Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="131e3af9c4499204-3d5125d8-49254b01-b660b3c3-e65e8bbffbcc00c0e023b202"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
\[Abadi 1996\] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. _IEEE Transactions on Software Engineering_ 22(1):6–15 (1996).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="125afaae2a87e254-c3fa5674-47f1485c-85b3955d-8d4aef5980ded02e310f73d3"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://docs.oracle.com/javase/6/docs/api/]. Oracle, Inc. (2006/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d74194741caa16ff-5b974d08-44c24a45-9bc899ed-e9d6e64f6687a241e2703392"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
\[API 2011\] [Java Platform, Standard Edition 7 API Specification|http://download.oracle.com/javase/7/docs/api/index.html]. Oracle, Inc. (2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8af1de8c828b1fbd-b50bf4f5-4df64c87-be7bbf44-e3d88892fac90901786ebb89"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
\[Austin 2000\] Austin, Calvin, and Monica Pawlan. [_Advanced Programming for the Java 2 Platform_|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents]. Boston: Addison-Wesley Longman (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6a3c1d3d383e745-74235eec-40024831-bbb49f16-df81b724640a6b47a5ceb85a"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
\[Black 2004\] Black, Paul E., and Paul J. Tanenbaum. "partial order." In _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. [http://xlinux.nist.gov/dads/HTML/partialorder.html] (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="314feddde673b053-96014077-4a7c4649-ad0c97ac-d9e2a91305b02fa8b2ba39ed"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
\[Black 2006\] Black, Paul E., and Paul J. Tanenbaum. "total order." In _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. [http://xlinux.nist.gov/dads/HTML/totalorder.html] (2006).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce9ce44875c2d6b8-ce816858-48394ed9-9e72bec5-76af780a9532d650b9f2e8f0"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
\[Bloch 2001\] Bloch, Joshua. _Effective Java: Programming Language Guide_. Boston: Addison-Wesley (2001).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32b9e3bea0360811-de1e4519-49184008-accfb57e-2d0c7f8631637704dfd00bcb"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 2005\] Bloch, Joshua, and Neal Gafter. _Java Puzzlers: Traps, Pitfalls, and Corner Cases_. Upper Saddle River, NJ: Addison-Wesley (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="260f9f3c3f61a868-881e2167-4539469d-a4f2850d-53c8899accedf4aee1bc534e"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
\[Bloch 2005b\] Bloch, Joshua, and Neal Gafter. [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/]. JavaOne Conference (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c4b4d913c18bd2aa-2ab65886-47f24500-b44d823a-9205aba4ef4925dc11a7c140"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
\[Bloch 2007\] Bloch, Joshua. [Effective Java™ Reloaded: This Time It's (Not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf]. JavaOne Conference (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f83f431f5d5b1d69-21b8ec52-48a14a40-87829457-81793f952d9820e0b019e9b8"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 2008\] Bloch, Joshua. _Effective Java_, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7dab0446bd62eaeb-e893d660-44e541f5-a7b29931-140a7edd52b44037132550f9"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
\[Bloch 2009\] Bloch, Joshua, and Neal Gafter. [Return of the Puzzlers: Schlock and Awe|http://www.oracle.com/technetwork/server-storage/ts-5186-159197.pdf]. JavaOne Conference (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="932866cbed088cc8-5c0d33b1-45894188-86eebba7-995db32a35ce126a212eb030"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
\[Boehm 2005\] Boehm, Hans-J. Finalization, Threads, and the Java™ Technology-Based Memory Model. JavaOne Conference (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d5a690be8a47635-7afeb788-442f4426-8a7eb176-b355d2af92251e9267fdf63a"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 1996\] Campione, Mary, and Kathy Walrath. _The Java Tutorial: Object-Oriented Programming for the Internet_. Reading, MA: Addison-Wesley (1996).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7eebf4b826194f9a-49cf03c2-4e4249ee-92bba206-a74f270f087997a1d4967ec3"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
\[CCITT 1988\] CCITT (International Telegraph and Telephone Consultative Committee). _CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework_. Geneva: International Telecommunication Union (1988).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f64120731d5cae5-c67a45a4-49ad47fb-9f0d97db-efed724aae1091288d1f884c"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 1999\] Chan, Patrick, Rosanna Lee, and Douglas Kramer. _The Java Class Libraries: Supplement for the Java 2 Platform, v1.2_, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84b04ff1c2f6ae96-d4d4c463-498a4350-a5c491f0-67db79bd1f976700e2263dc9"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
\[Chess 2007\] Chess, Brian, and Jacob West. _Secure Programming with Static Analysis_. Upper Saddle River, NJ: Addison-Wesley Professional (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40a7fb799daca696-3476c7a6-4e4b4104-b887a5fa-df30a68ffeaa7e9faf13e6ba"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
\[Christudas 2005\] Christudas, Binildas. [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], _ONJava_ (2005).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac101bf645bdf1dc-809eaf30-49984ff6-b96a945b-e2ed5486d102c2bab8a29a5b"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
\[Cohen 1981\] Cohen, D. [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], _IEEE Computer_, 14(10):48–54 (1981).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b16f43f6e14e91df-bc56e0b6-48494818-8fcda7ea-4183d0ca213e094b20cf7c0a"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
\[Conventions 2009\] [Code Conventions for the Java Programming Language|http://www.oracle.com/technetwork/java/codeconv-138413.html]. Oracle, Inc. (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b18370cd634afb18-5a962e94-467d4912-a360a191-0f6a9b73421fcd45adfecb5f"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
\[Coomes 2007\] Coomes, John, Peter Kessler, and Tony Printezis. [Garbage Collection-Friendly Programming|http://docs.huihoo.com/javaone/2007/java-se/TS-2906.pdf]. Java SE Garbage Collection Group, Sun Microsystems, Inc. JavaOne Conference (2007).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c733c541d7c27ed-3faff3d2-4f744603-93079ac2-5772960d009210b018ccc740"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
\[Core Java 2004\] Horstmann, Cay S., and Gary Cornell. _Core Java™ 2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e10d552988e4b7f-24949349-4c9c406e-8086b8de-854030fb79785a0338f2554f"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
\[Cunningham 1995\] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In _Pattern Languages of Program Design_, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54b59b450bc5af86-ad87ad64-4c674928-ac1b85a5-fd28b6dc83cc13c1b7db1927"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
\[CVE 2008\] MITRE Corporation. \[Common Vulnerabilities and Exposures|http://cve.mitre.org/index.html] (2008/2012).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68853b57b629a09c-4d28d45f-455d405d-91589651-ca6b82bc001ca05a539c4b55"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
\[Daconta 2000\] Daconta, Michael C. [When Runtime.exec() Won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html]. _JavaWorld.com_ (2000).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49670c05ffa17e32-5fa226e8-491441c4-b8948622-e35de54a5899a9eaffe7bf7c"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
\[Daconta 2003\] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. _More Java Pitfalls_. Indianapolis: Wiley (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d0a6d421fc7f3f4-13f64de7-44df4cd1-8dd5a056-a1ce38e4521c775a86dffd49"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
\[Darwin 2004\] Darwin, Ian F. _Java Cookbook_, 2nd ed. Sebastopol, CA: O’Reilly (2004).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b768fc02715bcddb-80f90b58-4fdb4ad0-99088d53-5b79d476925b7fb005610654"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
\[Davis 2008\] Davis, Mark, and Martin Dürst. [Unicode Standard Annex #15: Unicode Normalization Forms|http://unicode.org/reports/tr15/] (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bca65164e01e9bfd-06a5becf-43be4712-99c7b9d1-ed6e1508f2d3c0f1611eeeab"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
\[Davis 2008b\] Davis, Mark, and Michel Suignard. [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/] (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9afe408671c7651a-b253d9c6-419b4005-99e4b582-ef9fe4abc3b69516a1ac1cb4"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
\[Dennis 1966\] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. _Communications of the ACM_, 9(3):143–155 (1966). doi: 10.1145/365230.365252.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24751ee6ece9b83c-00a8f9b0-41594c60-a60b824b-7ed5b0ea2268cc2054bb58c3"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
\[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/]. https://buildsecurityin.us-cert.gov (2006/2011).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe7e65caa139423a-117e7a4c-40da4696-973fbe1b-1b86548b90e5874d53c34487"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
\[Dormann 2008\] Dormann, Will. [Signed Java Applet Security: Worse Than ActiveX?|http://www.cert.org/blo gs/vuls/2008/06/signed_java_security_worse_tha.html] CERT Vulnerability Analysis Blog (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04a46f440e77c843-7fe0e8e3-415b4d47-88de85ef-430f0d49bf7d50a6a7defffa"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
\[Doshi 2003\] Doshi, Gunjan. [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html]. _ONJava_ (2003).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="766849b06b55b449-0ad6d6b5-4f314535-b3afb883-3a01d4b7a3020542670b59e1"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
\[Dougherty 2009\] Dougherty, Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. [Secure Design Patterns|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]. CMU/SEI-2009-TR-010. (2009).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0291a91941cea5bf-3a78de25-4e264ee1-81e6b028-accb530ab90e5a179192940d"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
\[Eclipse 2008\] [The Eclipse Platform|http://www.eclipse.org/platform/], The Eclipse Foundation (2008).

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b40c46ec2a05bf33-deeb30dc-4c754406-8e6ab7ae-6cab776e90734a35e5436445"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
\[Encodings 2006\] [Supported Encodings|http://java.sun.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7b35e09de103000-e488894a-428845e6-a413a1bc-db1c57c197b949a5ea5f580d"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 2003\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec582d7a5f3b8a5a-57bd76d9-45604179-9d95b23f-b0e04077480e97088d37a178"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
\[ESA 2005\] [Java Coding Standards|ftp://ftp.estec.esa.nl/pub/wm/wme/bssc/Java-Coding-Standards-20050303-releaseA.pdf], prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a98fbb7fc7f910e6-6b02ea82-4d8e4454-a9e5a645-8e250e2dd64ade5b872370ec"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
\[Fairbanks 2007\] [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1aa5490dc8300f35-038f7f71-4e5544f6-b024bdd3-19eb657fe2a489e0ab33a6d4"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
\[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fefc1cb545b42e7-dcb031f7-440b4918-861d8968-e78500c47bd27f88f351501e"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
\[Fisher 2003\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="685ae1823bc40af0-5f8153e7-42124d67-a765abaf-ff7802d1434d5481ac7b6f91"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
\[Flanagan 2005\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="851018f15f691af4-4099bef9-45f34e3d-99bb9384-272c3f30b714f7e54e7fb25e"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
\[Fortify 2008\] [A Taxonomy of Coding Errors that Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] Java/JSP, Fortify Software. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="962669c1e8986c7c-f8f2c261-49a44a9b-a8138c38-d4d663c77ccb47f9ae2110a9"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
\[Fox 2001\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c84f2b13eca42c9e-4b6614b3-4ae04d1f-b5d9acb7-51475292d9a4e17dfb8f4e32"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
\[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a22711c301c350f-bc969afc-4a144403-9e38a8e0-f3b034ebf3fc2934c46106ed"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
\[Gafter 2006\] [Neal Gafter's blog|http://gafter.blogspot.com/], by Neal Gafter's. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1190ef6cd2f2087-536e02d8-4dd24898-8db6a95c-05e43f4ee9bf97339c2bfe9a"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
\[Gamma 1995\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="214b90da3b1c0050-4e126f7f-4ade4cb1-9ff38f8e-5cf65dfa4531812a35afea6b"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 2001\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2585438b1c81da4-ce80a350-48f945e5-af24b5f2-d5f1ced050b6546d16b9fe59"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
\[Goetz 2002\] [Java theory and practice: Don't let the "this" reference escape during construction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19d9395bb27977cd-246d4568-4e494231-b44288e7-80c9a8db50c818d898ac341d"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
\[Goetz 2004\] [Java theory and practice: Garbage collection and performance|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="393575ff32cfbf2b-75659765-4adf4c22-b6508a01-57ce1eb3e005e1211a8c0809"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
\[Goetz 2004b\] [Java theory and practice: The exceptions debate: To check, or not to check?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3aec4e3765d99431-a128cf67-43fa476f-b8049765-2683b0d2cd2102f13f7e598b"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
\[Goetz 2004c\] [Java theory and practice: Going atomic|http://www.ibm.com/developerworks/java/library/j-jtp11234/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9afd86ae1286789e-f1f73e7c-4a904f9e-9939ac13-c3f67fe50903dc96b553254a"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
\[Goetz 2005\] [Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aec27a1f87c28db6-54f90841-4fd44e76-8f4a867d-0af4e77f528c18daed17bfb4"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
\[Goetz 2005b\] [Java theory and practice: Plugging memory leaks with weak references|http://www.ibm.com/developerworks/java/library/j-jtp11225/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f1f6eb08ca272f1-d86f5366-4d654c62-bd078ee9-3e7de2f7606d06a13aae197b"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
\[Goetz 2006\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aaa6a124efd68d30-d19f51c2-41714e5e-9e2cb92f-fbf95389aa6c5da33a6b8db0"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
\[Goetz 2006b\] [Java theory and practice: Good housekeeping practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43ff4eefd4cdbbe0-84b39127-49a04dc4-b2048dba-8ccf28fdbd94091419fb4948"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
\[Goetz 2007\] [Java theory and practice: Managing volatility, Guidelines for using volatile variables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html], by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology). (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b7a1bbe4294b6f7-7ef92911-4a0645d8-9a1d9929-29a0bbdfd9d9ac7c499ce08b"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, Inc. March 1991. (1991)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8e7ecd5a7942974-b611dbc0-41de4e4c-b610bbca-efc30c00533bfcb353caff0c"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 2003\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36e17b2737c735d5-c09d8790-46784336-85e49a1d-ce63d1488c9c744b591c4bb5"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
\[Grand 2002\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ed330aeaea46fa2-23a2f6ff-438c4acd-8e2686a6-da0d4db4409c982fe3a10b0e"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
\[Greanier 2000\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90bcbde3b5ee454c-4ee100f3-40f34176-a8bcac25-1a3dec326f987881934e65fc"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
\[Green 2008\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7a0e3d5f478cd94-d8fa9e1e-41d24097-be1ab01a-11ad5b432d031f5bb7e4633a"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
\[Grigg 2006\] [Reflection On Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] by Jeffery Grigg. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a024a384f9cc782-717d9695-45a04ec5-a307bd47-830464e06d8a60fe06f2d638"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
\[Grosso 2001\] [Java RMI|http://oreilly.com/catalog/javarmi/chapter/ch10.html], by William Grosso. O'Reilly. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f133ddb3e28b32a9-2d5d558a-4ac04397-a84bb289-68def778770b4af35e733e74"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
\[Gupta 2005\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="866a53194db07ad1-ebc143ce-426248aa-8e63ab03-3498da3feea027400856e5bd"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
\[Haack 2006\] [Immutable Objects in Java|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable], by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2178c49d198b8694-6944924f-49ca4027-9f7daec9-a5d77f3f01e45adf18dba4b8"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
\[Haggar 2000\] Practical Java™ Programming Language Guide, by Peter Haggar. Addison-Wesley Professional. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="deee82706012fc11-a3512981-4d504207-99859e26-13fa7d4293cdaa468c667bdc"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
\[Halloway 2000\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/TechTips/2000/tt0328.html], March 28, 2000, by Stuart Halloway.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09fec8c363b3354c-07b6a2da-4f47434e-98c38d7c-b0f88ee15ff13dc46c87b297"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
\[Halloway 2001\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/JDCTechTips/2001/tt0130.html], January 30, 2001, by Stuart Halloway.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ca5f6adee4c09b2-c676733a-496f4ac1-8698b8d1-892990846e81fb84a8ab6c7c"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
\[Harold 1997\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="979df9be0811fad6-4fa4f9f9-425c4adf-9fd2b633-cc5ced45f9ea8cd3b2dc1c0d"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
\[Harold 1999\] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9becd0b80610c0c-728f3517-4a454cc3-a709a5df-dd5431eb86f24f80469570b5"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
\[Harold 2006\] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39318605d6c33c0c-e0a0ada9-4b3a4a9e-84d29659-9bed39aac14daeb7fced1311"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
\[Hawtin 2008\] [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf] by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3bbe2aa49ecb1d1-76e7f082-4a674f62-ae42a4a3-689d9d84bf725d19cfffdd42"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
\[Henney 2003\] [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e9f9e8488dd0b3c-f9b64985-47ce41d6-9bd98732-34b009b24a18cbe2576d6f1a"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
\[Hitchens 2002\] Java™ NIO, by Ron Hitchens. O'Reilly. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="acc8a0987e33eed7-206899c7-43814914-a3cd8125-86c853e1993a84f536cc0f22"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
\[Hornig 2007\] [Advanced Java™ Globalization|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2873.pdf], by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33cd2fe3fc01d69f-dc8cb13e-4254400c-a774851c-d3b764981d03de178d321eaf"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
\[Hovemeyer 2007\] Finding more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7db9187c75d7d084-3b04ad23-4ea04da9-b8bcac9f-2c7cbfefdfce0f802ef27b31"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
\[Hunt 1998\] Java's reliability: an analysis of software defects in Java, by J. Hunt and F. Long. Software IEE Proceedings. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6465fef4aa07d84a-d6fc0f58-4e524fbf-8168b159-795462753c1d6b4e21384616"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
\[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb39dc6bf17f9852-62efbce7-468846a0-94c4aab8-20fd2e55bdd3d15ac04a37d3"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
\[IEEE 754 2006\] IEEE. [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4ed8ab56d9d63bd-519fe726-472e4541-81ffb139-da1f8861e162930a77976b23"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 2000\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/], Sun Microsystems, Inc. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e96c22d7adab873-0da60258-4c524d6a-84228c82-334f21f7dbd974bf2c008a25"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
\[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html], Sun Microsystems, Inc.  (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89528b68dd863144-a59c034e-4f5b4724-9fc6bfc1-6916a7c06e76371f370dfb1e"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
\[Java 2006\] [java - the Java application launcher|http://java.sun.com/javase/6/docs/technotes/tools/windows/java.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="578c2541e940b907-3f62499b-43a7486c-813c856b-85f57fcb5bae502ada84e778"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
\[Java2NS 1999\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68e487163ea11471-731cbca8-409b45f0-8220a3e1-d865372cc40921dacc1142aa"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
\[JavaGenerics 2004\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems, Inc. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66a912e30ab34436-a324bc68-4c6c42c2-86edbe10-04049025767f971025c15ae2"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
\[JavaThreads 1999\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="767d6e11625c0156-1c4fa678-437e44ee-8baea3e5-739af59dc76304914d74482b"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
\[JavaThreads 2004\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5e0f8d9d2cc2c50-490c4de6-482a4f92-9083a5ca-bd061a4e17403602b0f2a34b"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
\[JDK7 2008\] [Java™ Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], Sun Microsystems, Inc., 19 Dec 2008. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="078e1a6ec9d188d8-2ee24ab6-4ed74ae9-a9a3a392-b1841732747e2940911c314b"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 2005\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd058499f62af468-45ed1123-478e45d3-a1fdaaea-963d34b16978275c9a49bd04"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
\[JLS 2011\] Java Language Specification: Java SE 7 Edition. by James Gosling, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Oracle America, Inc. [The Java Language Specification.|http://download.oracle.com/javase/7/specs/jls/JLS-JavaSE7.pdf] (2011)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87dd082986cf9697-d1cd6fe5-474e4e4f-b90e801d-7df5dcce0e237a4b0c429fb9"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
\[JMX 2006\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf025d95cd291e55-ff33e6da-42f742ad-81d8928a-0ab76292b1b8717d860395da"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
\[JMXG 2006\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d4e62c775443c38-fbd2bf73-4b204e56-a2dfa701-80a20c492e096b4a13790e9d"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
\[JNI 2006\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1cce40c3aa2d8231-cb9b0369-40864a59-a6f5bb57-bdae9c0e47fcce97d0a62363"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
\[Jovanovic 2006\] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29], Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e964f30532794242-fb550aab-45af4fbd-9a04b76f-c6f6a95d6991e38670b3f28b"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
\[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f4f0064df85e51f-f25cbc1b-44d64817-8de2a1ef-ab5d184daf8ab7b5917fff2f"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
\[JPL 2006\] The Java™ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66036fed597d46a8-bb2f83a1-4cb4463d-97b4ac7b-c898057ae5a98188409097a0"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
\[JSR-133 2004\] [JSR-133: JavaTM Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf]. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7cd67deea69e900-49803b0c-4b824af3-bd09876f-fdd21e1d349fd1c9bc583d4b"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
\[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b37e97781ce71559-d5e350a6-43474a56-8914a368-a02cd086722295676adf635f"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
\[JVMSpec 1999\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c11270370ce29414-61560080-4efa40a5-90d8b4bc-ec67fc0f0700771c39706277"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
\[Kabanov 2009\] [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a0b47e4fee44254-3893d8bf-47994259-b266b2cc-da847b5d6d6fe96511e60795"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
\[Kabutz 2001\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55927df8ff4fa925-5daec32d-4d1c450c-985b8abc-862dd04239845dd29f6ab9e1"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 2004\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing.  (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a5646898f890617-f26e8e96-46a84bf4-b5c6a7a4-38edc670b13e6838955ba3b5"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
\[Knoernschild 2001\]  Java™ Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001)

...

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5cbfc2348e85471-3449f610-43fb40cb-806f9e01-0eaaa81b3b9142d4dfbdf5a8"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
\[Langer 2008\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3cb386c7a7933cbb-5f7188f7-40b54634-80bd9956-bac641da7c4f748c91300d38"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 2000\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7688cc710b75ee93-76daf060-4c524d31-81cdbdd4-e2cf099c7b5f27fc9069510a"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
\[Lea 2000b\] [Correct and Efficient Synchronization of Java™ Technology based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf], by Doug Lea and William Pugh. JavaOne Conference. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc7633eb90499005-5d3acb52-4b574c6e-99849b35-57280f956ccaa7cf1bafda34"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
\[Lea 2008\] [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html], by Doug Lea. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e955b47666cfa66-e43d937e-46a049eb-b97fae6d-ff5c1d1475ff6ec484d2423d"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
\[Lee 2009\] [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf], by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5cd1733a988913f-ee2f397b-49d044a8-91559928-aeef4e4bcf19b4225dbc50e3"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
\[Liang 1997\] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d2b259517c83689-b506df83-482441cd-97518fb5-5a988d95e783aa23d060f40f"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
\[Liang 1998\] [Dynamic Class Loading in the Java™  Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945], by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="994db22ed2256b96-83db67dd-433f4591-ac9c8d2d-4773aa8ceffc2c244436460e"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
\[Lieberman 1986\] [Using prototypical objects to implement shared behavior in object-oriented systems|http://portal.acm.org/citation.cfm?id=28718]. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb2bb0660371f295-c45fefe7-482f4a88-aab1bd71-b76b4078b86e30195af42eb3"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
\[Lo 2005\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fed788f92eacd724-fe7e14c4-401d44f5-96b99ead-9fd4feffac16e54ec5ff429d"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
\[Long 2005\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f27ace596efb2fc-bedd5470-4578452f-b3ecb312-7fbc456410b6c380733ad5ed"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
\[Long 2011\] The CERT Oracle Secure Coding Standard for Java, by Fred Long, Dhruv Mohindra, Robert C. Seacord and Dean F. Sutherland,  Addison-Wesley, SEI Series in Software Engineering. (2011)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54659f1597af71b2-58420944-4e064184-b7f9bb94-e723f449f9453d78d0d9ec43"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
\[Low 1997\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="025596c187391b4b-a0e04725-40a14bea-89f48113-9811d8be918d995fa88876ce"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
\[Macgregor 1998\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e316db840d2785a3-9dac7b95-4af2427d-bad79614-072ecf8f5a12c46941b56899"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
\[Mahmoud 2002\] [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/], by Qusay H. Mahmoud. Oracle. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94c39ee20d8019d0-2c62bc15-41484c93-9856b653-aed15c816eb774b342e9a3a4"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
\[Mak 2002\] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d5581f121854bc1-d827f3da-43c6464e-9858ad25-cab59dbfc1d1e59334e7bb28"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
\[Manson 2004\] [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight], by Jeremy Manson and Brian Goetz. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5a7f82c065d74cd-3d39c5bb-42a549ee-97d8bf8d-cbafd697ececb1d338ab8bf5"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
\[Manson 2006\] [The Java™ Memory Model: the building block of concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf], by Jeremy Manson and William Pugh, JavaOne Conference. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90ea4a86f28adfee-0548ac45-49a441a9-96738611-9c60cdc17ab22e7abbfb438f"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
\[Martin 1996\] [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf], by Robert C. Martin. (1996)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e358a5ab136f676e-ff04c9c3-4e394c25-a1a8a47f-8068b8c857b09e78465cec52"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
\[McCluskey 2001\] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b6126f54d710a9f-d32eaf3c-42784d39-8c05aa0d-6e5c9988736254e58c916354"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 1999\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40cf645f13b8b7f6-e1653a10-452a4c54-8b9ea7f2-741b0136ebe29b3ef660bacf"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
\[McGraw 1998\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary McGraw and Edward Felten, JavaWorld.com. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec5139a0bc3157d3-5a739e09-4fc74273-b2d8bfe3-99ee2eca524cdf56d86849f9"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
\[Miller 2009\] [Java™ Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf], by Alex Miller, Terracotta. JavaOne Conference. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8155887cc60933a8-b979a25e-404e46f8-9d7bba08-f38ba93f82e39cde07fd90f2"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
\[MITRE 2009\] [Common Weakness Enumeration|http://cwe.mitre.org/], MITRE Corporation. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3cdbf9de9aeb7e1-a00dc911-415841ae-9f348bea-8941f1a8f9dcfcb689389ad5"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="935f1694e8714a7f-05c04e74-488a4be9-b6cbb0b9-b6f22eb38b6bcf9241f6d2b8"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
\[Monsch 2006\] [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p] Version 1.0, by Jan P. Monsch. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d5424bf60c76565-66361bca-46504875-a009a377-fe5db9184344fef23be43274"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
\[MSDN 2009\] [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx], Microsoft Corporation. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48d19275e30a0cc7-62cd2199-4a344210-8430ba60-725fd2222db1bff60314324a"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
\[Muchow 2001\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="746f7d664bcad8b6-d68fc86f-40d343e0-af96b45d-a36fe99aad59223ab823aae7"><ac:parameter ac:name="">M&amp;#xFC;ller 02</ac:parameter></ac:structured-macro>
\[Müller 2002\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20ad1253c44a48b2-3c612e12-41284357-8925abfb-f4090f01b303dd68f1bc66eb"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
\[Naftalin 2006\] Java Generics and Collections, Maurice Naftalin and  Philip Wadler, O'Reilly (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7052cee179bf9bdf-4ca465af-43dc4c8c-b941b54b-7733be3cb660f5d0e815439a"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
\[Naftalin 2006b\] [Java™ Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a412cb683c79a65-54f00fb2-488f4da4-9632b385-4404a6aaffde65cc4ccb3947"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
\[Netzer 1992\] [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623], by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin --- Madison. (1992)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8ffae41a74524d8-67873308-43ba4c33-b24c9c32-42328d03b3a56b19f065ea96"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
\[Neward 2004\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5066a55487021938-b426d6df-432344ce-881d9094-374516c62b8164a480720359"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
\[Nisewanger 2007\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14d5cc794e93cfbd-89637343-423c4f18-86a7897c-cadf4f7afb7c9a40cdaff640"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
\[Nolan 2004\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="649f0f63736769c6-c4f132d2-4f3d49fc-8f83bd31-e91cb0f4c3bd0e93c1484b42"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 2001\] Java Security, by Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4672586c71d95d8-ffa962c9-40fd4bca-a693b0fd-48aee8f49dde28951b9ce358"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
\[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://java.sun.com/javase/technologies/hotspot/gc/gc_tuning_6.html], Oracle Corporation.  (2010)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="150c4d299d32577a-6ec80a37-486e4191-bb238803-3aa1c9dfc4a2a8593de01ca5"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
\[OWASP 2005\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="985670669a9f837a-cada7b1e-4b974bd8-b4cf9092-a304ccc7db0acc5201f46506"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
\[OWASP 2007\] [OWASP TOP 10 FOR JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf]. The Open Web Application Security Project. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07f6e3bb282a79ee-e2d2f78a-4fe44707-8bb195d1-0e50fe0d3c064e3edfff013a"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
\[OWASP 2008\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5a57c91fac624a4-19ea3fae-45b74018-b4708211-efd22d343ec0b67d3837be73"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
\[Permissions 2008\] [Permissions in the Java™ SE 6 Development Kit (JDK)|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html], Sun Microsystems, Inc. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="123477568e057e19-82d1365a-44824d62-a4c0af4c-880697e75ecd883d79996096"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
\[Philion 2003\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3292cd3bc951cea-06bd02b3-41c84d70-9751abb1-c7d5b82544d2bfa42a4aa0a5"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
\[Phillips 2005\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c702eb03726d5dd-c4392d03-417e49b7-ad439b8b-c5cd086572063cc85d80fbd3"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
\[Pistoia 2004\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="93537fdc1e839d6a-cfc097d1-401e4b31-8a69ab77-12a44534c8dc07e056d362aa"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
\[Policy 2002\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="526f63a8bf6742b0-a7d00939-491b4bd7-86429e41-e4cd3b4ab743084dbb3fcbef"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
\[Pugh 2004\] [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/] by William Pugh, Univ. of Maryland. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c6e29d03521eaac3-d190f3ae-4a52482b-a8b2b2d2-6b9dcd028da8ca42fadc47de"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
\[Pugh 2008\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89cef6a93bc43fde-bf819184-4fd94bb3-8bf0ab45-c18a71d14a9aa38b0c5988e9"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
\[Pugh 2009\] [Defective Java Code: Mistakes That Matter|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5335.pdf], by William Pugh, Univ. of Maryland. JavaOne Conference. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66384580a86ad23d-8f856af1-4fa345d5-9856b22f-4695582a69f771c9096516aa"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
\[Reasoning 2003\] [Reasoning Inspection Service Defect Data Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf], Reasoning. 14 Nov 2003. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a797f8673c4db3db-309be165-4a414424-af7cb88c-98850c156848ccd32c994ee1"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
\[Reflect 2006\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13dcd77dd665a160-193c98a2-42e94cac-a61598fd-1a9667e8e2271cca85f5f631"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
\[Rogue 2000\] [The Elements of Java Style|http://www.ambysoft.com/books/elementsJavaStyle.html], by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b8cbaa24266b69e-a16eb52b-4e1f4d00-8832862b-48d4c84d533abe6ab80a09b4"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
\[Rotem 2008\] [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf], by Arnon Rotem-Gal-Oz. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ff4088fefa32f4f-7007cd59-47d64b69-91d1b2bf-b0ab0db40a0ef5ba32fdf13b"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
\[Roubtsov 2003\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com.  (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40512fa7f1a233bb-01e092e6-45eb4750-a24c9d4b-fd3c977ec0ec9c7434a96dbb"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
\[Roubtsov 2003b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com.  (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7670e6df9e3fdf5-b6523126-46204db3-a32ba9b0-23e99b07a9c2b8dcdb47a7a6"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
\[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="728419bbeb321276-224d4b5b-465d484b-a035b342-ba13f56afc4bc860f8915114"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
\[Saltzer 1975\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4af4866d97cbedc9-e5a95958-463f4900-8c86926b-d5ef30a1aa0e63b3c9f49cee"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 2007\] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67561eea84339645-159ffed5-4164436c-872eba19-af63bc3b61b98d66b55e31aa"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
\[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|http://java.sun.com/security/seccodeguide.html], Sun Microsystems, Inc. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9861fc8f31aadbd-9ea3315d-439048af-9d6aa69e-4944296e30f964213f80abad"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
\[Schildt 2007\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dacc200462bb1e6e-316970c9-4ac94cb4-8a2397cc-073ddb9f7b788d3a609d68c4"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
\[Schneier 2000\] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95ba8ad4f214ccf3-0ae311ee-480f48fa-9166837d-5b32c8aca5833211b41efa5e"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
\[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54  BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="941d76a334b84dd1-77939b93-48774385-beaab157-e6e2e3f2d7118fbf49c044bc"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
\[Schwarz 2004\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9de1a6a5eec2a7b7-06713e92-46e84342-aac2841c-0cacebba9a005a2ee6896b2c"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
\[Schweisguth 2003\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by  Dave Schweisguth. Javaworld.com. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="70ea3ba17baf9193-de79cdfd-45e14b89-b6dca8ec-67dd1966427c303aa0dc16d1"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
\[SDN 2008\] [SUN Developer Network|http://developers.sun.com/], Sun Microsystems, Inc. (1994-2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6d3300b942a742f-42ae92ae-4f8745e5-b1708903-17f7ea3ffd36d8681578c304"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
\[Seacord 2005\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005)
See [http://www.cert.org/books/secure-coding] for news and errata.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6853bba516938ed-381dec82-435c4822-9abea343-062c8e533c5c4694d16bdd56"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 2006\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a7d55f82bb37aea-e6bf8035-47b94447-9c5eaef7-bc01b826b43f8d004648686f"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 2006\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd389f549659fd8d-ed492d5a-4c744bb2-a9068d3b-69d6a2391fe511295449ab37"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
\[SecuritySpec 2008\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html], Sun Microsystems, Inc. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f26e34d5c4ff371-64f0140b-4e2a4227-bbb884b5-f8727919a04d0f8adb5b3eca"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
\[Sen 2007\] [Avoid the dangers of XPath injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html], by Robi Sen, IBM developerWorks. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22c2ba4b522d1c40-f0bc141a-4a204996-b50490bf-73bb86235bd44c7fd9838559"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
\[Steel 2005\] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b00ed54c35588ea-8e9b3d90-4da846f1-952c9cbe-a550f1fdf7af1bc46445540a"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
\[Steele 1977\] Steele, G. L. "[Arithmetic shifting considered harmful|http://doi.acm.org/10.1145/956641.956647]." _SIGPLAN Not._ 12, 11 (November 1977), 61-69.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b224badf18dac2aa-29974192-4b0c4f62-bb2a8d02-bf9c922ddcbddd8f3c36efba"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
\[Steinberg 2005\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], Daniel H. Steinberg, January 4, 2005. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7350c972e099b452-1a1a6310-41f54037-9d1299b9-5c0742ca7beb41eb5a9bbecc"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
\[Sterbenz 2006\] [Secure Coding Antipatterns: Avoiding Vulnerabilities|http://gceclub.sun.com.cn/java_one_online/2006/TS-1238/TS-1238.pdf], by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3e0649757cb0b1d-ef907755-4e97409d-b298a7ec-257356f78440dae4258810b8"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
\[Steuck 2002\] [XXE (Xml eXternal Entity) attack|http://www.securityfocus.com/archive/1/297714], by Gregory Steuck (www.securityfocus.com). (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f096917fcc82d32f-509dc6e6-44d14132-b58d89df-bbd5475f0f1743c1438b9b9d"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
\[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://java.sun.com/j2se/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html], Sun Microsystems, Inc. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee64fa4e911b11fe-97f8bb72-4da741c0-8201ac2d-9027e9ef372a417b1193dec6"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
\[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/], Sun Microsystems, Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e8228673768decd-6c16918c-4d35431b-a93d80ba-2fcfa47f9a9266d050fa6ea2"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
\[Sun 2006\] [Java™ Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75c3cb1279e9b234-3efc5a9b-49cd4b06-958ebb06-b05673acec5922b80ed6e960"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
\[Sun 2008\] [Java™  Plug-in and Applet Architecture|http://java.sun.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html], Sun Microsystems, Inc. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="787df867f7e7da19-c4dbafea-43224dc3-b50e8757-fdd358d841503552bedf2bf5"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
\[Sutherland 2010\] [Composable thread coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485], by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80d40b9cbce35ab8-834342ba-4b9743b1-99abbb2d-13de0b16161b73ab0f3faa38"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
\[Tanenbaum 2003\] Andrew S. Tanenbaum, Maarten Van Steen. [Distributed Systems: Principles and Paradigms, 2/E|http://www.pearsonhighered.com/educator/academic/product/0,,0132392275,00%2ben-USS_01DBC.html]. March, 2003. ISBN-10: 0132392275.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c0aa71caa8f6698-51f08484-47a14e26-887090ac-c1a56bc4fe8b7b4d2ce80aa0"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
\[Techtalk 2007\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea761da10e32b31a-98006bae-499244b6-bc7c98ab-7fa46be42dba2d2562d11aa1"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
\[Tomcat 2009\] Tomcat documentation, [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security fixes|http://tomcat.apache.org/security-6.html], the Apache Software Foundation. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="652f928ce7b68842-9c665d0e-4033402f-bb80b9f0-30887fedb9962d332acc5787"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
\[Tools 2011\] [JDK Tools and Utilities Specification|http://download.oracle.com/javase/7/docs/technotes/tools/index.html], Oracle Inc. (2011)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1ed68043ade6ec9-e1a58894-46974898-b211947d-0b0aa23cd4731466af88413f"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
\[Tutorials 2008\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html], Sun Microsystems, Inc. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="153391e2de8129b5-121626a7-447e46bf-945c8782-87bdf6156c1a63871ec20a13"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
\[Unicode 2009\] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: [_The Unicode Standard, Version 5.2_|http://www.unicode.org/versions/Unicode5.2.0/], Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="486bb14c5f95beec-e6d3e68e-4872458c-a5529391-43ecce5574d66d336fc3b99a"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
\[Venners 1997\] [Security and the class loader architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1] Java World.com, by Bill Venners. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9783cc946c854b14-06b1de87-48f1409e-8e58ac16-2901a0075fba4c669960cc49"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
\[Venners 2003\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10c78773f92ed24d-b21db5be-40cf4b8e-bcb89e24-a41ecaf4e8dba0e7ffc8969c"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
\[W3C 2008\] [Extensible Markup Language (XML) 1.0 (Fifth Edition)|http://www.w3.org/TR/REC-xml/#include-if-valid], W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b6cddfd6a41e841-d62d8d30-41d44313-ad7d9cbf-ff4e63d2e9fc66afd7c65d4f"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
\[Ware 2008\] [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/], Michael S. Ware. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79bba5a2d03c6a32-52e2343c-4acb44e2-8614b078-2d95e4805e559f9a3d03758d"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
\[Weber 2009\] [Exploiting Unicode-enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf], by Chris Weber, Casaba Security. CanSecWest March 2009. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fb890debbd8b0fa-60481dc4-4fc641ae-a056a5f9-d8dfcdc053c0d4e3a3e3c848"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
\[Wheeler 2003\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02c3f4ed6549f9ae-f0002f7e-4e9c4b76-961b8f3b-a7a656be878de11b1719f619"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
\[Zukowski 2004\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], John Zukowski, May 18, 2004. (2004)