Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0e62d2675e8dcfa-9d6eb65f-45ce4fd5-9ec88d02-4efcf4fde405fc65a4a314ce"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3bdc2ff43630f01-ca8a77d5-4b0d42f5-ac2b8658-5087f022e77c9209dad89f4f"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="147da22b51098604-c987259d-4f334482-9ac1a753-30504036e70ed068cbe11b15"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7578d354c389ef1-e3145750-4c994b93-9531b0b7-76959bd99f1015c26e11d5bb"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="779e15835c9a3e95-4fb5b8c4-4af34fcd-a2559d28-049951c43bf36aff8357be03"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro> \[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="126248392d37214a-0057c8d1-478f4c83-b056b275-c76ca9f240e182109832760b"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro> \[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7b88eed4eb2c90a-c57e95a0-4975491d-b58dbb44-668531f7462b3caf0825a22e"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro> \[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f634b5ac3b1f2e76-3e2f019e-424f4502-9b79a071-08687c92d3049620702dda92"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro> \[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02795d4eda6967a2-6ec99a66-437444f3-a9fc9ed6-4bccd16f82809d6a3253d8d0"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad7ebb53a470d00a-abc65367-4ffe4880-b0a79bf5-f164af62a2f271d145ee8eff"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a20b778e34c46e75-db787a2b-41754925-8ecba670-5bb163e8fbd7683fe2d1a7ce"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68d96d5725ceecf6-53ed4b6e-4dc44b4e-b3b298a3-798775bae214a6608275ee45"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c032dabecb1ac83-170ed4af-483a4df2-b35cac52-c07bf95a00faa4b2f052be96"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="803b165c075548d9-78237df4-433b40c2-8fbba19d-80835ad312ddae55a937f632"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro> \[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e0da07c294b2852-7dad14bb-44a748ce-80ea9ef7-7ed8be909cb9d5436ef59067"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro> \[JNI 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a497ffdf3ebac64c-d2b26316-432b4276-80a4b0bd-7dfa07a95603b33c850b2f97"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> \[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b70a4fc8b33c00e-c23c2397-484f4532-8db1babc-d2c74ed0655fee858326fb32"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1751c5b92c60d41f-c9fd5a6f-4d1740b2-90899a5d-fd8ba17ba22bc42d7bcf45a0"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e76971e3676d8fd3-743e43a9-493e4d25-ba3fb610-91895ee09f947415bdefc03e"><ac:parameter ac:name="">McGraw>Low 99<97</ac:parameter></ac:structured-macro> \[McGrawLow 0097\] SecuringProtecting Java, GettingCode Down to Business with Mobile Codevia Obfuscation, by GaryDouglas McGraw and Edward W. Felten. Wiley. (1999Low, [http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html] (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a57deeb-daba-4e55-b9c8-4007e072631c"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa48c002-bd99-4910-afca-9923d7d51f38"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0125cb86-b84f-4b80-ac59-f1c3b4e50ecb"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 07\] Mocha, the Java Decompiler [http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8432c8661707d29-8f1eb0c7-428e4dfa-b209aa69-826c7d998e3172a3436efa25"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b12c54cba34421e-d005aef5-453c4a88-a13dbb76-3fd8c398314e52f09e5568bf"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro> \[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2af7010a2576d7a-a272c62b-4ea34068-805db145-e275a0733d16bb6fd3104842"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro> \[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03ba9262a977dd5d-90c1f900-4cc94735-a2598c83-405360e6bd9644fe7508f707"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c18247584cea7bb-a589f72e-4dbc477d-b930b493-569140bd30262bb0ee732f46"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="973a6833afadd466-7af5498e-4cca4748-aeff8f7b-932261697b3b99d3cc4862fc"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro> \[Secrets 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0566f9b7a3ef5e05-579c9f1c-4cdc4b82-b52195b2-5f39316ec0ffad6a88f23d64"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |