Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

Anchor
Abadi 96
Abadi 96

[Abadi 1996] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering Wiki Markup<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0cd5abd-6637-4af6-8375-76931e9ddb77"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 1996\] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. _IEEE Transactions on Software Engineering_ 22(1):6–15 6–15 (1996).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8e88fc0-9553-4ae7-9646-ea949eae3a3e"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://docs.oracle.com/javase/6/docs/api/]. Oracle (2006/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09da7149-851b-4ae3-be7f-179830c034ed"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
\[API 2011\] [Java Platform, Standard Edition 7 API Specification|http://download.oracle.com/javase/7/docs/api/index.html]. Oracle (2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f127aa08-c9fb-46ac-af2d-1da270963e00"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
\[Austin 2000\] Austin, Calvin, and Monica Pawlan. [_Advanced Programming for the Java 2 Platform_|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents]. Boston: Addison-Wesley Longman (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bb60b1c-4ede-48e2-ae4e-e719918547f7"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
\[Black 2004\] Black, Paul E., and Paul J. Tanenbaum. "partial order." In [_Dictionary of Algorithms and Data Structures_|http://xlinux.nist.gov/dads/HTML/partialorder.html] \[online\]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3208d959-578e-481f-95ad-0774c0ecb4d0"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
\[Black 2006\] Black, Paul E., and Paul J. Tanenbaum. "total order." In [_Dictionary of Algorithms and Data Structures_|http://xlinux.nist.gov/dads/HTML/totalorder.html] \[online\]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0f68cc8-1a3d-4aa2-8fc0-74d969c938e2"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
\[Bloch 2001\] Bloch, Joshua. _Effective Java: Programming Language Guide_. Boston: Addison-Wesley (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99f52b01-1591-4375-9a29-a959165b23f4"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 2005\] Bloch, Joshua, and Neal Gafter. _Java Puzzlers: Traps, Pitfalls, and Corner Cases_. Upper Saddle River, NJ: Addison-Wesley (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="365305eb-eee5-4d25-8912-d92ca263b023"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
\[Bloch 2005b\] Bloch, Joshua, and Neal Gafter. [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/]. JavaOne Conference (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef8d249b-d003-4cb5-a00e-e9030fcc5a23"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
\[Bloch 2007\] Bloch, Joshua. [Effective Java™ Reloaded: This Time It's (Not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf]. JavaOne Conference (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94774cfb-6160-487c-9db8-b3b36a53aee8"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 2008\] Bloch, Joshua. _Effective Java_, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9e22dec-87e0-4c45-acf8-4d8f6e0cb068"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
\[Bloch 2009\] Bloch, Joshua, and Neal Gafter. [Return of the Puzzlers: Schlock and Awe|http://www.oracle.com/technetwork/server-storage/ts-5186-159197.pdf]. JavaOne Conference (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a76f2564-01de-44d0-b7a2-28a48ebaa70c"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
\[Boehm 2005\] Boehm, Hans-J. Finalization, Threads, and the Java™ Technology-Based Memory Model. JavaOne Conference (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d67e5bb7-fef7-4c16-b724-fb2b5325ae7d"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 1996\] Campione, Mary, and Kathy Walrath. _The Java Tutorial: Object-Oriented Programming for the Internet_. Reading, MA: Addison-Wesley (1996).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12db7812-7d24-4499-8801-a360a7a1653b"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
\[CCITT 1988\] CCITT (International Telegraph and Telephone Consultative Committee). _CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework_. Geneva: International Telecommunication Union (1988).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48baa291-b147-425a-961a-8c5998efc8cf"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 1999\] Chan, Patrick, Rosanna Lee, and Douglas Kramer. _The Java Class Libraries: Supplement for the Java 2 Platform, v1.2_, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74f4e3e7-795a-4b0e-919c-057b95b35d24"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
\[Chess 2007\] Chess, Brian, and Jacob West. _Secure Programming with Static Analysis_. Upper Saddle River, NJ: Addison-Wesley Professional (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c817b3e-b568-415c-b5b5-d65dd496c444"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
\[Christudas 2005\] Christudas, Binildas. [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], _ONJava_ (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d37f25b4-4347-4a67-975d-8dd73f9a6fe2"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
\[Cohen 1981\] Cohen, D. [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], _IEEE Computer_, 14(10):48–54 (1981).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da5639d1-4380-4797-a6bf-f5171353005a"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
\[Conventions 2009\] [Code Conventions for the Java Programming Language|http://www.oracle.com/technetwork/java/codeconv-138413.html]. Oracle (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0824f2aa-942f-4433-bee5-b33bb0473ca3"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
\[Coomes 2007\] Coomes, John, Peter Kessler, and Tony Printezis. [Garbage Collection-Friendly Programming|http://docs.huihoo.com/javaone/2007/java-se/TS-2906.pdf]. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e5ae1a4-57b5-4537-a49f-df268aeaf6ca"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
\[Core Java 2004\] Horstmann, Cay S., and Gary Cornell. _Core Java™ 2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3d04df2-14f8-435d-808c-26da11bd2a70"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
\[Cunningham 1995\] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In _Pattern Languages of Program Design_, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9029f8fb-19b7-4a97-b26c-c0ab1eb7c40c"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
\[CVE 2008\] MITRE Corporation. [Common Vulnerabilities and Exposures|http://cve.mitre.org/index.html] (2008/2012).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33ec2650-a8e4-4daf-ab8c-4fab1262d5ce"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
\[Daconta 2000\] Daconta, Michael C. [When Runtime.exec() Won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html]. _JavaWorld.com_ (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb39e734-5f1a-4b68-9a68-8a44f94f4355"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
\[Daconta 2003\] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. _More Java Pitfalls_. Indianapolis: Wiley (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5ffc960-d39a-4f85-9b65-553cbe394cad"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
\[Darwin 2004\] Darwin, Ian F. _Java Cookbook_, 2nd ed. Sebastopol, CA: O’Reilly (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="905fe89c-0c12-4eef-9078-3d45393ddb55"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
\[Davis 2008\] Davis, Mark, and Martin Dürst. [Unicode Standard Annex #15: Unicode Normalization Forms|http://unicode.org/reports/tr15/] (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="112c3e91-f66e-4721-9dda-8156760ccb6e"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
\[Davis 2008b\] Davis, Mark, and Michel Suignard. [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/] (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2e18cc5-b59a-4c75-b7ca-9d0c2ac9795b"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
\[Dennis 1966\] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. _Communications of the ACM_, 9(3):143–155 (1966). doi: 10.1145/365230.365252.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="546325e1-f3cb-4603-b015-bc4527913ab5"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
\[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/] (2006/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="627fa546-b955-43c7-96ba-ceca609269e7"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
\[Dormann 2008\] Dormann, Will. [Signed Java Applet Security: Worse Than ActiveX?|http://www.cert.org/blo gs/vuls/2008/06/signed_java_security_worse_tha.html] CERT Vulnerability Analysis Blog (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b1d52e4-ee7d-435c-b927-5f411749d592"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
\[Doshi 2003\] Doshi, Gunjan. [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html]. _ONJava_ (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="321e736c-1a99-42fc-a184-8a8b2be9c9c1"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
\[Dougherty 2009\] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. [Secure Design Patterns|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]. CMU/SEI-2009-TR-010 (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1340fbd9-b088-4b39-9b44-285ddee4ca5f"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
\[Eclipse 2008\] [Eclipse Platform|http://www.eclipse.org/platform/], The Eclipse Foundation (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9c451d8-456c-4e94-bf9e-6c05f15efba7"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
\[Encodings 2006\] [Supported Encodings|http://docs.oracle.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Oracle (2006/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8d5727a-9b0e-44d7-b18b-2f2b4709099b"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 2003\] Eckstein, Robert. _Java Enterprise Best Practices_. Sebastopol, CA: O'Reilly (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93ba94fb-9522-460d-9114-b5c8eeb81b61"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
\[ESA 2005\] ESA (European Space Agency). [Java Coding Standards|http://software.ucv.ro/~eganea/SoftE/JavaCodingStandards.pdf]. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005). 

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e51227d5-f688-4734-ad31-37bb62ffd348"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
\[Fairbanks 2007\] Fairbanks, George. [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html]. PhD thesis, Carnegie Mellon University (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e326b9bd-e79f-4ce0-a3e4-8baaeb1dab51"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
\[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61655679-ffdd-4a00-aad4-d5126bb7bc98"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
\[Fisher 2003\] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. _JDBC API Tutorial and Reference_, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d7ca03f-ec33-4e8c-8de5-84ded160d946"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
\[Flanagan 2005\] Flanagan, David. _Java in a Nutshell_, 5th ed. Sebastopol, CA: O'Reilly Media (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="415fbb88-34b4-4f4c-8ae5-8c7e0023158f"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
\[Fortify 2008\] Fortify Software Security Research Group with Gary McGraw. [A Taxonomy of Coding Errors That Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] (see Java/JSP) (2008/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f04745b-feb9-4a57-88b5-18d1a249ac3f"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
\[Fox 2001\] Fox, Joshua. [When Is a Singleton Not a Singleton?|http://www.javaworld.com/javaworld/jw-01-2001/jw-0112-singleton.html] _JavaWorld_ (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a9eb2a6-24fb-4188-b509-87d9bbab0a48"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
\[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm]: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2de7faa3-7b09-44fe-93c1-d9f858f76fd9"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
\[Gafter 2006\] Gafter, Neal. [Neal Gafter's blog|http://gafter.blogspot.com/] (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ddb64248-fc6a-4adf-b719-dd9b7a807b73"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
\[Gamma 1995\] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. _Design Patterns: Elements of Reusable Object-Oriented Software_. Reading, MA: Addison-Wesley (1995).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="534dd2b6-bfe7-4b54-92c6-a06544b6a3ce"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 2001\] Garms, Jess, and Daniel Somerfield. _Professional Java Security_. Birmingham, UK: Wrox Press (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de411323-c248-4d13-b7b0-efd0304e6b9e"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
\[Goetz 2002\] Goetz, Brian. [Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html]. IBM developerWorks (2002). 

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3bc9c11-07f0-410e-b11e-705941ed947c"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
\[Goetz 2004\] Goetz, Brian. [Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes|http://www.ibm.com/developerworks/java/library/j-jtp01274.html]. IBM developerWorks (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c1c546e-6269-4e71-876f-9a92b1bd8b27"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
\[Goetz 2004b\] Goetz, Brian. [Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check?|http://www.ibm.com/developerworks/library/j-jtp05254.html] IBM developerWorks (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72d957e6-bc3e-4287-930b-b4e6d7cbad8b"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
\[Goetz 2004c\] Goetz, Brian. [Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent|http://www.ibm.com/developerworks/java/library/j-jtp11234/]. IBM developerWorks (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6ca8a24-4cd0-4cba-afc0-78e477f27e0e"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
\[Goetz 2005\] Goetz, Brian. [Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html]. IBM developerWorks (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c01185c0-d25e-4c39-8439-dadea37fcf05"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
\[Goetz 2005b\] Goetz, Brian. [Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships|http://www.ibm.com/developerworks/java/library/j-jtp11225/]. IBM developerWorks (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a1ea2ae-07d1-4573-8273-c1862ccbb44f"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
\[Goetz 2006\] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. _Java Concurrency in Practice_. Upper Saddle River, NJ: Addison-Wesley Professional (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79423996-0dd7-46c9-a5d6-e0e8e1582e86"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
\[Goetz 2006b\] Goetz, Brian. [Java Theory and Practice: Good Housekeeping Practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html]. IBM developerWorks (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9399faa4-ca26-4f5b-95bc-6137652e1305"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
\[Goetz 2007\] Goetz, Brian. [Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html]. IBM developerWorks (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a135613c-1732-413b-b6f4-0e3c440027d5"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic| http://docs.oracle.com/cd/E19957-01/806-3568/ncg_goldberg.html]. Sun Microsystems (1991/2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65fe4b8f-64c8-4868-8e4b-82f021efa59d"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 2003\] Gong, Li, Gary Ellison, and Mary Dageforde. _Inside Java 2 Platform Security: Architecture, API Design, and Implementation_, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b712c94f-064e-4f25-bf0b-70db88b9e5df"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
\[Grand 2002\] Grand, Mark. _Patterns in Java, Vol. 1_, 2nd ed. New York: Wiley (2002).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6806c6f2-153e-4183-8525-b153a64a17a2"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
\[Greanier 2000\] Greanier, Todd. [Discover the Secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/]. Sun Developer Network (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce7b3258-0313-4ceb-a851-dc658bfc2954"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
\[Green 2008\] Green, Roedy. [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] (2008/2012).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b22c055a-1229-474c-8507-24f15852d90c"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
\[Grigg 2006\] Grigg, Jeffery. [Reflection on Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b663b005-9eec-48ac-8732-2cc4d970bde7"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
\[Grosso 2001\] Grosso, William. [_Java RMI_|http://oreilly.com/catalog/javarmi/chapter/ch10.html]. Sebastopol, CA: O'Reilly (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b4c12c3-086f-45f3-a901-52300e7c8eac"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
\[Gupta 2005\] Gupta, Satish Chandra, and Rajeev Palanki. [Java Memory Leaks—Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/]. IBM developerWorks (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9a838af-026a-43ab-8e77-cad50d6b2940"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
\[Haack 2006\] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. [Immutable Objects in Java|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable]. Research report, Radboud University Nijmegen (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e85ef80e-4c6c-47a8-977e-528b3ff1a026"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
\[Haggar 2000\] Haggar, Peter. _Practical Java™ Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5783d554-a360-40bd-b4f7-54f0506a6668"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
\[Halloway 2000\] Halloway, Stuart. [Java Developer Connection Tech Tips|http://javaservice.net/~java/bbs/read.cgi?m=devtip&b=jdc&c=r_p_p&n=954297433], March 28, 2000. Sun Microsystems (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a7fadec-97cd-4f0a-9e22-7650f7dec82c"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
\[Halloway 2001\] Halloway, Stuart. [Java Developer Connection Tech Tips|http://www.javaservice.net/~java/bbs/read.cgi?m=devtip&b=jdc&c=r_p&n=981107352&p=1&s=t], January 30, 2001. Sun Microsystems (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba0d9568-3b42-451f-9dfb-99830080cc24"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
\[Harold 1997\] Harold, Elliotte Rusty. _Java Secrets_. Foster City, CA: IDG Books Worldwide (1997).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2e9b2f3-1e18-4f21-863b-39410e66f913"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
\[Harold 1999\] Harold, Elliotte Rusty. _Java I/O_. Sebastopol, CA: O'Reilly (1999).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6666d78d-1a68-4101-81bc-9b928cacf103"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
\[Harold 2006\] Harold, Elliotte Rusty. _Java I/O_, 2nd ed. Sebastopol, CA: O'Reilley (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b45cba11-289a-4904-a7c1-c4c1a42f75d0"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
\[Hawtin 2008\] Hawtin, Thomas. [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf]. Sun Microsystems, Make It Fly, London (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32a2f4ba-e9bb-4f84-85e5-c7c7b41cbb59"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
\[Henney 2003\] Henney, Kevlin. [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf] (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8400b0b1-3362-4874-9bca-73c205fce877"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
\[Hitchens 2002\] Hitchens, Ron. _Java™ NIO_. Cambridge, MA: O'Reilly (2002).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e653d91f-9865-4197-936c-b9eecc90b6d7"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
\[Hornig 2007\] Hornig, Charles. [Advanced Java™ Globalization|http://61.153.44.88/javaone/2007/java-se/TS-2873.pdf]. JavaOne Conference (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff9a3ab6-7f5b-401b-88a7-ce4c9f47b1fd"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
\[Hovemeyer 2007\] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In _Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE)_, San Diego (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e803fd6a-077b-4d46-a09d-49e0be6a03d0"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
\[Hunt 1998\] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. _IEE Proceedings: Software_ 145(2/3):41–50 (1998).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc1e2e49-5d8f-4b49-a318-76fa672b5fe8"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
\[IEC 60812 2006\] IEE (International Electrotechnical Commission). _Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA)_, 2nd ed. Geneva: IEC (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="778de44c-461d-4964-bb49-9b3117594d5f"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
\[IEEE 754 2006\] IEEE (Institute of Electrical and Electronics Engineers). [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985). New York: IEEE (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71198871-1c00-4952-97fb-08cc86ae97d9"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 2000\] JavaTM 2 SDK, Standard Edition Documentation, [J2SE Documentation version 1.3|http://docs.oracle.com/javase/1.3/docs/guide/]. Sun Microsystems/Oracle (2000/2010).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f4f5147-9ca7-429d-a78c-1c9b71d2f336"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
\[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://docs.oracle.com/javase/1.5.0/docs/guide/jar/jar.html]. Oracle (2008/2010).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="833d9925-cb2d-4d96-a0ad-6d893c9903e5"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
\[Java 2006\] [java: The Java Application Launcher|http://docs.oracle.com/javase/6/docs/technotes/tools/windows/java.html]. Oracle (2006/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c64880ce-5716-4c25-8dbe-c79a855b695f"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
\[Java2NS 1999\] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. _Java 2 Network Security_. Upper Saddle River, NJ: Prentice Hall (1999).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd7b56a7-a6ad-4635-bfc7-2be169d4afb4"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
\[JavaGenerics 2004\] [Java Generics|http://docs.oracle.com/javase/1.5.0/docs/guide/language/generics.html]. Oracle (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6eca98e7-4104-4004-8ef0-4c9e7e815dbc"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
\[JavaThreads 1999\] Oaks, Scott, and Henry Wong. _Java Threads_, 2nd ed. Sebastopol, CA: O'Reilly (1999).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24bacde8-93a1-4aa8-b0d6-fcbbc240ddfa"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
\[JavaThreads 2004\] Oaks, Scott, and Henry Wong. _Java Threads_, 3rd ed. Sebastopol, CA: O'Reilly (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b239046-2116-4aa0-bc50-11f4c5654b4a"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
\[JDK7 2008\] [Java™ Platform, Standard Edition 7 Documentation|http://docs.oracle.com/javase/7/docs/]. Oracle (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a3c20f4-d894-47e7-9910-bc14eeec06a8"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 2005\] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. _Java Language Specification_, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32d77717-aec8-42ae-921c-aeaab6eec6fb"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
\[JLS 2011\] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. [_Java Language Specification: Java SE 7 Edition_|http://docs.oracle.com/javase/specs/jls/se7/html/index.html]. Oracle America (2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb6db9dd-c3c2-4728-aeb6-9f826bec4518"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
\[JMX 2006\] [Monitoring and Management for the Java Platform|http://docs.oracle.com/javase/6/docs/technotes/guides/management/index.html]. Oracle (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d546073-801c-4009-8fb9-d5816ad9307f"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
\[JMXG 2006\] [Java SE Monitoring and Management Guide|http://docs.oracle.com/javase/6/docs/technotes/guides/management/toc.html]. Oracle (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="091abd50-91c1-46ea-86a1-49a4b317883c"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
\[JNI 2006\] [Java Native Interface|http://docs.oracle.com/javase/6/docs/technotes/guides/jni/index.html]. Oracle (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58fd23dd-644b-4ae0-9cfe-c876ce6ce497"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
\[Jovanovic 2006\] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29]. In _Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)_, pp. 258–263, May 21–24, Oakland, CA (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56f2fd32-9f4e-423c-86f1-86bf82442b45"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
\[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://docs.oracle.com/javase/6/docs/technotes/guides/jpda/index.html]. Oracle (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e81c472-26cd-45fd-8f43-7476cc81d8f6"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
\[JPL 2006\] Arnold, Ken, James Gosling, and David Holmes. _The Java™ Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04033583-d1db-4fac-bbf2-e0d74631a0a6"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
\[JSR-133 2004\] [JSR-133: JavaTM Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf] (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a74bef9-0e66-4078-8be7-0addbe5720f5"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
\[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://docs.oracle.com/javase/6/docs/technotes/guides/jvmti/index.html]. Oracle (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a879a34a-101c-4184-abc9-debd17f0cadd"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
\[JVMSpec 1999\] [The Java Virtual Machine Specification|http://docs.oracle.com/javase/specs/]. Oracle (1999).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae0552ee-1d0c-48de-9db4-96929d98d348"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
\[Kabanov 2009\] Kabanov, Jevgeni. [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d432fc72-afbb-4e7d-be19-d0d409f1b4e8"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
\[Kabutz 2001\] Kabutz, Heinz M. _The Java Specialists' Newsletter_. (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d11a4c60-8f41-479e-a6c6-102e27dc0bbd"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 2004\] Kalinovsky, Alex. _Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering_. Indianapolis: SAMS (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b4d85d6-64ec-4732-8569-298162952b59"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
\[Knoernschild 2001\] Knoernschild, Kirk. _Java™ Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bbfe7cd-a0f8-423b-a3ff-a41483d73d28"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
\[Lai 2008\] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. _IEEE Software_ 25(1):13–19 (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="248f035c-dd61-486d-8842-8127076c29ed"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
\[Langer 2008\] Langer, Angelica, trainer and consultant. [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html] (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6cca669f-3dc8-41f0-8f94-4c3a8c12377a"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 2000\] Lea, Doug. _Concurrent Programming in Java: Design Principles and Patterns_, 2nd ed. Reading, MA: Addison-Wesley (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be5a9539-09a7-4e7c-84aa-4c705ffd38f9"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
\[Lea 2000b\] Lea, Doug, and William Pugh. [Correct and Efficient Synchronization of Java™ Technology–based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf]. JavaOne Conference (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3e2148b-70ba-4f83-8295-dfdf7f243b66"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
\[Lea 2008\] Lea, Doug. [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html] (2008/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7a67a8a-f354-40c9-afbd-cd1b78b9ba48"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
\[Lee 2009\] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf]. JavaOne Conference (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17ef6410-d6cc-4208-8aa6-900722f35b6f"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
\[Liang 1997\] Liang, Sheng. _The Java™ Native Interface, Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2693645-de70-4775-b667-2e6f220f5ca7"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
\[Liang 1998\] Liang, Sheng, and Gilad Bracha. [Dynamic Class Loading in the Java™ Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945]. In _Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications_, New York (1998).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77151701-ac36-4662-a79b-90cb13ef15ff"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
\[Lieberman 1986\] Lieberman, Henry. [Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems|http://portal.acm.org/citation.cfm?id=28718]. In _Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications_, pp. 214–223, Portland, OR (1986).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4007093a-d550-4ef3-85bf-9ae9562fdfa2"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
\[Lo 2005\] Lo, Chia-Tien Dan, Srisa-an, Witawas, and Chang, J. Morris. [Security Issues in Garbage Collection|http://www.eng.auburn.edu/users/hamilton/security/papers/STSC%20CrossTalk%20-%20Security%20Issues%20in%20Garbage%20Collection%20-%20Oct%A02005.pdf]. _STSC Crosstalk_, (2005, October).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bab10af5-42b0-4c1f-80b4-d43506bf642d"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
\[Long 2005\] Long, Fred. [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html]. CMU/SEI-2005-TN-044 (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45e7c707-6891-42dd-b175-d377762b9880"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
\[Long 2011\] Long, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland. _The CERT Oracle Secure Coding Standard for Java_, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011) 

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0fe27e8-6613-421a-84cf-a0c0fb001f43"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
\[Low 1997\] Low, Douglas. Protecting Java Code via Obfuscation. _Crossroads_ 4(3):21–23 (1997).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af28f064-e96e-4e86-b56c-03945cab8591"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
\[Macgregor 1998\] MacGregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. _Java Network Security_. Upper Saddle River, NJ: Prentice Hall PTR (1998).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cbd2a9b0-007e-4068-ba5d-b80e2c24b550"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
\[Mahmoud 2002\] Mahmoud, H. Qusay. [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/]. Oracle (2002).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d18351e-2665-4d6d-8899-6470d7de38e4"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
\[Mak 2002\] Mak, Ronald. _Java Number Cruncher: The Java Programmer's Guide to Numerical Computing_. Upper Saddle River, NJ: Prentice Hall (2002).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43bafb37-5072-446f-9e5c-da06c48ebee2"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
\[Manson 2004\] Manson, Jeremy, and Brian Goetz. [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight] (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0ef576e-47b7-4c6b-b740-15f2a0d0dc3d"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
\[Manson 2006\] Manson, Jeremy, and William Pugh. [The Java™ Memory Model: The Building Block of Concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf]. JavaOne Conference (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b43ff3e6-b7a9-4661-b0bc-96bdac2f303f"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
\[Martin 1996\] Martin, Robert C. [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf]. _The C++ Report_ 8(10):57–62 (1996).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="006bc6d9-8eb9-4269-ab1d-ce49dc4bd877"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
\[McCluskey 2001\] McCluskey, Glen. Java Developer Connection Tech Tips. (2001, April 10).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2dddf140-62eb-4ce1-bf15-22a8eaa84837"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 1999\] McGraw, Gary, and Edward W. Felten. _Securing Java: Getting Down to Business with Mobile Code_. New York: Wiley (1999).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18716a40-74ed-4679-8155-4abb00d5b265"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
\[McGraw 1998\] McGraw, Gary, and Edward W. Felten. [Twelve Rules for Developing More Secure Java Code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html]. _JavaWorld.com_ (1998).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8dab4cb-8408-495f-b4fd-6038839033bf"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
\[Miller 2009\] Miller, Alex. [Java™ Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf]. JavaOne Conference (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d71c87d-3d7a-46fa-8412-8e800f12de10"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
\[MITRE 2009\] MITRE Corporation. [Common Weakness Enumeration|http://cwe.mitre.org/] (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd18d2fd-0458-44be-81e0-f9fe7cf54460"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56257b13-8290-41c9-9e9c-3885fcfa3ee4"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
\[Monsch 2006\] Monsch, Jan P. [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p], Version 1.0 (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73a35f3e-3f43-4258-a515-6f0e91ab5239"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
\[MSDN 2009\] Microsoft. [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx] (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f40344e-9fed-4bf7-85d4-4a136bed6c79"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
\[Muchow 2001\] Muchow, John W. [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html]. _ONJava_ (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dec3d368-2eb0-4e0f-a158-b8a501296751"><ac:parameter ac:name="">M&amp;#xFC;ller 02</ac:parameter></ac:structured-macro>
\[Müller 2002\] Müller, Andreas, and Geoffrey Simmons. [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf]. Sun Microsystems (2002).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7321b6cf-070d-45d5-89dc-27907863489f"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
\[Naftalin 2006\] Naftalin, Maurice, and Philip Wadler. _Java Generics and Collections_. Sebastopol, CA: O'Reilly (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d1510085-4717-4a3c-8db8-6ddad0bc0e0a"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
\[Naftalin 2006b\] Naftalin, Maurice, and Philip Wadler. [Java™ Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf]. JavaOne Conference (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="376c75e5-103f-49ad-a6a2-d66fb273d3e5"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
\[Netzer 1992\] Netzer, Robert H. B., and Barton P. Miller. [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623]. _ACM Letters on Programming Languages and Systems_ 1(1):74–88 (1992).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37afd1a3-9c97-45c5-ab1f-1d9da69c49d2"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
\[Neward 2004\] Neward, Ted. _Effective Enterprise Java_. Boston: Addison-Wesley (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b21e1b4-a10c-4f56-9b89-8b42d8d68dee"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
\[Nisewanger 2007\] Nisewanger, Jeff. [Avoiding Antipatterns|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf]. JavaOne Conference (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70b88d9f-c0bc-43cb-a6ed-bd52800600a7"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
\[Nolan 2004\] Nolan, Godfrey. _Decompiling Java_. Berkeley, CA: Apress (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3015b70-37ca-49af-b893-ff6a6d3c2b50"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 2001\] Oaks, Scott. _Java Security_. Sebastopol, CA: O'Reilly (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6494e311-ccb8-469a-b4ae-ad6ba5b8991a"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
\[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://www.oracle.com/technetwork/java/javase/gc-tuning-6-140523.html]. Oracle (2010).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c6107bd-80e4-4126-9e6a-ee79778a42de"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
\[OWASP 2005\] OWASP (Open Web Application Security Project). [A Guide to Building Secure Web Applications and Web Services|https://www.owasp.org/index.php/OWASP_Guide_Project] (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d74f7fc1-841a-45c1-ae1c-fb1117ffef07"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
\[OWASP 2007\] OWASP (Open Web Application Security Project). [OWASP Top 10 for JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf] (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7dc84294-4578-45e2-9fd6-df535f8253fe"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
\[OWASP 2008\] [OWASP (Open Web Application Security Project).|http://www.owasp.org/index.php/Main_Page] (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df1db6bd-57ed-45da-8c91-4406df377657"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
\[Permissions 2008\] [Permissions in the Java™ SE 6 Development Kit (JDK)|http://docs.oracle.com/javase/6/docs/technotes/guides/security/permissions.html]. Oracle (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbeaf94c-c7cb-49f7-9251-9eb299c99adf"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
\[Philion 2003\] Philion, Paul. [Beware the Dangers of Generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1]. _JavaWorld.com_ (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a2903c4-d254-4d94-bdfb-6105f6baa578"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
\[Phillips 2005\] Phillips, Addison P. [Are We Counting Bytes Yet? Writing Encoding Converters Using Java NIO|http://www.inter-locale.com/whitepaper/IUC27-a303.html]. Paper presented at the 27th Internationalization and Unicode Conference, April 6–8, Berlin (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1a2321f-3815-4356-8979-be43331d9e1b"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
\[Pistoia 2004\] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. _Enterprise Java Security: Building Secure J2EE Applications_. Boston: Addison-Wesley (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de87082e-d4eb-454e-8524-63d246d66c5c"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
\[Policy 2002\] [Default Policy Implementation and Policy File Syntax| http://docs.oracle.com/javase/1.4.2/docs/guide/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems/Oracle (2002/2010).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="335d12f3-8738-4449-be5f-cd8b50d0abd9"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
\[Pugh 2004\] Pugh, William. [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/]. Discussion based on work supported by the National Science Foundation under Grant No. 0098162 (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="105da916-118b-44e4-ba16-434d4d2b965a"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
\[Pugh 2008\] Pugh, William. [Defective Java Code: Turning WTF Code into a Learning Experience|http://www.oracle.com/technetwork/java/j1sessn-jsp-156302.html]. JavaOne Conference (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57b538c6-20d1-4c02-830c-7eaef31ffff2"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
\[Pugh 2009\] Pugh, William. [Defective Java Code: Mistakes That Matter|http://www.oracle.com/technetwork/java/j1sessn-jsp-156297.html]. JavaOne Conference (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57ee6092-f801-465a-b9f8-758c042db027"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
\[Reasoning 2003\] [Reasoning Inspection Service Defect Data: Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf] (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a2927c9-9138-4c40-9b5b-961d01924c71"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
\[Reflect 2006\] [Reflection|http://docs.oracle.com/javase/7/docs/technotes/guides/reflection/index.html]. Oracle (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9997b8f8-895c-4350-9249-33c465cf4d33"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
\[Rogue 2000\] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner and Eldon Metz. _The Elements of Java Style_. New York: Cambridge University Press (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ebd63c9a-be3e-4e52-b332-5a7e8944518a"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
\[Rotem 2008\] Rotem-Gal-Oz, Arnon. [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf] (white paper) (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce195822-c9b6-4c08-88d9-f96723bae8af"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
\[Roubtsov 2003\] Roubtsov, Vladimir. [Breaking Java Exception-Handling Rules Is Easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html]. _JavaWorld.com_ (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9f3678d-a332-4927-9cc3-cd1d7b34dc63"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
\[Roubtsov 2003b\] Roubtsov, Vladimir. [Into the Mist of Serialization Myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1]. _JavaWorld.com_ (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2761194-4b0c-4176-b860-c36e086f7ec1"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
\[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM_ 17(7):388–402 (1974).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4448734a-3385-49c9-b0b5-41abe1ba17c9"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
\[Saltzer 1975\] Saltzer, J. H., and M. D. Schroeder. The Protection of Information in Computer Systems. In _Proceedings of the IEEE_ 63(9):1278–1308.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7b5049e-828b-4cf1-828c-9dc9ff1452da"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 2007\] Secure Coding Guidelines for the Java Programming Language, version 2.0. Sun Microsystems (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95ff374d-5a99-4734-b1d6-423dbad36d8d"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
\[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|https://blogs.oracle.com/mullan/entry/secure_coding_guidelines_for_the]. Oracle (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5dadaf2-1ff8-409c-8a0e-6b122ba1ed04"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
\[Schildt 2007\] Schildt, Herb. _Herb Schildt's Java Programming Cookbook_. New York: McGraw-Hill (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="280b5883-24b9-4320-83f2-9340f0a3fc5f"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
\[Schneier 2000\] Schneier, Bruce. _Secrets and Lies—Digital Security in a Networked World_. New York: Wiley (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc59fe60-ebab-46c3-bd46-11b92db17800"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
\[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com) (2004, November).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6638b087-933e-40ff-bcd0-b69d2bcd9562"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
\[Schwarz 2004\] Schwarz, Don. [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html]. _ONJava_ (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ea634ff-dad2-4053-8b7c-c7455f1292ec"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
\[Schweisguth 2003\] Schweisguth, Dave. [Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2]. _JavaWorld.com_ (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f8c446e-6096-4d57-982c-500c5c2f1980"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
\[SDN 2008\] [Sun Developer Network|http://developers.sun.com/]. Sun Microsystems (1994/2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cffa791d-c253-4aab-aec5-7508e1592667"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
\[Seacord 2005\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston: Addison-Wesley (2005). See [http://www.cert.org/books/secure-coding] for news and errata.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6841594-454c-4957-97e0-4cece8e9fbcd"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 2006\] [Java 2 Platform Security Architecture|http://docs.oracle.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html]. Oracle (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e2690df-2b4a-48c0-b881-d195b79893c2"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 2006\] [Java Security Guides|http://docs.oracle.com/javase/6/docs/technotes/guides/security/]. Oracle (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a59cbb0-77ea-4d43-b2e6-0a96c669245f"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
\[SecuritySpec 2008\] [Java Security Architecture|http://docs.oracle.com/javase/1.5.0/docs/guide/security/spec/security-specTOC.fm.html]. Oracle (2008/2010).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8d468c2-1c60-4a3f-8e33-1032e0347ec1"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
\[Sen 2007\] Sen, Robi. [Avoid the Dangers of XPath Injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html]. IBM developerWorks (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52523a42-3110-483b-923c-a93242dd3e54"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
\[Steel 2005\] Steel, Christopher, Ramesh Nagappan, and Ray Lai. _Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management_. Upper Saddle River, NJ: Prentice Hall PTR (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7db8806f-af44-452a-ab58-7ae44a5e1e33"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
\[Steele 1977\] Steele, Guy Lewis. [Arithmetic Shifting Considered Harmful|http://doi.acm.org/10.1145/956641.956647]. _SIGPLAN Notices_ 12(11):61–69 (1977).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42f9ad7b-9f2d-4fa0-8762-67bdb56dec9f"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
\[Steinberg 2005\] Steinberg, Daniel H. Java Developer Connection Tech Tips: Using the Varargs Language Feature. (2005, January 4).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e216ffb-dc0c-41ab-8a2c-20c76a5379f5"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
\[Sterbenz 2006\] Sterbenz, Andreas, and Charlie Lai. [Secure Coding Antipatterns: Avoiding Vulnerabilities| https://confluence.ucdavis.edu/confluence/download/attachments/16218/TS-1238.pdf?version=1&modificationDate=1180213302000]. JavaOne Conference (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e32b0597-8ad3-4ad8-944e-517886b0bb18"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
\[Steuck 2002\] Steuck, Gregory. [XXE (Xml eXternal Entity) Attack|http://www.securityfocus.com/archive/1/297714]. SecurityFocus (2002).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f35e97fd-c7b3-4fe3-be6c-539cb9fa5c69"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
\[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://docs.oracle.com/javase/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html] Oracle (1999).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1dc4397d-0585-4477-9475-d9d1b35ea21f"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
\[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.oracle.com/cd/E19199-01/817-2180-10/]. Oracle (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d95c193-62bb-4c08-b252-73c935b0eebc"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
\[Sun 2006\] [Java™ Platform, Standard Edition 6 Documentation|http://docs.oracle.com/javase/6/docs/index.html]. Oracle (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3bc42e42-6c7f-407a-9334-7af2de0bb7d5"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
\[Sun 2008\] [Java™ Plug-in and Applet Architecture|http://docs.oracle.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html]. Oracle (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb1c7b80-fef5-4bbe-9c22-5ca857eb2b58"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
\[Sutherland 2010\] Sutherland, Dean F., and William L. Scherlis. [Composable Thread Coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485]. In _Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming_. New York: ACM (2010).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4c28101-c048-481d-a751-ba4cacc51391"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
\[Tanenbaum 2003\] Tanenbaum, Andrew S., and Maarten Van Steen. _Distributed Systems: Principles and Paradigms_, 2nd. ed. Upper Saddle River, NJ: Prentice Hall.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5e81c76-aaac-4cd2-b608-1a7249a8cfd1"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
\[Techtalk 2007\] Bloch, Josh, and William Pugh. The Phantom-Reference Menace, Attack of the Clone, Revenge of the Shift. JavaOne Conference (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2119f654-93cb-47ab-83d2-b07de99d366a"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
\[Tomcat 2009\] Tomcat Documentation: [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security Fixes|http://tomcat.apache.org/security-6.html]. Apache Software Foundation (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c680f631-baec-49cc-8525-6e8bfaf9dff3"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
\[Tools 2011\] [JDK Tools and Utilities Specification|http://download.oracle.com/javase/7/docs/technotes/tools/index.html]. Oracle (2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5af560c7-71ba-4df7-b875-82041bbe72f8"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
\[Tutorials 2008\] [The Java Tutorials|http://docs.oracle.com/javase/tutorial/index.html]. Oracle (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49404e5f-0c57-47f7-bedc-0d781e0ef986"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
\[Unicode 2009\] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by [_The Unicode Standard, Version 5.2_|http://www.unicode.org/versions/Unicode5.2.0/]. Mountain View, CA: The Unicode Consortium (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1231c88b-7201-4816-8406-ab52711e1ced"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
\[Venners 1997\] Venners, Bill. [Security and the Class Loader Architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1]. _Java World.com_ (1997).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68060a3d-68e2-4086-944f-54eee817e5f7"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
\[Venners 2003\] Venners, Bill. [Failure and Exceptions: A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html]. (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3be8a7ff-02c0-44a8-b277-8b282f1b3be0"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
\[W3C 2008\] Bray, Tim, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau. [Extensible Markup Language (XML) 1.0, 5th ed|http://www.w3.org/TR/2008/REC-xml-20081126/]. W3C Recommendation (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6f8c8e7-87dd-422f-af9a-da9fdc5d7a0b"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
\[Ware 2008\] Ware, Michael S. [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/] (thesis). James Madison University (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="683fa3af-a413-4111-95c1-cd4be45113c0"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
\[Weber 2009\] Weber, Chris. [Exploiting Unicode-Enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf]. CanSecWest (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbf3ea5f-c2a9-4b60-bd32-04c2178aa4b2"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
\[Wheeler 2003\] Wheeler, David A. [Secure Programming for Linux and UNIX HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html] (2003).

Anchor
API 06
API 06

[API 2006] Java Platform, Standard Edition 6 API Specification. Oracle (2006/2011).

Anchor
API 11
API 11

[API 2011] Java Platform, Standard Edition 7 API Specification. Oracle (2011).

Anchor
Austin 00
Austin 00

[Austin 2000] Austin, Calvin, and Monica Pawlan. Advanced Programming for the Java 2 Platform. Boston: Addison-Wesley Longman (2000).

Anchor
Black 04
Black 04

[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).

Anchor
Black 06
Black 06

[Black 2006] Black, Paul E., and Paul J. Tanenbaum. "total order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2006).

Anchor
Bloch 01
Bloch 01

[Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001).

Anchor
Bloch 05
Bloch 05

[Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005).

Anchor
Bloch 05b
Bloch 05b

[Bloch 2005b] Bloch, Joshua, and Neal Gafter. Yet More Programming Puzzlers. JavaOne Conference (2005).

Anchor
Bloch 07
Bloch 07

[Bloch 2007] Bloch, Joshua. Effective Java™ Reloaded: This Time It's (Not) for Real. JavaOne Conference (2007).

Anchor
Bloch 08
Bloch 08

[Bloch 2008] Bloch, Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).

Anchor
Bloch 09
Bloch 09

[Bloch 2009] Bloch, Joshua, and Neal Gafter. Return of the Puzzlers: Schlock and Awe. JavaOne Conference (2009).

Anchor
Boehm 05
Boehm 05

[Boehm 2005] Boehm, Hans-J. Finalization, Threads, and the Java™ Technology-Based Memory Model. JavaOne Conference (2005).

Anchor
Campione 96
Campione 96

[Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).

Anchor
CCITT 88
CCITT 88

[CCITT 1988] CCITT (International Telegraph and Telephone Consultative Committee). CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva: International Telecommunication Union (1988).

Anchor
Chan 99
Chan 99

[Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).

Anchor
Chess 07
Chess 07

[Chess 2007] Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Upper Saddle River, NJ: Addison-Wesley Professional (2007).

Anchor
Christudas 05
Christudas 05

[Christudas 2005] Christudas, Binildas. Internals of Java Class Loading, ONJava (2005).

Anchor
Cohen 81
Cohen 81

[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48–54 (1981).

Anchor
Conventions 09
Conventions 09

[Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009).

Anchor
Coomes 07
Coomes 07

[Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).

Anchor
Core Java 04
Core Java 04

[Core Java 2004] Horstmann, Cay S., and Gary Cornell. _Core Java™ 2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).

Anchor
Cunningham 95
Cunningham 95

[Cunningham 1995] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In Pattern Languages of Program Design, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995).

Anchor
CVE 08
CVE 08

[CVE 2008] MITRE Corporation. Common Vulnerabilities and Exposures (2008/2012).

Anchor
Daconta 00
Daconta 00

[Daconta 2000] Daconta, Michael C. When Runtime.exec() Won't. JavaWorld.com (2000).

Anchor
Daconta 03
Daconta 03

[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls. Indianapolis: Wiley (2003).

Anchor
Darwin 04
Darwin 04

[Darwin 2004] Darwin, Ian F. Java Cookbook, 2nd ed. Sebastopol, CA: O’Reilly (2004).

Anchor
Davis 08
Davis 08

[Davis 2008] Davis, Mark, and Martin Dürst. Unicode Standard Annex #15: Unicode Normalization Forms (2008).

Anchor
Davis 08b
Davis 08b

[Davis 2008b] Davis, Mark, and Michel Suignard. Unicode Technical Report #36, Unicode Security Considerations (2008).

Anchor
Dennis 1966
Dennis 1966

[Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155 (1966). doi: 10.1145/365230.365252.

Anchor
DHS 06
DHS 06

[DHS 2006] U.S. Department of Homeland Security. Build Security In (2006/2011).

Anchor
Dormann 08
Dormann 08

[Dormann 2008] Dormann, Will. Signed Java Applet Security: Worse Than ActiveX? CERT Vulnerability Analysis Blog (2008).

Anchor
Doshi 03
Doshi 03

[Doshi 2003] Doshi, Gunjan. Best Practices for Exception Handling. ONJava (2003).

Anchor
Dougherty 2009
Dougherty 2009

[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).

Anchor
Eclipse 08
Eclipse 08

[Eclipse 2008] Eclipse Platform, The Eclipse Foundation (2008).

Anchor
Encodings 06
Encodings 06

[Encodings 2006] Supported Encodings, Oracle (2006/2011).

Anchor
Enterprise 03
Enterprise 03

[Enterprise 2003] Eckstein, Robert. Java Enterprise Best Practices. Sebastopol, CA: O'Reilly (2003).

Anchor
ESA 05
ESA 05

[ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005).

Anchor
Fairbanks 07
Fairbanks 07

[Fairbanks 2007] Fairbanks, George. Design Fragments. PhD thesis, Carnegie Mellon University (2007).

Anchor
FindBugs 08
FindBugs 08

[FindBugs 2008] FindBugs Bug Descriptions (2008/2011).

Anchor
Fisher 03
Fisher 03

[Fisher 2003] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. JDBC API Tutorial and Reference, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003).

Anchor
Flanagan 05
Flanagan 05

[Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005).

Anchor
Fortify 08
Fortify 08

[Fortify 2008] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2011).

Anchor
Fox 01
Fox 01

[Fox 2001] Fox, Joshua. When Is a Singleton Not a Singleton? JavaWorld (2001).

Anchor
FT 08
FT 08

[FT 2008] Function Table: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008).

Anchor
Gafter 06
Gafter 06

[Gafter 2006] Gafter, Neal. Neal Gafter's blog (2006).

Anchor
Gamma 95
Gamma 95

[Gamma 1995] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Reading, MA: Addison-Wesley (1995).

Anchor
Garms 01
Garms 01

[Garms 2001] Garms, Jess, and Daniel Somerfield. Professional Java Security. Birmingham, UK: Wrox Press (2001).

Anchor
Goetz 02
Goetz 02

[Goetz 2002] Goetz, Brian. Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction. IBM developerWorks (2002).

Anchor
Goetz 04
Goetz 04

[Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).

Anchor
Goetz 04b
Goetz 04b

[Goetz 2004b] Goetz, Brian. Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check? IBM developerWorks (2004).

Anchor
Goetz 04c
Goetz 04c

[Goetz 2004c] Goetz, Brian. Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent. IBM developerWorks (2004).

Anchor
Goetz 05
Goetz 05

[Goetz 2005] Goetz, Brian. Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners. IBM developerWorks (2005).

Anchor
Goetz 05b
Goetz 05b

[Goetz 2005b] Goetz, Brian. Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships. IBM developerWorks (2005).

Anchor
Goetz 06
Goetz 06

[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional (2006).

Anchor
Goetz 06b
Goetz 06b

[Goetz 2006b] Goetz, Brian. Java Theory and Practice: Good Housekeeping Practices. IBM developerWorks (2006).

Anchor
Goetz 07
Goetz 07

[Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2006).

Anchor
Goldberg 91
Goldberg 91

[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems (1991/2000).

Anchor
Gong 03
Gong 03

[Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003).

Anchor
Grand 02
Grand 02

[Grand 2002] Grand, Mark. Patterns in Java, Vol. 1, 2nd ed. New York: Wiley (2002).

Anchor
Greanier 00
Greanier 00

[Greanier 2000] Greanier, Todd. Discover the Secrets of the Java Serialization API. Sun Developer Network (2000).

Anchor
Green 08
Green 08

[Green 2008] Green, Roedy. Canadian Mind Products Java & Internet Glossary (2008/2012).

Anchor
Grigg 06
Grigg 06

[Grigg 2006] Grigg, Jeffery. Reflection on Inner Classes (2006).

Anchor
Grosso 01
Grosso 01

[Grosso 2001] Grosso, William. Java RMI. Sebastopol, CA: O'Reilly (2001).

Anchor
Gupta 05
Gupta 05

[Gupta 2005] Gupta, Satish Chandra, and Rajeev Palanki. Java Memory Leaks—Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0. IBM developerWorks (2005).

Anchor
Haack 06
Haack 06

[Haack 2006] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. Immutable Objects in Java. Research report, Radboud University Nijmegen (2006).

Anchor
Haggar 00
Haggar 00

[Haggar 2000] Haggar, Peter. _Practical Java™ Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000).

Anchor
Halloway 00
Halloway 00

[Halloway 2000] Halloway, Stuart. Java Developer Connection Tech Tips, March 28, 2000. Sun Microsystems (2000).

Anchor
Halloway 01
Halloway 01

[Halloway 2001] Halloway, Stuart. Java Developer Connection Tech Tips, January 30, 2001. Sun Microsystems (2001).

Anchor
Harold 97
Harold 97

[Harold 1997] Harold, Elliotte Rusty. Java Secrets. Foster City, CA: IDG Books Worldwide (1997).

Anchor
Harold 99
Harold 99

[Harold 1999] Harold, Elliotte Rusty. Java I/O. Sebastopol, CA: O'Reilly (1999).

Anchor
Harold 06
Harold 06

[Harold 2006] Harold, Elliotte Rusty. Java I/O, 2nd ed. Sebastopol, CA: O'Reilley (2006).

Anchor
Hawtin 08
Hawtin 08

[Hawtin 2008] Hawtin, Thomas. Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities. Sun Microsystems, Make It Fly, London (2008).

Anchor
Henney 03
Henney 03

[Henney 2003] Henney, Kevlin. Null Object, Something for Nothing (2003).

Anchor
Hitchens 02
Hitchens 02

[Hitchens 2002] Hitchens, Ron. _Java™ NIO_. Cambridge, MA: O'Reilly (2002).

Anchor
Hornig 07
Hornig 07

[Hornig 2007] Hornig, Charles. Advanced Java™ Globalization. JavaOne Conference (2007).

Anchor
Hovemeyer 07
Hovemeyer 07

[Hovemeyer 2007] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE), San Diego (2007).

Anchor
Hunt 98
Hunt 98

[Hunt 1998] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. IEE Proceedings: Software 145(2/3):41–50 (1998).

Anchor
IEC 60812 2006
IEC 60812 2006

[IEC 60812 2006] IEE (International Electrotechnical Commission). Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed. Geneva: IEC (2006).

Anchor
IEEE 754 2006
IEEE 754 2006

[IEEE 754 2006] IEEE (Institute of Electrical and Electronics Engineers). Standard for Binary Floating-Point Arithmetic (IEEE 754-1985). New York: IEEE (2006).

Anchor
J2SE 00
J2SE 00

[J2SE 2000] JavaTM 2 SDK, Standard Edition Documentation, J2SE Documentation version 1.3. Sun Microsystems/Oracle (2000/2010).

Anchor
JarSpec 08
JarSpec 08

[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification. Oracle (2008/2010).

Anchor
Java 06
Java 06

[Java 2006] java: The Java Application Launcher. Oracle (2006/2011).

Anchor
Java2NS 99
Java2NS 99

[Java2NS 1999] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Upper Saddle River, NJ: Prentice Hall (1999).

Anchor
JavaGenerics 04
JavaGenerics 04

[JavaGenerics 2004] Java Generics. Oracle (2004).

Anchor
JavaThreads 99
JavaThreads 99

[JavaThreads 1999] Oaks, Scott, and Henry Wong. Java Threads, 2nd ed. Sebastopol, CA: O'Reilly (1999).

Anchor
JavaThreads 04
JavaThreads 04

[JavaThreads 2004] Oaks, Scott, and Henry Wong. Java Threads, 3rd ed. Sebastopol, CA: O'Reilly (2004).

Anchor
JDK7 08
JDK7 08

[JDK7 2008] Java™ Platform, Standard Edition 7 Documentation. Oracle (2008).

Anchor
JLS 05
JLS 05

[JLS 2005] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. Java Language Specification, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005).

Anchor
JLS 11
JLS 11

[JLS 2011] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2011).

Anchor
JMX 06
JMX 06

[JMX 2006] Monitoring and Management for the Java Platform. Oracle (2006).

Anchor
JMXG 06
JMXG 06

[JMXG 2006] Java SE Monitoring and Management Guide. Oracle (2006).

Anchor
JNI 06
JNI 06

[JNI 2006] Java Native Interface. Oracle (2006).

Anchor
Jovanovic 06
Jovanovic 06

[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258–263, May 21–24, Oakland, CA (2006).

Anchor
JPDA 04
JPDA 04

[JPDA 2004] Java Platform Debugger Architecture (JPDA). Oracle (2004).

Anchor
JPL 06
JPL 06

[JPL 2006] Arnold, Ken, James Gosling, and David Holmes. _The Java™ Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006).

Anchor
JSR-133 04
JSR-133 04

[JSR-133 2004] JSR-133: JavaTM Memory Model and Thread Specification (2004).

Anchor
JVMTI 06
JVMTI 06

[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI). Oracle (2006).

Anchor
JVMSpec 99
JVMSpec 99

[JVMSpec 1999] The Java Virtual Machine Specification. Oracle (1999).

Anchor
Kabanov 09
Kabanov 09

[Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009).

Anchor
Kabutz 01
Kabutz 01

[Kabutz 2001] Kabutz, Heinz M. The Java Specialists' Newsletter. (2001).

Anchor
Kalinovsky 04
Kalinovsky 04

[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004).

Anchor
Knoernschild 01
Knoernschild 01

[Knoernschild 2001] Knoernschild, Kirk. _Java™ Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001).

Anchor
Lai 08
Lai 08

[Lai 2008] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. IEEE Software 25(1):13–19 (2008).

Anchor
Langer 08
Langer 08

[Langer 2008] Langer, Angelica, trainer and consultant. http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html (2008).

Anchor
Lea 00
Lea 00

[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Reading, MA: Addison-Wesley (2000).

Anchor
Lea 00b
Lea 00b

[Lea 2000b] Lea, Doug, and William Pugh. Correct and Efficient Synchronization of Java™ Technology–based Threads. JavaOne Conference (2000).

Anchor
Lea 08
Lea 08

[Lea 2008] Lea, Doug. The JSR-133 Cookbook for Compiler Writers (2008/2011).

Anchor
Lee 09
Lee 09

[Lee 2009] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. Robust and Scalable Concurrent Programming: Lessons from the Trenches. JavaOne Conference (2009).

Anchor
Liang 97
Liang 97

[Liang 1997] Liang, Sheng. _The Java™ Native Interface, Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997).

Anchor
Liang 98
Liang 98

[Liang 1998] Liang, Sheng, and Gilad Bracha. Dynamic Class Loading in the Java™ Virtual Machine. In Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, New York (1998).

Anchor
Lieberman 86
Lieberman 86

[Lieberman 1986] Lieberman, Henry. Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 214–223, Portland, OR (1986).

Anchor
Lo 05
Lo 05

[Lo 2005] Lo, Chia-Tien Dan, Srisa-an, Witawas, and Chang, J. Morris. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October).

Anchor
Long 05
Long 05

[Long 2005] Long, Fred. Software Vulnerabilities in Java. CMU/SEI-2005-TN-044 (2005).

Anchor
Long 11
Long 11

[Long 2011] Long, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011)

Anchor
Low 97
Low 97

[Low 1997] Low, Douglas. Protecting Java Code via Obfuscation. Crossroads 4(3):21–23 (1997).

Anchor
Macgregor 98
Macgregor 98

[Macgregor 1998] MacGregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. Java Network Security. Upper Saddle River, NJ: Prentice Hall PTR (1998).

Anchor
Mahmoud 02
Mahmoud 02

[Mahmoud 2002] Mahmoud, H. Qusay. Compressing and Decompressing Data Using Java APIs. Oracle (2002).

Anchor
Mak 02
Mak 02

[Mak 2002] Mak, Ronald. Java Number Cruncher: The Java Programmer's Guide to Numerical Computing. Upper Saddle River, NJ: Prentice Hall (2002).

Anchor
Manson 04
Manson 04

[Manson 2004] Manson, Jeremy, and Brian Goetz. JSR 133 (Java Memory Model) FAQ (2004).

Anchor
Manson 06
Manson 06

[Manson 2006] Manson, Jeremy, and William Pugh. The Java™ Memory Model: The Building Block of Concurrency. JavaOne Conference (2006).

Anchor
Martin 96
Martin 96

[Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57–62 (1996).

Anchor
McCluskey 01
McCluskey 01

[McCluskey 2001] McCluskey, Glen. Java Developer Connection Tech Tips. (2001, April 10).

Anchor
McGraw 99
McGraw 99

[McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code. New York: Wiley (1999).

Anchor
McGraw 98
McGraw 98

[McGraw 1998] McGraw, Gary, and Edward W. Felten. Twelve Rules for Developing More Secure Java Code. JavaWorld.com (1998).

Anchor
Miller 09
Miller 09

[Miller 2009] Miller, Alex. Java™ Platform Concurrency Gotchas. JavaOne Conference (2009).

Anchor
MITRE 09
MITRE 09

[MITRE 2009] MITRE Corporation. Common Weakness Enumeration (2009).

Anchor
Mocha 07
Mocha 07

[Mocha 2007] Mocha, the Java Decompiler (2007).

Anchor
Monsch 06
Monsch 06

[Monsch 2006] Monsch, Jan P. Ruining Security with java.util.Random, Version 1.0 (2006).

Anchor
MSDN 09
MSDN 09

[MSDN 2009] Microsoft. Using SQL Escape Sequences (2009).

Anchor
Muchow 01
Muchow 01

[Muchow 2001] Muchow, John W. MIDlet Packaging with J2ME. ONJava (2001).

Anchor
M&#xFC;ller 02
M&#xFC;ller 02

[Müller 2002] Müller, Andreas, and Geoffrey Simmons. Exception Handling: Common Problems and Best Practice with Java 1.4. Sun Microsystems (2002).

Anchor
Naftalin 06
Naftalin 06

[Naftalin 2006] Naftalin, Maurice, and Philip Wadler. Java Generics and Collections. Sebastopol, CA: O'Reilly (2006).

Anchor
Naftalin 06b
Naftalin 06b

[Naftalin 2006b] Naftalin, Maurice, and Philip Wadler. Java™ Generics and Collections: Tools for Productivity. JavaOne Conference (2007).

Anchor
Netzer 92
Netzer 92

[Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74–88 (1992).

Anchor
Neward 04
Neward 04

[Neward 2004] Neward, Ted. Effective Enterprise Java. Boston: Addison-Wesley (2004).

Anchor
Nisewanger 07
Nisewanger 07

[Nisewanger 2007] Nisewanger, Jeff. Avoiding Antipatterns. JavaOne Conference (2007).

Anchor
Nolan 04
Nolan 04

[Nolan 2004] Nolan, Godfrey. Decompiling Java. Berkeley, CA: Apress (2004).

Anchor
Oaks 01
Oaks 01

[Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001).

Anchor
Oracle 10
Oracle 10

[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning. Oracle (2010).

Anchor
OWASP 05
OWASP 05

[OWASP 2005] OWASP (Open Web Application Security Project). A Guide to Building Secure Web Applications and Web Services (2005).

Anchor
OWASP 07
OWASP 07

[OWASP 2007] OWASP (Open Web Application Security Project). OWASP Top 10 for JAVA EE (2007).

Anchor
OWASP 08
OWASP 08

[OWASP 2008] OWASP (Open Web Application Security Project). (2008).

Anchor
Permissions 08
Permissions 08

[Permissions 2008] Permissions in the Java™ SE 6 Development Kit (JDK). Oracle (2008).

Anchor
Philion 03
Philion 03

[Philion 2003] Philion, Paul. Beware the Dangers of Generic Exceptions. JavaWorld.com (2003).

Anchor
Phillips 05
Phillips 05

[Phillips 2005] Phillips, Addison P. Are We Counting Bytes Yet? Writing Encoding Converters Using Java NIO. Paper presented at the 27th Internationalization and Unicode Conference, April 6–8, Berlin (2005).

Anchor
Pistoia 04
Pistoia 04

[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004).

Anchor
Policy 02
Policy 02

[Policy 2002] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems/Oracle (2002/2010).

Anchor
Pugh 04
Pugh 04

[Pugh 2004] Pugh, William. The Java Memory Model (discussions reference). Discussion based on work supported by the National Science Foundation under Grant No. 0098162 (2004).

Anchor
Pugh 08
Pugh 08

[Pugh 2008] Pugh, William. Defective Java Code: Turning WTF Code into a Learning Experience. JavaOne Conference (2008).

Anchor
Pugh 09
Pugh 09

[Pugh 2009] Pugh, William. Defective Java Code: Mistakes That Matter. JavaOne Conference (2009).

Anchor
Reasoning 03
Reasoning 03

[Reasoning 2003] Reasoning Inspection Service Defect Data: Tomcat v 1.4.24 (2003).

Anchor
Reflect 06
Reflect 06

[Reflect 2006] Reflection. Oracle (2006).

Anchor
Rogue 00
Rogue 00

[Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).

Anchor
Rotem 08
Rotem 08

[Rotem 2008] Rotem-Gal-Oz, Arnon. Fallacies of Distributed Computing Explained (white paper) (2008).

Anchor
Roubtsov 03
Roubtsov 03

[Roubtsov 2003] Roubtsov, Vladimir. Breaking Java Exception-Handling Rules Is Easy. JavaWorld.com (2003).

Anchor
Roubtsov 03b
Roubtsov 03b

[Roubtsov 2003b] Roubtsov, Vladimir. Into the Mist of Serialization Myths. JavaWorld.com (2003).

Anchor
Saltzer 74
Saltzer 74

[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17(7):388–402 (1974).

Anchor
Saltzer 75
Saltzer 75

[Saltzer 1975] Saltzer, J. H., and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE 63(9):1278–1308.

Anchor
SCG 07
SCG 07

[SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0. Sun Microsystems (2007).

Anchor
SCG 09
SCG 09

[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0. Oracle (2009).

Anchor
Schildt 07
Schildt 07

[Schildt 2007] Schildt, Herb. Herb Schildt's Java Programming Cookbook. New York: McGraw-Hill (2007).

Anchor
Schneier 00
Schneier 00

[Schneier 2000] Schneier, Bruce. _Secrets and Lies—Digital Security in a Networked World_. New York: Wiley (2000).

Anchor
Schoenefeld 04
Schoenefeld 04

[Schoenefeld 2004] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com) (2004, November).

Anchor
Schwarz 04
Schwarz 04

[Schwarz 2004] Schwarz, Don. Avoiding Checked Exceptions. ONJava (2004).

Anchor
Schweisguth 03
Schweisguth 03

[Schweisguth 2003] Schweisguth, Dave. Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide. JavaWorld.com (2003).

Anchor
SDN 08
SDN 08

[SDN 2008] Sun Developer Network. Sun Microsystems (1994/2008).

Anchor
Seacord 05
Seacord 05

[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston: Addison-Wesley (2005). See http://www.cert.org/books/secure-coding for news and errata.

Anchor
SecArch 06
SecArch 06

[SecArch 2006] Java 2 Platform Security Architecture. Oracle (2006).

Anchor
Security 06
Security 06

[Security 2006] Java Security Guides. Oracle (2006).

Anchor
SecuritySpec 08
SecuritySpec 08

[SecuritySpec 2008] Java Security Architecture. Oracle (2008/2010).

Anchor
Sen 07
Sen 07

[Sen 2007] Sen, Robi. Avoid the Dangers of XPath Injection. IBM developerWorks (2007).

Anchor
Steel 05
Steel 05

[Steel 2005] Steel, Christopher, Ramesh Nagappan, and Ray Lai. _Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management_. Upper Saddle River, NJ: Prentice Hall PTR (2005).

Anchor
Steele 1977
Steele 1977

[Steele 1977] Steele, Guy Lewis. Arithmetic Shifting Considered Harmful. SIGPLAN Notices 12(11):61–69 (1977).

Anchor
Steinberg 05
Steinberg 05

[Steinberg 2005] Steinberg, Daniel H. Java Developer Connection Tech Tips: Using the Varargs Language Feature. (2005, January 4).

Anchor
Sterbenz 06
Sterbenz 06

[Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006).

Anchor
Steuck 02
Steuck 02

[Steuck 2002] Steuck, Gregory. XXE (Xml eXternal Entity) Attack. SecurityFocus (2002).

Anchor
Sun 04
Sun 04

[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated? Oracle (1999).

Anchor
Sun 03
Sun 03

[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide. Oracle (2003).

Anchor
Sun 06
Sun 06

[Sun 2006] Java™ Platform, Standard Edition 6 Documentation. Oracle (2006).

Anchor
Sun 08
Sun 08

[Sun 2008] Java™ Plug-in and Applet Architecture. Oracle (2008).

Anchor
Sutherland 10
Sutherland 10

[Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. Composable Thread Coloring. In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. New York: ACM (2010).

Anchor
Tanenbaum 03
Tanenbaum 03

[Tanenbaum 2003] Tanenbaum, Andrew S., and Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2nd. ed. Upper Saddle River, NJ: Prentice Hall.

Anchor
Techtalk 07
Techtalk 07

[Techtalk 2007] Bloch, Josh, and William Pugh. The Phantom-Reference Menace, Attack of the Clone, Revenge of the Shift. JavaOne Conference (2007).

Anchor
Tomcat 09
Tomcat 09

[Tomcat 2009] Tomcat Documentation: Changelog and Security Fixes. Apache Software Foundation (2009).

Anchor
Tools 11
Tools 11

[Tools 2011] JDK Tools and Utilities Specification. Oracle (2011).

Anchor
Tutorials 08
Tutorials 08

[Tutorials 2008] The Java Tutorials. Oracle (2008).

Anchor
Unicode 09
Unicode 09

[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by The Unicode Standard, Version 5.2. Mountain View, CA: The Unicode Consortium (2009).

Anchor
Venners 97
Venners 97

[Venners 1997] Venners, Bill. Security and the Class Loader Architecture. Java World.com (1997).

Anchor
Venners 03
Venners 03

[Venners 2003] Venners, Bill. Failure and Exceptions: A Conversation with James Gosling, Part II. (2003).

Anchor
W3C 08
W3C 08

[W3C 2008] Bray, Tim, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau. Extensible Markup Language (XML) 1.0, 5th ed. W3C Recommendation (2008).

Anchor
Ware 08
Ware 08

[Ware 2008] Ware, Michael S. Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools (thesis). James Madison University (2008).

Anchor
Weber 09
Weber 09

[Weber 2009] Weber, Chris. Exploiting Unicode-Enabled Software. CanSecWest (2009).

Anchor
Wheeler 03
Wheeler 03

[Wheeler 2003] Wheeler, David A. Secure Programming for Linux and UNIX HOWTO (2003).

Anchor
Zukowski 04
Zukowski 04

[Zukowski 2004] Zukowski, John. Java Developer Connection Tech Tips: Creating Custom Security Permissions Wiki Markup<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e21d4078-7bf8-4653-951c-bca66cc942ec"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro> \[Zukowski 2004\] Zukowski, John. [Java Developer Connection Tech Tips: Creating Custom Security Permissions|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2] (2004).