Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c801e1b3fba699e-403510c0-42984d79-9e1cad94-ab71c6487b252cf12a901b07"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fff984103bdf6ee-a2725fb4-42ea439e-8a26ab3d-7dbd11a84e51d4be462ac4ff"><ac:parameter ac:name="">Bloch 05<01</ac:parameter></ac:structured-macro> \[Bloch 05\01] Java⢠Puzzlers: TrapsEffective Java, Pitfalls,Programming andLanguage Corner CasesGuide, by Joshua Bloch and Neal Gafter. Pearson Education, IncAddison Wesley. (20052001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c94f7e14457da906-a5e67dc6-4c224f81-ad519aca-8f6906e77b50c9f068b08b76"><ac:parameter ac:name="">Bloch 08<05</ac:parameter></ac:structured-macro> \[Bloch 0805\] Effective Java, 2nd editionJava⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Addison WesleyInc. (20082005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc6bb12e99d1510d-76fc4016-424148e3-8c3fbd5f-40a4232556d4790bcbf5e58e"><ac:parameter ac:name="">Campione>Bloch 96<08</ac:parameter></ac:structured-macro> \[CampioneBloch 9608\] [TheEffective Java, 2nd Tutorialedition, by MaryJoshua CampioneBloch, and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ba9803183fbfb3a-e9deb49c-47a04bd4-ab5c9832-b78aa598bb4ff753c2a8c9f5"><ac:parameter ac:name="">Chan>Campione 99<96</ac:parameter></ac:structured-macro> \[ChanCampione 9996\] [The Java ClassTutorial, Libraries:by SupplementMary forCampione theand Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96964a8f8d712c63-0fbd5a45-43854b31-adf5b668-7e25f156d8225e4bec7c5072"><ac:parameter ac:name="">Concurrency>Chan 06<99</ac:parameter></ac:structured-macro> \[ConcurrencyChan 0699\] The Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006 Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1510cc7c077dac3b-2287342b-49a74fcc-a15ca369-a40a95c52a3b132fa8ddc8b3"><ac:parameter ac:name="">Cookbook>Daconta 04<03</ac:parameter></ac:structured-macro> \[CookbookDaconta 0403\] More Java CookbookPitfalls, by Ian F. Darwin (2004 Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e85463d331911b10-3f5879bd-42cd4223-88d491c5-fe0948c95b35d89036389af7"><ac:parameter ac:name="">Doshi>Darwin 03<04</ac:parameter></ac:structured-macro> \[DoshiDarwin 0304\] [BestJava PracticesCookbook, forby Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="831310f619be1705-2935e434-4efa4513-bb4cb95e-e0b4c8fb5a52cf96353f02fb"><ac:parameter ac:name="">EJPLG>Doshi 01<03</ac:parameter></ac:structured-macro> \[EJPLGDoshi 0103\] Effective[Best Java,Practices Programmingfor Language Guide,Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Joshua Block. Addison WesleyGunjan Doshi. (20012003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27117fedf07993dc-c7669221-4fc242e1-a227a6c0-4de90341ca8088325f46a988"><ac:parameter ac:name="">EJS>Enterprise 04<03</ac:parameter></ac:structured-macro> \[EJSEnterprise 0403\] Enterprise Java Security:Enterprise Building Secure J2EE ApplicationsBest Practices, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd27b29da6895c10-27efae56-4c7d4957-a40cad47-0af32faa40ef829739ecda61"><ac:parameter ac:name="">Enterprise>FindBugs 03<08</ac:parameter></ac:structured-macro> \[EnterpriseFindBugs 0308\] Java[FindBugs Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8b4bbf81eb236d4-df40bded-42a14a63-998caad8-f1927becf447cc52c8285c78"><ac:parameter ac:name="">FindBugs>Garms 08<01</ac:parameter></ac:structured-macro> \[FindBugsGarms 0801\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008 Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08fece6d2070aed6-4ccd5233-44af4c09-97ecbe79-ad4393059cab7bdf6d8a945a"><ac:parameter ac:name="">Garms>Gong 01<03</ac:parameter></ac:structured-macro> \[GarmsGong 0103\] ProfessionalInside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, JessGary GarmsEllison, and DanielMary SomerfieldDageforde. Prentice Hall, WroxThe PressJava LtdSeries. (20012003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85abd5fae85ada83-0afc3cbf-4ee841e5-945db3db-d9b4515a6cf67f54351d376a"><ac:parameter ac:name="">Gong>Green 03<08</ac:parameter></ac:structured-macro> \[GongGreen 0308\] Inside[Canadian Mind Products Java 2& PlatformInternet Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
unmigrated-unmigrated-wiki-markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2114777b42be83c7-55e4f430-45f64af5-bfdf835d-d817e3a4e2e389183938166b"><ac:parameter ac:name="">Green>Goetz 08<06</ac:parameter></ac:structured-macro> \[GreenGoetz 0806\] [CanadianJava MindConcurrency Productsin JavaPractice, &by Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f44986994097ebd-2e40a9c1-4302402a-bb1dbda1-9b8e4dc987df69821c9fd679"><ac:parameter ac:name="">J2SE>Harold 00<97</ac:parameter></ac:structured-macro> \[J2SEHarold 0097\] JavaTMJava 2Secrets SDK,by StandardElliotte Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d169dcb177e9677e-9ca70835-439a4735-bbeb8052-35b10970835957f1acbf7c38"><ac:parameter ac:name="">JLS>Harold 05<99</ac:parameter></ac:structured-macro> \[JLSHarold 0599\] Java Language Specification, 3rd edition.I/O, by JamesElliote Gosling,Rusty Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40be1d76-c3f0-48f4-9e23-e876caaa9995"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/books/jls/index.htmlguide/] (20052000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a6cf2955cfd6066-abb47b20-4a2f4db3-a80295ea-ba5a8bc97003747f69571a27"><ac:parameter ac:name="">IO>JLS 99<05</ac:parameter></ac:structured-macro> \[JavaJLS I/O05\] Java Language I/OSpecification, by3rd Ellioteedition. Rusty Harold. O'REILLY. (1999)by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac: |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5909b9a7e84afb13-f66b0d4a-49074a34-8746a27e-819e2cdf47349a3b99c2a180"><ac:parameter ac:name="">JNI>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[JNIKalinovsky 9704\] The Java⢠Native Interface, Programmer's Guide and SpecificationCovert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by ShengAlex LiangKalinovsky. SAMS ADDISON-WESLEYPublishing. (19972004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed9f334ffe80dad5-c1a8d9a1-4b5845da-9a2bbff2-1be675f8c00af09cff6ea153"><ac:parameter ac:name="">JNS>Lea 98<00</ac:parameter></ac:structured-macro> \[JNSLea 9800\] Concurrent Programming in Java, Network2nd Securityedition, by RobertDoug Macgregor,Lea. DaveAddison DurbinWesley, John Owlett and Andrew Yeomans. Prentice Hall. (1998Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2874defd84dcf39-10d29e14-46824323-bc4eb817-62dd4cdaa8dbdfd4dd08528d"><ac:parameter ac:name="">Kalinovsky>Liang 04<97</ac:parameter></ac:structured-macro> \[KalinovskyLiang 0497\] CovertThe Java:Java⢠TechniquesNative for Decompiling, Patching,Interface, Programmer's Guide and Reverse EngineeringSpecification, by AlexSheng KalinovskyLiang. SAMS PublishingADDISON-WESLEY. (20041997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0df241bf3fee7851-8d32895e-400d4280-b515bba7-91b08517fd862abf5365793d"><ac:parameter ac:name="">Lea>Low 00<97</ac:parameter></ac:structured-macro> \[LeaLow 0097\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000[Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="742602c0cdf3c761-f9d8af71-4e504e0e-a208b5d1-440ae91307b482edb0935bf4"><ac:parameter ac:name="">Low>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[LowKalinovsky 9704\] [ProtectingCovert Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf46e70aedeaab91-2c487324-482f49d9-843283b7-80d46db694aeee6177c37a42"><ac:parameter ac:name="">Kalinovsky>McGraw 04<99</ac:parameter></ac:structured-macro> \[KalinovskyMcGraw 0400\] CovertSecuring Java:, TechniquesGetting forDown Decompiling,to Patching,Business andwith ReverseMobile EngineeringCode, by Alex Kalinovsky, SAMSGary McGraw and Edward W. Felten. Wiley. (20041999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d07f0bcf55fe9812-6e5f2207-40bf4f2a-bab19a1d-92a39e6a7447cd0e5ebeb77b"><ac:parameter ac:name="">McGraw>Macgregor 99<98</ac:parameter></ac:structured-macro> \[McGrawMacgregor 0098\] Securing Java, GettingNetwork DownSecurity, toby BusinessRobert withMacgregor, MobileDave CodeDurbin, byJohn GaryOwlett McGraw and EdwardAndrew WYeomans. Felten.Prentice WileyHall. (19991998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f45499fc5fd123e0-0e99308d-477b41ee-9c53a78c-44dbebabf13cddaf61415ae8"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39603579aeac9799-75eef8c1-4bb946d9-aa7d90e4-be8132263caaaafe9c1e72ed"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="567bfdf8534f34f9-e0feb245-4ea747ed-a78883be-570a31c1637af4d4d5c887d2"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="776adacba8dc197e-94e5e495-44414f44-a9e98211-4ee794646f4643ed7a638b20"><ac:parameter ac:name="">Patterns>Pistoia 05<04</ac:parameter></ac:structured-macro> \[PatternsPistoia 0504\] CoreEnterprise Java Security Patterns: BestBuilding PracticesSecure and Strategies for J2EEâ¢J2EE Applications, Webby Services, and Identity ManagementMarco Pistoia, byNataraj Christopher SteelNagaratnam, RameshLarry NagappanKoved and RayAnthony LaiNadalin. Prentice Hall PTR / Sun MicrosAddison Wesley. (20052004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bca052229d841166-b8eaf850-4d8c4110-b136933e-b67f1730d1489c8ec6f57b6b"><ac:parameter ac:name="">Pitfalls>SCG 03<07</ac:parameter></ac:structured-macro> \[PitfallsSCG 0307\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003[Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9827733990ecb4c3-3d2ea1a6-4c1c42ae-87fba086-91e610af2ef2bea4d86b4c8e"><ac:parameter ac:name="">SCG>SecArch 07<06</ac:parameter></ac:structured-macro> \[SCGSecArch 0706\] [Secure Coding Guidelines for the Java Programming2 Language,Platform versionSecurity 2.0Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/seccodeguide/spec/security-spec.doc.html] (20072006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ccbc5b990ac9ab0-81a94171-47db4896-a960b017-44bb9baa9414ac7bc45e6a45"><ac:parameter ac:name="">SecArch>Security 06</ac:parameter></ac:structured-macro> \[SecArchSecurity 06\] [Java 2 Platform Security ArchitectureGuides|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2dfb12639e58069-a8ef1e51-463a4521-bdd391be-2bb4387ba1c91dd16bc4c75d"><ac:parameter ac:name="">Secrets>Steel 97<05</ac:parameter></ac:structured-macro> \[SecretsSteel 9705\] JavaCore SecretsSecurity byPatterns: ElliotteBest RustyPractices Harold.and Wiley. (1997) |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fb962b7-70ac-469e-995e-5e893bbc8fca"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e29b65bd3c57dd8c-3f7bfd59-4eb94c5d-b0339496-4b8c21ca2fee0028e683d0dd"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |