Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d0762d5c16421ee-5348a092-43fa4b82-b611ad09-51b41947efec92a4ed35dd62"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 96\] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed9976e38d9ccf2a-6a22589f-42b147eb-b7a785af-6f337fe9cb81c0c576e44f86"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd554a5331e1c0cb-22649a23-4f4d49ee-a375a89f-1d40883793a53d9af054497f"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 00\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="38d969c827059f7d-a8303138-4e1042bb-bf66b91c-d243b611c1c6b14b3d2fba5f"><ac:parameter ac:name="">Bloch>Bea 01<08</ac:parameter></ac:structured-macro> \[BlochBea 0108\] Effective[Packaging Java,WebLogic ProgrammingServer Language Guide, by Joshua Bloch. Addison Wesley. (2001J2EE Applications|http://edocs.bea.com/wls/docs61/programming/packaging.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="637cefea0d0a83f3-0f7a15b9-465b4e4b-8acbbb7e-1983a900a86fa92cf13becd4"><ac:parameter ac:name="">Bloch 05<01</ac:parameter></ac:structured-macro> \[Bloch 0501\] Java⢠Puzzlers: TrapsEffective Java, Pitfalls,Programming andLanguage Corner CasesGuide, by Joshua Bloch and Neal Gafter. Pearson Education, IncAddison Wesley. (20052001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1adaf0d140ded4c4-57e0583d-4fc941e9-a147bec2-84001fb4962f327386d9784b"><ac:parameter ac:name="">Bloch 08<05</ac:parameter></ac:structured-macro> \[Bloch 0805\] Effective Java, 2nd edition Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Addison WesleyInc. (20082005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f363429860a86b6-52cb8e9d-48ae4deb-acd1af1c-9affee2063264ccc46c4a5c7"><ac:parameter ac:name="">Campione>Bloch 96<08</ac:parameter></ac:structured-macro> \[CampioneBloch 9608\] [TheEffective Java, Tutorial2nd edition, by MaryJoshua CampioneBloch, and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b52d46b7f5cba6f2-8fc42099-462c46a9-833ebdfb-b23af2d2174545c13a4080c8"><ac:parameter ac:name="">CCITT>Campione 88<96</ac:parameter></ac:structured-macro> \[CCITTCampione 8896\] CCITT.[The CCITTJava BlueTutorial, Book,by RecommendationMary X.509Campione and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="784a7418f7899ce6-aa367185-43ee49dd-b0c79bcc-38bec9854fbb8457a92d8cf8"><ac:parameter ac:name="">Chan>CCITT 99<88</ac:parameter></ac:structured-macro> \[ChanCCITT 9988\] TheCCITT. JavaCCITT ClassBlue Libraries:Book, Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1897f957549b162f-1801717f-40424ddf-982b82ce-6a4b4180d45bdf61b300eadc"><ac:parameter ac:name="">Christudas>Chan 05<99</ac:parameter></ac:structured-macro> \[ChristudasChan 0599\] [Internals ofThe Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava (2005) \\Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="282000f27a9db799-c0fcfb43-432e4361-9f86848b-509d36ca4c328447584ea4b5"><ac:parameter ac:name="">CVE>Christudas 08<05</ac:parameter></ac:structured-macro> \[CVEChristudas 0805\] [Internals of CommonJava Vulnerability Exposure, MITRE Corporation (2008)Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava (2005) \\ |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8fc2c9c591c52982-1ad21dbd-4f634f9e-8f319869-71b535904eb6cc5db77fde8c"><ac:parameter ac:name="">Core>CVE Java 04<08</ac:parameter></ac:structured-macro> \[CoreCVE Java 0408\] CoreCommon Javaâ¢Vulnerability 2Exposure, VolumeMITRE ICorporation - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)(2008) |
unmigrated-wiki-unmigrated-wiki-markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f044dc47e2373c60-3b56bc2a-4d4548f4-b9568dcd-023f12ca4d6368ee8071568b"><ac:parameter ac:name="">Cunningham>Core Java 95<04</ac:parameter></ac:structured-macro> \[CunninghamCore Java 9504\] "TheCore CHECKSJava⢠Pattern2 LanguageVolume ofI Information- Integrity"Fundamentals, PatternSeventh LanguagesEdition ofby ProgramCay Design, by Ward CunninghamS. Horstmann, editedGary byCornell. JamesPrentice OHall Coplien and Douglas C Schmidt. Addison-Wesley. (1995PTR. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="181cf7acd943fc53-3ea2a38f-4c1440ec-a0239129-45da15cc7fc06bfaf67a969d"><ac:parameter ac:name="">Daconta>Cunningham 00<95</ac:parameter></ac:structured-macro> \[DacontaCunningham 0095\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000 "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4d2bed1aaeddb97-d0c4ae0c-456f4273-92a9be6a-24662530ad46ed9c27740a18"><ac:parameter ac:name="">Daconta 03<00</ac:parameter></ac:structured-macro> \[Daconta 0300\] More Java Pitfalls[When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and WJavaWorld.com. Clay Richardson. Wiley Publishing Inc. (2003) (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4a83f222dc6fdb7-b0ba9636-4bbf4093-9844befc-141260bbe751e4297fee4e4b"><ac:parameter ac:name="">Darwin>Daconta 04<03</ac:parameter></ac:structured-macro> \[DarwinDaconta 0403\] More Java CookbookPitfalls, by Ian F. Darwin (2004 Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94175ca2bef2d23e-9b1f9938-42154516-be25a5a1-ffe4dd83b2864af66e003681"><ac:parameter ac:name="">Doshi>Darwin 03<04</ac:parameter></ac:structured-macro> \[DoshiDarwin 0304\] [BestJava PracticesCookbook, forby Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36f7f43a2f8f94ab-a2dfe0d3-4c334c3e-a3a2928b-d5340608b19c78ed1a79d036"><ac:parameter ac:name="">Enterprise>Doshi 03</ac:parameter></ac:structured-macro> \[EnterpriseDoshi 03\] Java Enterprise [Best Practices, byfor the O'Reilly Java Authors. O'ReillyException Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65fbc5eaea4ce3d9-f23bbeb5-45284d67-87afad96-96a8ec960406f051b67c7bf4"><ac:parameter ac:name="">FindBugs>Eclipse 08</ac:parameter></ac:structured-macro> \[FindBugsEclipse 08\] [FindBugsThe Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html]Eclipse Platform (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74257b9784dff05b-4c773fb2-4847499d-8b73b364-34181d4bd8f08e5446bd5001"><ac:parameter ac:name="">Fisher>Enterprise 03</ac:parameter></ac:structured-macro> \[FisherEnterprise 03\] JDBCJava APIEnterprise TutorialBest and ReferencePractices, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Seriesthe O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f09b5c411ff8161a-d6b08389-49544a63-8fa69799-b4c15c27fd8db294cfbb9501"><ac:parameter ac:name="">Flanagan>FindBugs 05<08</ac:parameter></ac:structured-macro> \[FlanaganFindBugs 0508\] Java[FindBugs in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eeb864f12116dfbe-2bbc8913-41674da8-a088af9f-a3b68b77a4817a65abe15c7f"><ac:parameter ac:name="">Fox>Fisher 01<03</ac:parameter></ac:structured-macro> \[FoxFisher 0103\] WhenJDBC isAPI aTutorial Singletonand notReference, a3rd Singleton?edition, by JoshuaMaydene FoxFisher, SunJon DeveloperEllis, Network (SDN) (2001and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fda86ee40195079-d5ad6b3d-49024dfb-81d68cbd-f5da22203eedc84ce6ab5cd6"><ac:parameter ac:name="">FT>Flanagan 08<05</ac:parameter></ac:structured-macro> \[FTFlanagan 0805\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functionsJava in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
unmigratedunmigrated-wiki-markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89969c60b0075569-b0d1fc5a-4ca94e53-864aa9e4-a00bc389d2647011611ef684"><ac:parameter ac:name="">Gamma>Fox 95<01</ac:parameter></ac:structured-macro> \[GammaFox 9501\] DesignWhen Patterns:is Elementsa ofSingleton Reusablenot Object-Oriented Softwarea Singleton?, by ErichJoshua GammaFox, RichardSun Helm,Developer Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995Network (SDN) (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec706a3030e8a5d4-9e69b76a-48dd4373-9927b9ae-6fd7ec0a1322fda4ff156988"><ac:parameter ac:name="">Garms>FT 01<08</ac:parameter></ac:structured-macro> \[GarmsFT 0108\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)[Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b3ffd86fcd230c5-f6a2118c-46ef4d98-a8988ea5-a23fb01f17e765217c686603"><ac:parameter ac:name="">Goetz>Gamma 06<95</ac:parameter></ac:structured-macro> \[GoetzGamma 0695\] Java Concurrency in Practice Design Patterns: Elements of Reusable Object-Oriented Software, by BrianErich GoetzGamma, TimRichard PeierlsHelm, JoshuaRalph BlochJohnson, JosephJohn Bowbeer, David Holmes, Doug LeaM. Vlissides. Addison -Wesley Professional Computing Series. (20061995) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d745c52b305c7683-c3bc57ce-433949b3-9d20b578-8626955f007164908abb768a"><ac:parameter ac:name="">Goldberg>Garms 91<01</ac:parameter></ac:structured-macro> \[GoldbergGarms 9101\] Professional GoldbergJava Security, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991.by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2552ca9dbb4a417b-b0bc4d84-40544d57-a29ba75e-fe1c4d9bdd9ccf9328a34c8f"><ac:parameter ac:name="">Gong>Goetz 03<06</ac:parameter></ac:structured-macro> \[GongGoetz 0306\] Inside Java 2Concurrency Platformin Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c57815e8e08feccf-e3cfc752-4c34478c-924892bd-8cc15171d8ef26b9cf805171"><ac:parameter ac:name="">Greanier>Goldberg 00<91</ac:parameter></ac:structured-macro> \[GreanierGoldberg 0091\] Goldberg, David. [DiscoverWhat Every theComputer secretsScientist ofShould theKnow JavaAbout SerializationFloating-Point APIArithmetic|http://javadocs.sun.com/developersource/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000)806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="822a05a6e3d02a85-0a4bf1c4-4cfa4162-8c79ba41-3d3482cbe0ddd945e15ad6ba"><ac:parameter ac:name="">Green>Gong 08<03</ac:parameter></ac:structured-macro> \[GreenGong 0803\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008 Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcff19fb0fadc534-501f30a2-475545b7-8d838821-0320aaa7ae99ad53f86ebbc1"><ac:parameter ac:name="">Gupta>Greanier 05<00</ac:parameter></ac:structured-macro> \[GuptaGreanier 0500\] [JavaDiscover memorythe leakssecrets -of Catchthe meJava ifSerialization you canAPI|http://wwwjava.ibmsun.com/developer/technicalArticles/developerworksProgramming/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8210d40f-ef9f-4759-90d7-261f41d76bbf"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
\[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18f347bd-a6b8-402d-9267-d2a05b890209"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
\[Gupta 05\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="061ed651-80ba-4b02-8a9a-6f53324f736e"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
\[Halloway 00\] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b139ad31-28e6-4600-9f31-d7d7c7313f90"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
\[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ce6f8302879bba4-7ba66768-44504931-9ac593dd-8529cc4160b9947eabb5cd86"><ac:parameter ac:name="">Halloway>Harold 00<99</ac:parameter></ac:structured-macro> \[HallowayHarold 0099\] Java Developer Connection Tech TipsI/O, Marchby 28,Elliotte 2000,Rusty by Stuart Halloway.Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="937fd8bb3e440daf-96987cd4-44604897-945dbc1d-0d8e10f42bf9892f6ab99b95"><ac:parameter ac:name="">Harold>Henney 97<03</ac:parameter></ac:structured-macro> \[HaroldHenney 9703\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997[Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="607721d6e45611cd-1eff8912-490b4a22-9a6f863d-74f12f294f12b42a7aa53c40"><ac:parameter ac:name="">Harold>Java2NS 99</ac:parameter></ac:structured-macro> \[HaroldJava2NS 99\] Java I/O2 Network Security, by Elliotte Rusty Harold. O'REILLYMarco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5665d0224a7b8956-557ae12a-456c42da-ba5b89b5-1f42271024d28619fbdd235b"><ac:parameter ac:name="">Henney>J2SE 03<00</ac:parameter></ac:structured-macro> \[HenneyJ2SE 0300\] [Null Object, Something for Nothing JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://wwwjava.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ff5b7dda06db5d1-9858d382-49b34227-8d77994d-d2ee4be56899370e94ceb801"><ac:parameter ac:name="">Java2NS>JavaGenerics 99<04</ac:parameter></ac:structured-macro> \[Java2NSJavaGenerics 99\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (199904\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ebe64456b4aad8b4-466abeef-46ee4f62-9ebabde1-3468cb811ce0d84ad8123027"><ac:parameter ac:name="">J2SE>JavaThreads 00<99</ac:parameter></ac:structured-macro> \[J2SEJavaThreads 0099\] JavaTMJava 2 SDK, StandardThreads (2nd Edition) Documentationby, SunScott Microsystems.Oaks [J2SEand DocumentationHenry version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000Wong. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44e7f8ac33756014-54725d1c-42cf439c-b24d8b57-81c64cdce67497d558c2e9d3"><ac:parameter ac:name="">JavaGenerics>JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaGenerics 04\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems\[JavaThreads 04\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0a69f35d9a9be79-779aabf5-436a4921-9192983a-702ee7f2c9c05d74a7b4f86c"><ac:parameter ac:name="">JavaThreads>JDK7 99<08</ac:parameter></ac:structured-macro> \[JavaThreadsJDK7 9908\] Java[Java⢠ThreadsPlatform, (2ndStandard Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999 7 documentation|http://download.java.net/jdk7/docs/], 19 Dec 2008. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08d31257d5ff3a09-b152ca05-4f0f409d-90028120-9a328e63e438227f02a5d826"><ac:parameter ac:name="">JavaThreads>JLS 04<05</ac:parameter></ac:structured-macro> \[JavaThreadsJLS 0405\] Java ThreadsLanguage Specification, (3rd Edition)edition. by, ScottJames OaksGosling, andBill HenryJoy, Wong. O'REILLY. (2004) |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfecaa8d-421f-4232-9e7d-565b451d8cfa"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 08\] [Java⢠Platform, Standard Edition 7 documentationGuy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://downloadjava.javasun.netcom/docs/jdk7books/docsjls/index.html], 19 Dec 2008. (2008(2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea97ab185bef8846-723a3073-4ec3421d-bdd9aeb9-361493900b205f48d4b839fa"><ac:parameter ac:name="">JLS 05<06</ac:parameter></ac:structured-macro> \[JLS 0506\] Java Language Specification, 3rd4th edition. by JamesKen GoslingArnold, Bill Joy, Guy SteeleJames Gosling, and GiladDavid BrachaHolmes. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (20052006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82fb5eeb6d8d2646-736a88f6-44c545e6-8b869dc5-c07503b8956ac92b952a6bd6"><ac:parameter ac:name="">JLS>JPL 06<05</ac:parameter></ac:structured-macro> \[JLSJPL 0605\] JavaThe Java⢠Programming Language Specification, 4thFourth edition.Edition, by Ken Arnold, James Gosling, and David Holmes. PrenticeAddison Hall, The Java SeriesWesley Professional. (20062005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d275f540f7fe4fb5-5a619eb4-42834689-adbd95da-cb3077a0bc355e5a54900106"><ac:parameter ac:name="">JPL>JMX 05<06</ac:parameter></ac:structured-macro> \[JPLJMX 0506\] The[Monitoring Javaâ¢and ProgrammingManagement Language,for Fourththe Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005) Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de3a57c1704125a5-62e8e291-403c491d-91b3a977-12d3d079bae90d0fc64f9c18"><ac:parameter ac:name="">JMX>JMXG 06</ac:parameter></ac:structured-macro> \[JMXJMXG 06\] [Java SE Monitoring and Management for the Java PlatformGuide|http://java.sun.com/javase/6/docs/technotes/guides/management/indextoc.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68b232b814425808-9dd02232-428049c2-b797b6a4-4065abd833c8fef8aa6bcf04"><ac:parameter ac:name="">JMXG>JNI 06</ac:parameter></ac:structured-macro> \[JMXGJNI 06\] [Java SE Monitoring and Management GuideNative Interface|http://java.sun.com/javase/6/docs/technotes/guides/managementjni/tocindex.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffdc3a9b89099287-74f8dd78-4b6343fe-9d5ab7b8-c3bf7a3828a7c779dcd227fe"><ac:parameter ac:name="">JNI>JPDA 06<04</ac:parameter></ac:structured-macro> \[JNIJPDA 0604\] [Java Platform Native InterfaceDebugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jnijpda/index.html], Sun Microsystems, Inc. (20062004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="422089f5d6ebbec2-71f4873d-4cc2416b-a337bf46-47cbb6cb3e5681ab3beec912"><ac:parameter ac:name="">JPDA>JVMTI 04<06</ac:parameter></ac:structured-macro> \[JPDAJVMTI 0406\] [Java PlatformVirtual Machine DebuggerTool ArchitectureInterface (JPDAJVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jpdajvmti/index.html], Sun Microsystems, Inc. (20042006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f63c36e4517fcb4-a7c7e4d2-49214cc4-bac68710-b166a653a70e38712a8d26f5"><ac:parameter ac:name="">JVMTI>JVMSpec 06<99</ac:parameter></ac:structured-macro> \[JVMTIJVMSpec 0699\] [The Java Virtual Machine Tool Interface (JVM TI)Specification|http://java.sun.com/javase/6/docs/technotesbooks/guides/jvmti/index.htmljvms/], Sun Microsystems, Inc. (20061999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64e442759e7e7ad0-ec5355fd-4f5c4e44-ab7da794-9db7e54b331a3270b9c85202"><ac:parameter ac:name="">JVMSpec>Kabutz 99<01</ac:parameter></ac:structured-macro> \[JVMSpecKabutz 9901\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3c53fadd9673299-b684c64f-4d554ab1-b221928a-c2cce368636f7b0bcc5019f4"><ac:parameter ac:name="">Kabutz>Kalinovsky 01<04</ac:parameter></ac:structured-macro> \[KabutzKalinovsky 0104\] TheCovert Java Specialists' Newsletter: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex DrKalinovsky. HeinzSAMS MPublishing. Kabutz. (20012004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcfca255941a5385-3b53c9b1-430a4d70-b352a821-711697a0397f40452ac3fefb"><ac:parameter ac:name="">Kalinovsky>Lai 04<08</ac:parameter></ac:structured-macro> \[KalinovskyLai 0408\] Covert Java [Java Insecurity: TechniquesAccounting for Decompiling,Subtleties Patching,That andCan ReverseCompromise EngineeringCode, by Alex Kalinovsky. SAMS Publishing. (2004Charlie Lai, Sun Microsystems|http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4420062] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c889f5f2e5dc7e60-d242814d-422c4670-85258a2f-09d007c09ccfd146e70d9329"><ac:parameter ac:name="">Lai>Langer 08</ac:parameter></ac:structured-macro> \[LaiLanger 08\] [Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://ieeexplorewww.ieeeangelikalanger.orgcom/GenericsFAQ/xplFAQSections/freeabs_all.jsp?arnumber=4420062] ProgrammingIdioms.html], Angelica Langer (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae70172e6f90c310-ef4eb98d-4b6b4c65-bbfda2f4-5b71afecdf685239cf301de1"><ac:parameter ac:name="">Langer>Lea 08<00</ac:parameter></ac:structured-macro> \[LangerLea 0800\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer (2008 Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3fdd9b8e5ba860b-fb7ae098-496b4613-901a8a52-47d86679f97a0a7ad6b9f675"><ac:parameter ac:name="">Lea>Liang 00<97</ac:parameter></ac:structured-macro> \[LeaLiang 0097\] The Java⢠ConcurrentNative Programming in Java, 2nd editionInterface, Programmer's Guide and Specification, by DougSheng LeaLiang. Addison Wesley, Sun MicrosystemsADDISON-WESLEY. (20001997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16c7104ccf7f7fa5-bafa09ba-4eab4cbb-8ee4b9c6-f0b6c576bc52ead56564ba80"><ac:parameter ac:name="">Liang>Long 97<05</ac:parameter></ac:structured-macro> \[LiangLong 9705\] The[Software Javaâ¢Vulnerabilities Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c088d75affa0055-a780f0ac-47cb44a0-b131ab35-8c117b4e5b3ff23fe7f303b9"><ac:parameter ac:name="">Long>Low 05<97</ac:parameter></ac:structured-macro> \[LongLow 0597\] [SoftwareProtecting Java VulnerabilitiesCode invia JavaObfuscation|http://www.seics.cmuarizona.edu/~collberg/publicationsResearch/documentsStudents/05.reportsDouglasLow/05tn044obfuscation.html], by Fred Long, CMU/SEI-2005-TN-044Douglas Low. (20051997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ddacb6092d7c392-4a759f06-4e7c4a04-ac7c876f-4eb12708cb2fbdf36300d21b"><ac:parameter ac:name="">Low>Kalinovsky 97<04</ac:parameter></ac:structured-macro> \[LowKalinovsky 9704\] [ProtectingCovert Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html]: Techniques for Decompiling, Patching, and Reverse Engineering, by Douglas LowAlex Kalinovsky, SAMS. (19972004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab4298151fed627d-76be02d9-49ad48d0-8a35b7ce-7e194dae89d9a4719c7e9c3b"><ac:parameter ac:name="">Kalinovsky>Macgregor 04<98</ac:parameter></ac:structured-macro> \[KalinovskyMacgregor 0498\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34e1cebadfbf652a-1ec95d17-4f4f4a88-b8cda15c-d8dd39ca8fcf9e3ee3fe1f3a"><ac:parameter ac:name="">Macgregor>McCluskey 98<01</ac:parameter></ac:structured-macro> \[MacgregorMcCluskey 9801\] Java NetworkDeveloper Security,Connection byTech Robert MacgregorTips, DaveApril Durbin10, John2001, Owlettby and Andrew Yeomans. Prentice Hall. (1998)Glen McCluskey. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2690fd71fd07f1ff-6ba0d489-44924875-83fba1b3-debd996ea90a37eb05d6d71d"><ac:parameter ac:name="">McCluskey>McGraw 01<99</ac:parameter></ac:structured-macro> \[McCluskeyMcGraw 0100\] Securing Java, DeveloperGetting ConnectionDown Techto Tips,Business Aprilwith 10,Mobile 2001Code, by Glen McCluskey. Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7febc0118c648fd8-52eb021b-44464a90-8bbea2a3-4017bc78c229439e0db62d46"><ac:parameter ac:name="">McGraw>Mcgraw 99<98</ac:parameter></ac:structured-macro> \[McGrawMcgraw 0098\] Securing[Twelve Java,rules Gettingfor Downdeveloping tomore Businesssecure with Mobile Code, byJava code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary McGrawMcgraw and Edward W. Felten., WileyJavaWorld.com (19991998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfde0f27ff5b387f-27491f17-4eff4572-a4c2ac77-75726de9f0d893c7602233e8"><ac:parameter ac:name="">Mcgraw>Mocha 98<07</ac:parameter></ac:structured-macro> \[McgrawMocha 9807\] [Twelve rules for developing more secureMocha, the Java codeDecompiler|http://www.javaworldbrouhaha.com/~eric/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com (1998software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3a55df421edcf29-e1a1701c-473f429b-81be8cf2-a435ea42d27e311055ccc939"><ac:parameter ac:name="">Mocha>Muchow 07<01</ac:parameter></ac:structured-macro> \[MochaMuchow 0701\] [Mocha,MIDlet thePackaging Javawith DecompilerJ2ME|http://www.brouhahaonjava.com/~eric/software/mocha/] (2007pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d105d9d3afa486db-aace54c1-4f3f4deb-9540913f-a34809d832c41569cd11a90b"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="513532663fa27932-66f7a964-495b42a2-9a138538-b9aba35479c9fcfcc42b1591"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 06\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c00c3708669d7ab-920aa365-41f04783-9c5cb865-cdec2c0e2b9e45209bf548ca"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro> \[Neward 04\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eade186b723c71b1-4a038890-40014218-866b9ddd-4e302cb12512c59dcdc92612"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro> \[Nisewanger 07\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c90c456524b3eefc-50d9ca0e-46ae47dd-92afa502-363fd53e18a1ee9c0b6b7b2b"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d21a018b8de1942d-d84bfd8e-42ad47db-b199be85-817f2e32141385f0ec9e37e9"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b701111562c2088-37a853fb-4bc54f94-b827b7f6-7674f43f038f7df87f5fee40"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro> \[Patterns 02\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ffa24011a21277f-7cfc3f1e-41334fe8-89769892-7c04f4985aaa499d05887831"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fe4c1eb4afed811-b09ca89d-4c0d450e-9004a4e9-8abe87a2ea36605f8081ba6e"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 02\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4531555f6d09b05a-9f3494a0-44d049da-a0d4a2f0-c4259835f4590eda132282a0"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 06\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b104436fdcc97aed-f96fc760-456f4be2-851a9dc1-f37762fb21e4f5a4c511a0e9"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="757d383619d10d82-c8942d8b-44a3408a-bb5fb06a-c088fe2e2725c19d4a754429"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 07\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af4770ed70ef42cd-2c5cbf42-49ac4ba8-98a1a827-385115df8aaedb1c83ce2e41"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 05\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da8671e86de56381-8018b44b-4e1f4ccb-b375a88f-c5a623fabb1d6501b628ae9f"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b54cf393817a0927-e2152e84-49074aba-a2df954b-974996ac581b08a6e2237330"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6865cb9fc7a06954-e39ca2fb-42aa4fbb-9a6dadc6-5241018e44696f6cf447e096"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 08\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="212fe6e5bf6eb38b-e7b08d5f-4b904288-92e59106-5af7a5a6af9cd81f33587268"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d38b80c90437dbf3-2126474e-466c4971-900ea1c5-8ec2bba1b64cde569a6c061f"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 08\] [SUN Developer Network|http://developers.sun.com/] (1994-2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00eb9ca58048ae52-6dd0cdcb-45274be5-80eaae67-0975e4bc97adbdb3ac25f3e2"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 07\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6b4c281973f99d4-d226da06-47004f45-90de8bc7-7011de134bdbf1eaf85f83c5"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39c7189ef420716e-423708f1-45ad446e-8103bbaa-e04329c5b0beb53e2925febe"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] [http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html][Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler (2003) |