Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8de6bc1e3ccc8ab-ea40490e-48f8477f-8af291d1-8c9e46e3df3818782f65f63a"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a4010768ae2dd52-3f32fcbe-40524d8b-baa891d6-49a66fcee32b415f6d407c60"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e443387d950c7b8-bf9a946c-45e94068-a343afc5-6eaca42891faf71b2275c04d"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="848fa5c964b11aaf-a1667a17-4e894f31-bdc5bb55-3a6317b7da3f2ccae1bbb5c0"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be88ab97295fa498-2d974c2c-42204846-80f887ca-9d882afe6ce7454b1844fe81"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="533f0d658cc1335c-06cadc70-4cfb401d-abe08f37-a968711f666f6d0144374b21"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro> \[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60f0694a2c1f0594-58603d13-4843439e-80eba22f-60460d0f51575542bb3750f5"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro> \[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7526b43ce4cf2b0-70044db4-4951406d-bc87ad2a-61827508dc5fbbb7fc5c0985"><ac:parameter ac:name="">EJPLG>Doshi 01<03</ac:parameter></ac:structured-macro> \[EJPLGDoshi 0103\] Effective[Best Java,Practices Programmingfor Language Guide, by Joshua Block. Addison Wesley. (2001Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3af6119007186f23-613b1735-49004bff-9555a5e7-6dd46223b40d9f35253317fc"><ac:parameter ac:name="">EJS>EJPLG 04<01</ac:parameter></ac:structured-macro> \[EJSEJPLG 04\01] EnterpriseEffective Java, Security:Programming Building Secure J2EE ApplicationsLanguage Guide, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony NadalinJoshua Block. Addison Wesley. (20042001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11ed460daee231e4-2a6ef6ba-4b774920-ac4c97f8-a277628c628a4e7b6b95071f"><ac:parameter ac:name="">Enterprise>EJS 03<04</ac:parameter></ac:structured-macro> \[EnterpriseEJS 0304\] Enterprise Java Enterprise Best Practices Security: Building Secure J2EE Applications, by the O'Reilly Java Authors. O'Reilly. (2003Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6953ca079f54c59-9a57c741-47e240c0-ae3bb3a9-a5c1e0692c622bd5b9ea7289"><ac:parameter ac:name="">Garms>Enterprise 01<03</ac:parameter></ac:structured-macro> \[GarmsEnterprise 0103\] ProfessionalJava Enterprise JavaBest SecurityPractices, by Jessthe GarmsO'Reilly andJava Daniel Somerfield. Wrox Press Ltd. (2001Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c589a9cc61ece666-62cb9149-44bd480e-976e8d22-0f3d3d9217b249aded97a7cc"><ac:parameter ac:name="">Gong>Garms 03<01</ac:parameter></ac:structured-macro> \[GongGarms 0301\] InsideProfessional Java 2 Platform Security:, Architecture,by APIJess Design,Garms and Implementation,Daniel 2ndSomerfield. edition,Wrox byPress Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82f16e0f7e620dc4-f2f81e20-423649ee-bb8097cd-a97f9ce7d054f0eb39f362a0"><ac:parameter ac:name="">J2SE>Gong 00<03</ac:parameter></ac:structured-macro> \[J2SEGong 0003\] Inside JavaTMJava 2 SDK,Platform Standard Edition DocumentationSecurity: Architecture, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="350f3d61-c5cb-4f2e-9f72-b092a94ed9fb"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c55e408c-a9e6-46eb-8c12-48b00847729a"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3cd96455-9d8a-46f5-9949-410371bad4b3"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8453c372742e1197-f0ca9e08-4cf64924-9ca58886-ef2292fb3f1df5dc24bf0a0e"><ac:parameter ac:name="">JLS>JNI 05<97</ac:parameter></ac:structured-macro> \[JLSJNI 0597\] JavaThe LanguageJava⢠Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1ebcc53d5922aee-b53c86f8-41224c83-bebe8222-6069378c9b8b6b07336f71d4"><ac:parameter ac:name="">IO>JNS 99<98</ac:parameter></ac:structured-macro> \[JNS 98\] Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999 Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94d5d41dae1f0aa2-21c5cf18-4fc84c56-beca9b98-21c3680b5592d9fad936d9bb"><ac:parameter ac:name="">JNI>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[JNIKalinovsky 9704\] Covert TheJava: Javaâ¢Techniques Nativefor InterfaceDecompiling, Programmer's Guide Patching, and Reverse SpecificationEngineering, by ShengAlex LiangKalinovsky. SAMS ADDISON-WESLEYPublishing. (19972004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8dc75fb3f49b89f1-420e17ad-4bdd4666-93899e0a-1d764cd876eb938bdf834e11"><ac:parameter ac:name="">JNS>Lea 98<00</ac:parameter></ac:structured-macro> \[JNSLea 9800\] JavaConcurrent NetworkProgramming Security, by Robert Macgregorin Java, Dave2nd Durbinedition, Johnby OwlettDoug andLea. AndrewAddison Yeomans.Wesley, PrenticeSun HallMicrosystems. (19982000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b5eaf34ab13953e-4ced4f82-4a644461-93948bcc-e0bf7f66f7e3d27bfed5863b"><ac:parameter ac:name="">Kalinovsky>Low 04<97</ac:parameter></ac:structured-macro> \[KalinovskyLow 0497\] Covert[Protecting Java: TechniquesCode for Decompiling, Patching, and Reverse Engineeringvia Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by AlexDouglas KalinovskyLow. SAMS Publishing. (20041997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e7e013d0bca7231-ebf86dc3-4abd42ad-b8449999-8d76f7170f338fb6eb9042f7"><ac:parameter ac:name="">Lea>Kalinovsky 00<04</ac:parameter></ac:structured-macro> \[LeaKalinovsky 0004\] Covert Java: ConcurrentTechniques Programmingfor inDecompiling, JavaPatching, and 2ndReverse editionEngineering, by Doug Lea. Addison Wesley, Sun MicrosystemsAlex Kalinovsky, SAMS. (20002004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e2f1c6ed132dd81-4baf8368-4c994e3d-b127a0c3-e26499ed96f8f5b9fbec5e17"><ac:parameter ac:name="">Low>McGraw 97<99</ac:parameter></ac:structured-macro> \[LowMcGraw 9700\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997 Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11968b958f44626f-a45840dd-43ba47b2-8bcc8faf-cb078fb6027c74d7ffa5942b"><ac:parameter ac:name="">Kalinovsky>Mocha 04<07</ac:parameter></ac:structured-macro> \[KalinovskyMocha 0407\] Covert Java: Techniques for Decompiling[Mocha, Patching,the and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5445e53b84f205d-93a61d01-4fa5436c-8ed890f1-729236708c082b9721f226d9"><ac:parameter ac:name="">McGraw>Müller 99<02</ac:parameter></ac:structured-macro> \[McGrawMüller 0002\] [Exception SecuringHandling: Java,Common GettingProblems Downand toBest BusinessPractice with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4eaced98c08bf46-3efeb856-483b48ad-adcd9d07-45302364e230490ce4cb6665"><ac:parameter ac:name="">Mocha>Oaks 07<01</ac:parameter></ac:structured-macro> \[MochaOaks 0701\] Java [MochaSecurity, theby Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="933ca70038c67d15-fda6ca73-4de84ed6-8ab6a1c4-6e2e8126bd292d55e45f635f"><ac:parameter ac:name="">Oaks>Patterns 01<05</ac:parameter></ac:structured-macro> \[OaksPatterns 01\] Java Security, by Scott Oaks. O'REILLY. (200105\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7797b16570a8be6-53e3e5ff-483e4840-b5409109-4f9c411cf99d565385b09cf2"><ac:parameter ac:name="">Patterns>Pitfalls 05<03</ac:parameter></ac:structured-macro> \[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1969db65018ea115-81685d36-4af0449d-978e8085-6adaf4e80a4ff031f59c6a6d"><ac:parameter ac:name="">Pitfalls>SCG 03<07</ac:parameter></ac:structured-macro> \[PitfallsSCG 0307\] [Secure MoreCoding JavaGuidelines Pitfalls,for bythe MichaelJava C.Programming DacontaLanguage, Kevinversion T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (20032.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b10f3724a0a38a2-cf0083e4-496e4985-84f582b0-65c53b9e8c274879d8d7fa1e"><ac:parameter ac:name="">SCG>SecArch 07<06</ac:parameter></ac:structured-macro> \[SCGSecArch 0706\] [Secure Coding Guidelines for the Java Programming2 Language,Platform versionSecurity 2.0Architecture|http://java.sun.com/javase/6/docs/technotes/java.sun.comguides/security/seccodeguide/spec/security-spec.doc.html] (20072006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5d1be31776e4b41-ea57f5a9-45aa42e8-826a97f6-3910fa8103f420e52c04784c"><ac:parameter ac:name="">SecArch>Secrets 06<97</ac:parameter></ac:structured-macro> \[SecArchSecrets 0697\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8f0be68369c2bc5-781bc62c-449242c8-985bb02a-ebe39624247c3f6139e17dd6"><ac:parameter ac:name="">Secrets>Security 97<06</ac:parameter></ac:structured-macro> \[SecretsSecurity 9706\] [Java Secrets by Elliotte Rusty Harold. Wiley. (1997Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="388509cf6791afb4-e7863ac9-473d4161-b1019843-3b3da6976c5fe18cc9db1694"><ac:parameter ac:name="">Security>Tutorials 06<08</ac:parameter></ac:structured-macro> \[SecurityTutorials 0608\] [The Java Security GuidesTutorials|http://java.sun.com/javase/6/docs/technotesbooks/guides/security/tutorial/index.html] (20062008) |