Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="384afd37f60679f2-1fedaadd-4c654aa3-af328d5e-7785794ac73f76cb5d821d01"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86e4a6ec464a2bc4-72ef4ebf-40da41fb-8d2f8ac6-1e5bc0c982d2c94afd2b5a4d"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6cf6a59738c0fe21-613b2c4f-40ed4bce-989d9050-ed9630bd05f25f7205515f59"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a133e60bd15cb877-ed9a5687-414643bc-8fdb955e-1f29625ca0b0f8c5a0c2d09d"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20fb7f718ce4d58a-f57d2116-4e514d33-971e860c-04c2f562732b68af3b41de5f"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c56f4990ee4b1077-b90bf891-4d0e46d0-b34db6f9-327b37cbaf186219ae3720f7"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro> \[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ec97d81738bb3a5-56809a81-44704852-9c728d52-f7fe15ababb8fe998a3cf0b3"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro> \[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78c388effe48705b-2dc213de-42f9424b-88c1bf84-30e986ce18758378ea961877"><ac:parameter ac:name="">EJPLG>Doshi 01<03</ac:parameter></ac:structured-macro> \[EJPLGDoshi 0103\] Effective[Best Java,Practices Programmingfor Language Guide, by Joshua Block. Addison Wesley. (2001Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d124124141ff898-b623d4f5-475548bf-a012b98a-ae3e1762ecee2634d87951a2"><ac:parameter ac:name="">EJS>EJPLG 04<01</ac:parameter></ac:structured-macro> \[EJSEJPLG 04\01] EnterpriseEffective Java, Security:Programming Building Secure J2EE ApplicationsLanguage Guide, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony NadalinJoshua Block. Addison Wesley. (20042001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b531c98d2a4e604-190516e9-4e29481b-8d0eaf69-77e1af0c26d1c835aa6e1e3c"><ac:parameter ac:name="">Enterprise>EJS 03<04</ac:parameter></ac:structured-macro> \[EnterpriseEJS 0304\] Enterprise Java Enterprise Best Practices Security: Building Secure J2EE Applications, by the O'Reilly Java Authors. O'Reilly. (2003Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb317da62af2ae09-6c940f03-42824cee-987c8c69-1561f3805d5758cd48678bfd"><ac:parameter ac:name="">Garms>Enterprise 01<03</ac:parameter></ac:structured-macro> \[GarmsEnterprise 0103\] ProfessionalJava Enterprise JavaBest SecurityPractices, by Jessthe GarmsO'Reilly andJava Daniel Somerfield. Wrox Press Ltd. (2001Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98593e73f430b213-78e46fc6-4b184746-98049c2b-6c1d397a31de517722afa708"><ac:parameter ac:name="">Gong>Garms 03<01</ac:parameter></ac:structured-macro> \[GongGarms 0301\] InsideProfessional Java 2 Platform Security:, Architecture,by APIJess Design,Garms and Implementation,Daniel 2ndSomerfield. edition,Wrox byPress Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46df1d779d4bd807-92373cc1-4a6b4607-9026895c-605e9e0d67be4c0c07d9fad4"><ac:parameter ac:name="">J2SE>Gong 00<03</ac:parameter></ac:structured-macro> \[J2SEGong 0003\] Inside JavaTMJava 2 SDK,Platform Standard Edition DocumentationSecurity: Architecture, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd3cb922-084b-4da5-a613-a71e1a466df0"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6d5066b-831a-4473-83cb-a64495be048d"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac4ea7f7-51be-430e-bdcb-1601095f0395"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aab43d175c9ad730-a10e7299-472b433e-ba308108-93fc322de435eb8eff5ae267"><ac:parameter ac:name="">JLS>JNI 05<97</ac:parameter></ac:structured-macro> \[JLSJNI 0597\] JavaThe LanguageJava⢠Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aca24f9fd21d1c9d-1915bf78-42334dda-a6f990c3-a1596e9613bd286d2d77394b"><ac:parameter ac:name="">IO>JNS 99<98</ac:parameter></ac:structured-macro> \[JNS 98\] Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999 Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d12f6bab60193c79-3f3d63cd-4aa54510-8d809aec-3e5acbccb3d38945b060b0d6"><ac:parameter ac:name="">JNI>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[JNIKalinovsky 9704\] Covert TheJava: Javaâ¢Techniques Nativefor InterfaceDecompiling, Programmer's Guide Patching, and Reverse SpecificationEngineering, by ShengAlex LiangKalinovsky. SAMS ADDISON-WESLEYPublishing. (19972004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a45c974a60f3397-60293857-4c1542e6-8e3d858d-1a50b33bf92e6d668f47ad66"><ac:parameter ac:name="">JNS>Lea 98<00</ac:parameter></ac:structured-macro> \[JNSLea 9800\] JavaConcurrent NetworkProgramming Security, by Robert Macgregorin Java, Dave2nd Durbinedition, Johnby OwlettDoug andLea. AndrewAddison Yeomans.Wesley, PrenticeSun HallMicrosystems. (19982000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab12363c0655f930-19e4d1bb-42314bc5-90f1ba00-f19f5f2fb987202e4e69a6f3"><ac:parameter ac:name="">Kalinovsky>Low 04<97</ac:parameter></ac:structured-macro> \[KalinovskyLow 0497\] Covert[Protecting Java: TechniquesCode for Decompiling, Patching, and Reverse Engineeringvia Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by AlexDouglas KalinovskyLow. SAMS Publishing. (20041997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f17eaff65fecabbd-3d62bfb5-434948c7-91ac9c07-b47a45155597107d811b0560"><ac:parameter ac:name="">Lea>Kalinovsky 00<04</ac:parameter></ac:structured-macro> \[LeaKalinovsky 0004\] Covert Java: ConcurrentTechniques Programmingfor inDecompiling, JavaPatching, and 2ndReverse editionEngineering, by Doug Lea. Addison Wesley, Sun MicrosystemsAlex Kalinovsky, SAMS. (20002004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fcdbadcd59cee9c-1d45d3a8-4dad4a1b-bf17904b-17a392aa0a1b93bfbe1dfc96"><ac:parameter ac:name="">Low>McGraw 97<99</ac:parameter></ac:structured-macro> \[LowMcGraw 9700\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997 Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1338ce932e623456-39995eeb-49084442-8ce3a6bd-fd4a341f669465aca3a3a45e"><ac:parameter ac:name="">Kalinovsky>Mocha 04<07</ac:parameter></ac:structured-macro> \[KalinovskyMocha 0407\] Covert Java: Techniques for Decompiling[Mocha, Patching,the and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="289d7be19bc58c32-b61ac1b0-47e64485-a3c79f18-f3e3e7fec8398a874a9b0def"><ac:parameter ac:name="">McGraw>Müller 99<02</ac:parameter></ac:structured-macro> \[McGrawMüller 0002\] [Exception SecuringHandling: Java,Common GettingProblems Downand toBest BusinessPractice with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04b8f2d4d7895948-d13a22b2-488545d0-9f618719-e1b4a152dab779d04e6c99a8"><ac:parameter ac:name="">Mocha>Oaks 07<01</ac:parameter></ac:structured-macro> \[MochaOaks 0701\] Java [MochaSecurity, theby Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d784924294fb93b7-dd9bd891-4f1848d8-9c078568-683ca7d3ba5e32a7a16abcf0"><ac:parameter ac:name="">Oaks>Patterns 01<05</ac:parameter></ac:structured-macro> \[OaksPatterns 01\] Java Security, by Scott Oaks. O'REILLY. (200105\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b361ec654203ea38-cc418dc3-446b4bfa-be2b8993-a61da477222646cab27ac2ab"><ac:parameter ac:name="">Patterns>Pitfalls 05<03</ac:parameter></ac:structured-macro> \[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="974df5279e97b573-9e9a3876-426a40f8-94be93d6-3cf33987f6f30760701d38ab"><ac:parameter ac:name="">Pitfalls>SCG 03<07</ac:parameter></ac:structured-macro> \[PitfallsSCG 0307\] [Secure MoreCoding JavaGuidelines Pitfalls,for bythe MichaelJava C.Programming DacontaLanguage, Kevinversion T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (20032.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da151f152d97d5a9-9c62797c-4af04b97-9e2f9a7e-359c7ca49429a1d64e0260ba"><ac:parameter ac:name="">SCG>SecArch 07<06</ac:parameter></ac:structured-macro> \[SCGSecArch 0706\] [Secure Coding Guidelines for the Java Programming2 Language,Platform versionSecurity 2.0Architecture|http://java.sun.com/javase/6/docs/technotes/java.sun.comguides/security/seccodeguide/spec/security-spec.doc.html] (20072006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77a292197e1dea9c-382418b9-4d0647ce-b4529662-29fa5b4e845d2e0ff0233fe9"><ac:parameter ac:name="">SecArch>Secrets 06<97</ac:parameter></ac:structured-macro> \[SecArchSecrets 0697\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da67fb4103f461f4-76881704-4f424f97-94759a19-fcbd14e698785de0e62230bf"><ac:parameter ac:name="">Secrets>Security 97<06</ac:parameter></ac:structured-macro> \[SecretsSecurity 9706\] [Java Secrets by Elliotte Rusty Harold. Wiley. (1997Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a7104526b4b02df-2615e65d-434a483a-a24ea023-f8d518e6329a70a60678b078"><ac:parameter ac:name="">Security>Tutorials 06<08</ac:parameter></ac:structured-macro> \[SecurityTutorials 0608\] [The Java Security GuidesTutorials|http://java.sun.com/javase/6/docs/technotesbooks/guides/security/tutorial/index.html] (20062008) |