Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9a7522b83264de1-179fcc45-48b84f6d-af9993b9-f41766267e18f9f240ab262e"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2c2328344c687ba-f7b4fe22-4e314492-b911b1dc-93fb5b59e559208e84d49529"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4423e623f21484d-ca6a42bb-4a84416b-958bb513-1eff9ae5be7cdb0c1a9c9996"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11ad51d98e6be5c5-3f6d54cb-4b3548bd-b75da647-22aab45dbc067ff5ae176ead"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
\[Concurrency 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a87ab36e6baa32f-7570a39d-45cb4aa8-b4e485c8-6562cdc64d0d7be167b50474"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
\[Cookbook 04\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8af1daa94f2ea2bb-152f0b55-41664640-ac998ce8-a58f1267f3db0786bd3d1aee"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
\[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9bae58d5eb561c2-31efd02f-4dc4494c-a838ac03-d4caaa1b159f01e53697b0e1"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
\[EJS 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74234d3f8c2d989e-ae1588e1-434140da-b9438ab1-c558dc27fe56a3fb1bfa1ea1"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df251d54f7fe697d-a27842cb-4d174cc3-a3c48e6c-b31b5bab6c83ab1e97db541b"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77b775867341842b-a3f4d350-4e914a1b-8bfd825c-084706be77ada2a5ec416ab9"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24c33a4042b0517d-fb883893-4d4847e7-9232ba6b-40a637f4509bd80d869c8ef9"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation ver 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5b4129ddbae4522-b667f0f7-411c460e-8ff4a1c3-cfdad1e4d9400a5cd9b441d3"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd840570c2ceaf2d-5c3a3e62-47bc4cac-be04be6b-a6ac763375d3875be93bfd8f"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
\[Java I/O\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d085c8e028e21af-5f027614-43a34a84-b33cb56d-a539bdb06c234c63ff54ac95"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
\[JNI 97\] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f353aa146130944-9fa9e102-4cf74063-8aa78db7-17286110d0c76ec15de1b2a7"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro> 
\[JNS 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7f06ecc5b1f6ba1-fb0afc1e-45e34fc7-90f7bcf9-7ab11db150fe7ac93a59f7ee"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75efe3dda05cd236-f3192e3b-4f9740a5-b70cb6ad-ca59178492f4e4b47840a40e"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e64d1ad8682f528-9f29db3d-47864c25-8af8aede-acb6fa3cc34cfb1c33d5f440"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8fb98b97d4e4ff2-a1cab998-40034bd1-aba99cfd-065e8285452ff049df57a301"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="838d54b6b85612e9-435593e3-4e534b21-8cb3a211-4bb6cfcc35390214b666a366"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
\[Patterns 05\] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3292da86bf81990c-2673f370-476049c2-8ba688dc-a0836ee0e6e9a3d40485e1aa"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
\[Pitfalls 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a82a7d100626e3b-370ba394-4a934d6f-82a08528-829bb0a11be56aeff7820aac"><ac:parameter ac:name="">SecArch>SCG 06<07</ac:parameter></ac:structured-macro>
\[SecArchSCG 0607\] [Secure Coding Guidelines for the Java 2Programming PlatformLanguage, Securityversion Architecture2.0|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.docseccodeguide.html] (20062007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f402cd1e364634f2-415b5616-48ac48c5-ac41a5fd-574e1bd26fb43f49c79a5d40"><ac:parameter ac:name="">Secrets>SecArch 97<06</ac:parameter></ac:structured-macro>
\[SecretsSecArch 9706\] [Java Secrets2 byPlatform Elliotte Rusty Harold. Wiley. (1997Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7954dfd62a97ea21-c7cd7093-4bd747bc-9a5ca323-2e462f890ecdbab82c9d4c59"><ac:parameter ac:name="">Security>Secrets 06<97</ac:parameter></ac:structured-macro>
\[SecuritySecrets 0697\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006 Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5df96e5ac5edff45-83ffa9a3-42114194-a5a8a6f2-58ac94fd9ad134db17ae6d9a"><ac:parameter ac:name="">SCG>Security 07<06</ac:parameter></ac:structured-macro>
\[SCGSecurity 0706\] [Secure Coding Guidelines for the Java Programming Language, version 2.0Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/seccodeguide.html] (20072006)