Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1327bacf34fe4587-ae07afb5-43964cb5-852aa24f-b6a9136142cd381e954ebb23"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94f26be90f1adda0-58c91e43-42b44caa-9b9f9bf9-996fe9b306d80aa640047c2d"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7831e5219d996514-809e3c24-459a440a-8bb3ba60-05b1842cd14af7ab361d16e7"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de4ebde52e783a2f-85f129e6-428e4dcd-9ad6a6e0-307a556eecd6440e2324c958"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="805360ff191d69b2-09c54db8-49364838-813f84b5-bd5d956926ed851a281132a8"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d1c22303761c34b-38ade5bf-43604abd-99dbae09-bb445b768d6983a5af1c26d4"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro> \[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c047309c596e71d-a20c5e6b-479f4026-b1c29790-1b13e29548bb4677b7452aae"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro> \[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18a43252fde09e3e-ff04ce90-46f146ea-b98dbc73-3fa9e25049e0fc68bd7920ab"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5a4500d7184f952-9a05716c-462f4a98-8a2d9c77-74e376d6a629858df01d9dd8"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro> \[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b7683d0d41a117c-9c11983c-4f1f4aff-b651bd31-f26e46081277ff71c8a71fae"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro> \[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f0b9cb18b38520e-43c72d5a-4d324117-aae9b1aa-7872f2901c35a51c43b6646d"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96402b1647535eab-4c179a52-4043406c-9355a9fa-0725f38da5008ebdd7e5c473"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32f1d8896f376287-c86cb59f-4087499e-97fcb8be-d51789fbcf85872b44098faa"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b502e102ed664a91-743ad2a1-4c6a4dc9-830ea63c-4c6c3ba6f4a0acdf8a1b22e5"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d5d6e2605584788-fdee7075-41504db5-973f8046-bddb1c56ef9eb9c12aefc366"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c060229b6caf6713-f321aabe-4acc4afd-b5a383e7-667bc9be168f0b78d194a1a4"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bbc2e6f9cc551f12-9f48d1f9-4ebd4a55-bfb18102-d578e396de1bcf075e9ccc27"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="737a1e7b1ad27224-09fa1176-4f0943d8-9308b8f0-c0cdf96f3cae01410af8449f"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro> \[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="865b9e04a54d4c2d-d310ad58-419940e6-88a99e0a-1fe4dfa6d7ae7bc59410e6a2"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro> \[JNI 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7d1bfeeafe71c8a-d55c012f-4bd34e86-8f79bd63-89bb4a943dc08f6a9c5b88be"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> \[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af3c31a9724bc0f3-689554e3-4219489a-8bc99a10-ec66500f7579aaaa58abab82"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd244d3e3bcfebda-bf4f93ba-4d3d4181-9171b968-2740c2e67979ea57346a770f"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9466a5d06169eab5-d8ae2ab5-4be04eb3-bb67a095-bf148fbd83a6b2c4ba78bb35"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88a92e4517f12ae9-9d2c00e8-42604ba1-aa4e928e-0ad284d87fca5fb3a9198cca"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25efbb64059e2ec8-498189e1-45cc472d-9da2885a-55c3697c6378a4b958c58f30"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ff88c1a756dba5d-ec5dcb43-43204e70-a3a2ab7d-eafbc8fb155817a136fd75f8"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="204bdac32feef979-4b2c8f5d-47504944-97d4944d-47a463976561e9cdd2053aee"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a1cadfc4fdee73e-dbfa488b-48ec4409-9354a068-4297bc2782b30e19efb384f4"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8922f0f55795d4a-20f0ba7b-41634225-89fb8aa9-a66c5bf77bdecf61f87a7f7a"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro> \[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5591a88db9fd0c08-e68a5e38-40e54e1a-a9b79f6a-f7f3be6e9893312cb45d533a"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro> \[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce033c422fc1e4a0-20962949-43d0485b-b51a8bc5-3eff3ffb646561aa3e9d66f1"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b72f8d14bbf3621-98449891-42b74e01-80ff84a6-778ddf9ca313578b1986e386"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="122e96a9b6648964-53a777aa-4bfa408e-8f95aa50-d0ebe91d1e0d1cbc24064808"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro> \[Secrets 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a91d1e496eab35f-d15bbbe5-4a204229-a6558ef4-2abd9e2db33094db647f111b"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2c86b45ab4319fa-5a92cd73-406e41a4-8e95857b-e2ee7ab073ca835d6a9452eb"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |