Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58c0e75b34166ccd-985db233-499d4036-8e72b0ef-61d92666442237495a958542"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ab53e44c85601cc-91d52842-49b04472-8d6f98fe-68d1f5e708db021a9710d140"><ac:parameter ac:name="">Bloch 05<01</ac:parameter></ac:structured-macro> \[Bloch 05\01] Java⢠Puzzlers: TrapsEffective Java, Pitfalls,Programming andLanguage Corner CasesGuide, by Joshua Bloch and Neal Gafter. Pearson Education, IncAddison Wesley. (20052001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca16d38f69b7868f-b89451c2-4c7b4c1a-81f5b929-ebe7688227a556b4e22c456c"><ac:parameter ac:name="">Bloch 08<05</ac:parameter></ac:structured-macro> \[Bloch 0805\] Effective Java, 2nd editionJava⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Addison WesleyInc. (20082005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="732c2840f64a8025-81d055a8-4a944a39-854d89e1-0a159e894d3b139699e57334"><ac:parameter ac:name="">Campione>Bloch 96<08</ac:parameter></ac:structured-macro> \[CampioneBloch 9608\] [TheEffective Java, 2nd Tutorialedition, by MaryJoshua CampioneBloch, and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9e0c779ecb10a67-2f317f23-487b42b2-899cb21d-8b0a5406fcb6b56943b65a85"><ac:parameter ac:name="">Chan>Campione 99<96</ac:parameter></ac:structured-macro> \[ChanCampione 9996\] [The Java ClassTutorial, Libraries:by SupplementMary forCampione theand Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e459005be92c638-0d76bc82-4f15433c-bba4a58d-ac0fd93789f4284a706712d3"><ac:parameter ac:name="">Concurrency>Chan 06<99</ac:parameter></ac:structured-macro> \[ConcurrencyChan 0699\] The Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006 Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="391f6ff6dda47dbc-0aac8c01-490e4778-9eafb5af-c7edbcf9547db4cc6524f8c6"><ac:parameter ac:name="">Cookbook>Daconta 04<03</ac:parameter></ac:structured-macro> \[CookbookDaconta 0403\] More Java CookbookPitfalls, by Ian F. Darwin (2004 Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9466a5cc64e20aed-dc94efa8-4ede4a65-b6c39698-a3f57c22f431cc0f14e48346"><ac:parameter ac:name="">Doshi>Darwin 03<04</ac:parameter></ac:structured-macro> \[DoshiDarwin 0304\] [BestJava PracticesCookbook, forby Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ff8edd218c1794c-ecc0cee9-4c5e41c9-aa57bae1-bf7e46688f32b41321f1b997"><ac:parameter ac:name="">EJPLG>Doshi 01<03</ac:parameter></ac:structured-macro> \[EJPLGDoshi 0103\] Effective[Best Java,Practices Programmingfor Language Guide,Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Joshua Block. Addison WesleyGunjan Doshi. (20012003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9df19b8ffb3333c-ae1781c9-42ab4620-816c92a8-fe37358f9fc745c530a971c9"><ac:parameter ac:name="">EJS>Enterprise 04<03</ac:parameter></ac:structured-macro> \[EJSEnterprise 0403\] Enterprise Java Security:Enterprise Building Secure J2EE ApplicationsBest Practices, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c8b0ef219ac25cf-c0f2dec5-499941f1-9607b9e2-7104f4196d36659027a46132"><ac:parameter ac:name="">Enterprise>FindBugs 03<08</ac:parameter></ac:structured-macro> \[EnterpriseFindBugs 0308\] Java[FindBugs Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f0fa215726f136e-3244ffd7-43cd4760-8aeebc95-ddfbe5bbd7398c9ac6128925"><ac:parameter ac:name="">FindBugs>Garms 08<01</ac:parameter></ac:structured-macro> \[FindBugsGarms 0801\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008 Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8eaa10d5e546456-f14c5bbf-4b754ef6-ace4a13a-d2e8f1bc7641a7a423ace955"><ac:parameter ac:name="">Garms>Gong 01<03</ac:parameter></ac:structured-macro> \[GarmsGong 0103\] ProfessionalInside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, JessGary GarmsEllison, and DanielMary SomerfieldDageforde. Prentice Hall, WroxThe PressJava LtdSeries. (20012003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d8cfa8e4f0363b9-60f151c1-4344469d-a9cb8f9a-4ceb3e061e8cf711e89969bd"><ac:parameter ac:name="">Gong>Green 03<08</ac:parameter></ac:structured-macro> \[GongGreen 0308\] Inside[Canadian Mind Products Java 2& PlatformInternet Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
unmigrated-unmigrated-wiki-markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="913d97d5572a7e32-9597201a-401242ad-99f9bbf9-f873addbe308d2b69f31ddf3"><ac:parameter ac:name="">Green>Goetz 08<06</ac:parameter></ac:structured-macro> \[GreenGoetz 0806\] [CanadianJava MindConcurrency Productsin JavaPractice, &by Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffc973d706a0826d-b560bd78-40d043ac-83e492b5-04a8cc1145f3515d6ab6ab5c"><ac:parameter ac:name="">J2SE>Harold 00<97</ac:parameter></ac:structured-macro> \[J2SEHarold 0097\] JavaTMJava 2Secrets SDK,by StandardElliotte Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0d72146e5a2a631-c95c9e40-47524e79-bc5bbb3d-f1988e0542043a96e1291d88"><ac:parameter ac:name="">JLS>Harold 05<99</ac:parameter></ac:structured-macro> \[JLSHarold 0599\] Java Language Specification, 3rd edition.I/O, by JamesElliote Gosling,Rusty Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39fe1b48-990a-4375-b6f0-cb45113b6161"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/books/jls/index.htmlguide/] (20052000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98635429105ea9f6-db619ce3-458c49d8-8b148c85-9e3add8654055265e980223b"><ac:parameter ac:name="">IO>JLS 99<05</ac:parameter></ac:structured-macro> \[JavaJLS I/O05\] Java Language I/OSpecification, by3rd Ellioteedition. Rusty Harold. O'REILLY. (1999)by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac: |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1f5973205286d50-5a38b2b2-4e994a70-89aa95d3-5649570c4dfc7bfa77d56131"><ac:parameter ac:name="">JNI>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[JNIKalinovsky 9704\] The Java⢠Native Interface, Programmer's Guide and SpecificationCovert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by ShengAlex LiangKalinovsky. SAMS ADDISON-WESLEYPublishing. (19972004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fc1c379fa6babbb-a078219a-4a3f4aea-9cccb8f3-cea28efefba55a9a58650c15"><ac:parameter ac:name="">JNS>Lea 98<00</ac:parameter></ac:structured-macro> \[JNSLea 9800\] Concurrent Programming in Java, Network2nd Securityedition, by RobertDoug Macgregor,Lea. DaveAddison DurbinWesley, John Owlett and Andrew Yeomans. Prentice Hall. (1998Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37a693afd343638a-acdad93c-49604f44-8ce5939e-3708e5094dac2d9402e40da5"><ac:parameter ac:name="">Kalinovsky>Liang 04<97</ac:parameter></ac:structured-macro> \[KalinovskyLiang 0497\] CovertThe Java:Java⢠TechniquesNative for Decompiling, Patching,Interface, Programmer's Guide and Reverse EngineeringSpecification, by AlexSheng KalinovskyLiang. SAMS PublishingADDISON-WESLEY. (20041997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21e393e94cf106be-3c54b8f2-4a8b4fcf-a3438e42-bd77e407a1f426ab8ee4ddbd"><ac:parameter ac:name="">Lea>Low 00<97</ac:parameter></ac:structured-macro> \[LeaLow 0097\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000[Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccbce1624b632793-afeed7da-4a55467d-9084829e-657616ad29c8fbd5840d737d"><ac:parameter ac:name="">Low>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[LowKalinovsky 9704\] [ProtectingCovert Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5f053819b160e16-1fda8554-4e924a40-b45495cf-45d1cc7d861186509e7316fb"><ac:parameter ac:name="">Kalinovsky>McGraw 04<99</ac:parameter></ac:structured-macro> \[KalinovskyMcGraw 0400\] CovertSecuring Java:, TechniquesGetting forDown Decompiling,to Patching,Business andwith ReverseMobile EngineeringCode, by Alex Kalinovsky, SAMSGary McGraw and Edward W. Felten. Wiley. (20041999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d06dee8790a3fd74-b066de73-426344f5-a89eba5d-7afb743c8aeb1e4f8fa68a41"><ac:parameter ac:name="">McGraw>Macgregor 99<98</ac:parameter></ac:structured-macro> \[McGrawMacgregor 0098\] Securing Java, GettingNetwork DownSecurity, toby BusinessRobert withMacgregor, MobileDave CodeDurbin, byJohn GaryOwlett McGraw and EdwardAndrew WYeomans. Felten.Prentice WileyHall. (19991998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cff6eec1986847fc-488dc629-49114707-a182b5d9-70a49ef4c4cfd7a91b55d80d"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b49b25e9efdba67-3f63c2da-4ce74cac-98049380-91cd77d397afc2579efb12ca"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1499b07dc278ba26-fdaa32ab-48654520-b56ab84f-a9274458b874fd9356c21950"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be1fbbb0eb9a59e2-21e7aa11-4efe485f-8b29b583-15c5c6bce5eae449bf1b3936"><ac:parameter ac:name="">Patterns>Pistoia 05<04</ac:parameter></ac:structured-macro> \[PatternsPistoia 0504\] CoreEnterprise Java Security Patterns: BestBuilding PracticesSecure and Strategies for J2EEâ¢J2EE Applications, Webby Services, and Identity ManagementMarco Pistoia, byNataraj Christopher SteelNagaratnam, RameshLarry NagappanKoved and RayAnthony LaiNadalin. Prentice Hall PTR / Sun MicrosAddison Wesley. (20052004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a73d389e48795ded-82f90021-41b14e88-b42eb296-70eaf5d266343ca712e88224"><ac:parameter ac:name="">Pitfalls>SCG 03<07</ac:parameter></ac:structured-macro> \[PitfallsSCG 0307\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003[Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e5b8d20e343684fc-3435e1e7-42c04c54-a75581d4-0e4bf612c1ee8964f85bf873"><ac:parameter ac:name="">SCG>SecArch 07<06</ac:parameter></ac:structured-macro> \[SCGSecArch 0706\] [Secure Coding Guidelines for the Java Programming2 Language,Platform versionSecurity 2.0Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/seccodeguide/spec/security-spec.doc.html] (20072006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16d6bee084a7e31a-a09d0a67-43714ee2-bd59bac8-431153f81a5babe305ecb626"><ac:parameter ac:name="">SecArch>Security 06</ac:parameter></ac:structured-macro> \[SecArchSecurity 06\] [Java 2 Platform Security ArchitectureGuides|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="422f45042153ac85-17670cdc-4cb048b3-a010816d-55462c9bcaaa5c847599f789"><ac:parameter ac:name="">Secrets>Steel 97<05</ac:parameter></ac:structured-macro> \[SecretsSteel 9705\] JavaCore SecretsSecurity byPatterns: ElliotteBest RustyPractices Harold.and Wiley. (1997) |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72db82a5-1a8c-4feb-a120-c0a7ffd5b512"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a301bf366a7228c4-a83aa1de-4c4d4121-add0abda-b4f7f56b0501a23f8e34ef2c"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |