Architecture. Oracle (2008).
Anchor | ||||
---|---|---|---|---|
|
[Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. Composable Thread Coloring. In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. New York: ACM (2010).
Anchor | ||||
---|---|---|---|---|
|
[Tanenbaum 2003] Tanenbaum, Andrew S., and Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2nd. ed. Upper Saddle River, NJ: Prentice Hall.
Anchor | ||||
---|---|---|---|---|
|
[Techtalk 2007] Bloch, Josh, and William Pugh. The Phantom-Reference Menace, Attack of the Clone, Revenge of the Shift. JavaOne Conference (2007).
Anchor | ||||
---|---|---|---|---|
|
[Tomcat 2009] Tomcat Documentation: Changelog and Security Fixes. Apache Software Foundation (2009).
Anchor | ||||
---|---|---|---|---|
|
[Tools 2011] JDK Tools and Utilities Specification. Oracle (2011).
Anchor | ||||
---|---|---|---|---|
|
[Tutorials 2008] The Java Tutorials. Oracle (2008).
Anchor | ||||
---|---|---|---|---|
|
[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by The Unicode Standard, Version 5.2. Mountain View, CA: The Unicode Consortium (2009).
Anchor | ||||
---|---|---|---|---|
|
[Venners 1997] Venners, Bill. Security and the Class Loader Architecture. Java World.com (1997).
Anchor | ||||
---|---|---|---|---|
|
[Venners 2003] Venners, Bill. Failure and Exceptions: A Conversation with James Gosling, Part II. (2003).
Anchor | ||||
---|---|---|---|---|
|
[W3C 2008] Bray, Tim, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau. Extensible Markup Language (XML) 1.0, 5th ed. W3C Recommendation (2008).
Anchor | ||||
---|---|---|---|---|
|
[Ware 2008] Ware, Michael S. Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools (thesis). James Madison University (2008).
Anchor | ||||
---|---|---|---|---|
|
[Weber 2009] Weber, Chris. Exploiting Unicode-Enabled Software. CanSecWest (2009).
Anchor | ||||
---|---|---|---|---|
|
[Wheeler 2003] Wheeler, David A. Secure Programming for Linux and UNIX HOWTO (2003).
Anchor | ||||
---|---|---|---|---|
|
[Zukowski 2004] Zukowski, John. Java Developer Connection Tech Tips: Creating Custom Security Permissions