Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c92b4744f90bbb5e-d9180668-42f143f1-a64aa3db-0949508ba33678304792b7f7"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9082d2cc3a9824ca-701cca0d-44054df4-9b93bee4-bb9b72493a80f3c85557612f"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 00\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc19cd009c7360cd-0b900a68-46cd4d82-a2599dbd-ef6ef0da10cbd1b688b63eb2"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 01\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="645a1a28505914fc-e1ad4439-4c024da2-afbbb81b-9b0fd7de69625c0d3b235892"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24731e7404cb823d-d69f35db-4eab44cc-b0bc8922-2ae5382cc70adfb3721047fa"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61cf2fe76124a8a5-2a7cef5e-44df499e-a957aacc-4086dc6c41e6deb0a1c908bb"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="155673fa411058fc-fcda91ee-4d984cf4-b0df929d-1785aa675b6c1f2376e73727"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c93bf189124b654-2ed40cc8-4cab4f0e-b2f3baf4-51ac8c8d6c4f5073fa43d660"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 05\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava (2005) \\ |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8e4377f4627c415-380f4af7-48894cd7-bc18963c-3ffc49ad7018ed33a2d934be"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 04\] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2c7ae7a4255dcae-491d4568-4d7b4d4b-bff69840-32608a55ba34ad43e46d635c"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7df43d3cfcc7040-dfa9bade-45244ead-9618ad27-f23e59d74f5ebfa4a606a799"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="953c4e9bc647f5fe-b08c62b1-41894261-938fa3e0-eff8e42a8769b60806f6333e"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b94a7e88e6504a9d-5026217d-41af41cd-b5f98f62-7bb2e8132d13224259800424"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35c6f480802da445-939047d5-4b5344f8-a3838c47-2c2b0a8161c84bf7ba8e96be"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0ebb30e294271d9c-a39f747c-4e464de5-b33182b3-2623c10c9f8cf0616ee36249"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d459ca835d5766f9-c0352645-45f34464-b15ea154-25b76d3a76e1333029caa729"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 03\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6567b0fc27901381-7c440530-4fea418d-8ec6b20b-3d8f7cbade50c4b181446b45"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a6549468b6d5471-a7b80de0-46f44446-9832b01f-4bb22af1641f1f69c39cbdcd"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aafefbac526cce25-6caa70de-4e3c40ad-b426b74e-e0617dc1ab22d17cf9a09ee9"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa5fb10edcd986e8-30611f53-499d480d-b1239085-c775db8601dd1521e621df6e"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 91\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ffbd09db24bd397-5efd9b13-443d4af4-8da79c4d-448d1fad7ced2e9b9898cf25"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="90eda9c25668a138-3e1cbb68-4a04435c-900d8106-b5d1c94318adea79818fc41f"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 00\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c74388f133c1f5c-0afa090d-4b8940e5-a8deb848-654d1886b61adbf6657c6401"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd743beaa58cf95d-8573c726-4b944985-a2919b79-b1e25bf8280ae363c80b2bd9"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 05\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40dcc74a8fde0d0c-4acb437f-46d74faf-bbbc8d95-74249cf3aad983d892356833"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 00\] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e4e4d62e27d7141-25effda3-4270468d-8bd4a70c-6f1688f56ddd124da598aca7"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="910ae84a75e008dd-32621ee2-4c524b93-9e209df3-e6a433116bf20b3842c4cb8a"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 99\] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e3b1818603a91f5b-c778a699-4aa846b3-892daa77-b54d4d443cf99d7c3f3d1b83"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e10c63c2204949f-c6a7bf6b-4db641db-9324a7fb-2581beb3bc5d6df31b3da848"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 04\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a989f13ea709427-0c068566-46254d6c-8f56bfcc-1a421f9796787f24faced9cc"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b68fba8e595740d8-8ea5e714-42684679-9f2892a4-798205cb58860fbbeab4e750"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro> \[JLS 06\] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="167241ef176692f5-16c4ba7b-4c17438f-b551b74e-0c9d379ffe5a71a1a8d2985f"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 06\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="81408470ca25b5b7-e35c5fd9-4cb54944-a5348b39-fc7f9f247917e52c78c79cae"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 06\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbe74f656ef8934c-4b924a52-4b894d7f-a37790c8-1969d093dc2274f8d076ed45"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 06\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3be1dbe522a6162-be7e8414-4c6d4b84-b428b967-3515cc429041ad046a1dc35a"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 04\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bee00178dd0885f-80916b4e-40724d02-9937a6d8-c36c2c9e4adfa70b74988111"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 06\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51c3fb0aa78ef264-68d8962e-4e2f4493-8a9fa700-dd218a7cf954c71004b2c288"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 99\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f9b18040bd6fe95-bab9d9d8-45c44f1f-b95bae72-043045aab8c5c7303be3691a"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 01\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ac68a52c1a63dd9-d6302c40-4c514047-ab009c30-4c98869770fe2c98c2d1eccc"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="588d11326453b852-1d74277a-4c654a9e-b1038d1d-384b1d1ae4bc1bc3b586b097"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 08\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c6a9e54a008ebfd-19e26dc6-4adf4c55-acbbb270-f54070f8a2cf02e1c87053cb"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b69e781f0b27920c-afd66dde-48c54583-bac491b1-7a7a75b6a3a3fba003b4fc7b"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea32413bc3ac9ba0-86a79f5a-4a8a42ae-bea2a236-12c9f398029706424141dc47"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 05\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2918afdbf9dec29a-fe710a4e-41994d45-96baa467-1ad49c0a89e6bfd5e7e3ed15"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e7cb56edb877696-ff40be84-40d9434d-b4df9712-e3a1975d852b183f1324f97d"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="253913a908700974-9a10e2b1-406c455a-aa988020-c356fc2c4842ad2df1e92366"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f3c27799f600d44-c98f95ca-41ae4b56-a9af8b7b-c4a85e1ade5a0116f04fca39"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba758a04a69c58af-536c2a5d-41494cfc-9c99b5e9-658f5b317263b5bffd82470e"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro> \[Mcgraw 98\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b2e58e13960daec-7fe393f0-43094277-84e1bae1-2d714dfd254077ccd12167a8"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="245a278630ff2e3a-eb83e65d-4fe4429f-af7cb940-edfba11e624b623165f4d837"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33536ac50779c408-f41868d5-4f824262-af7eb499-e84fbcce70d172a4d51b5fcd"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 06\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) \\ |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ac8d81dd79aae0d-5375569b-47994820-8617afbd-ef5d9696d2359f0eebd1be3c"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5139e565b7d5d33e-99c48284-449f420f-84a0b077-8ccd1fdde90c4103a6e48878"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f336d9f24b3b7ad-f1c81f6b-493e4780-a2e7be78-3d369d0c309bcfc6b60df5ed"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b042066852dd248c-0e8a459c-4ef445cc-b132afc2-c88466bf5810021593788264"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 02\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9757aa51032ba19f-b098aec3-411141e3-aa149f40-b6b36604f26a83c467fce812"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 06\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="498b5129ef429f6b-daf26013-45034d51-9c019bf7-ffeb2cccfd7bea1523e206bd"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ddf1eca14840b28-2f85797f-40224e51-92c09cd1-922dc1a1a81c8c3f1b9c28b0"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 07\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6985294f8fd3bc3f-35b262e6-43864fd7-be6e9cda-7a05ba997415aaa0bd839c6b"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 05\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b2b93e3d030e2e2-b8b736b8-40d641cc-b059a4dc-09af15fd9b09c27fa8a13be3"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b047ef4dbf890c24-490df774-49754148-b3d7ad4a-c9858133452b891fe3f403ec"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c1c28b4012b06cd-d335e892-42cd4c32-8c3d9bb9-42a7a69fb5af4fdadcc13861"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a92dc0b6c3549060-79a51e16-40a840c7-9a93911e-8e1dec8194df2d72dc6e2bd6"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 07\] [Advanced Topics in Programming Languages: Java Puzzlers Episode VIThe PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://wwwdevelopers.youtubesun.com/watch?v=wDN_EYUvUq0]/learning/javaoneonline/2007/pdf/TS-2707.pdf, by Josh Bloch and William Pugh, JavaOne Conference, Repeated Presentation (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="102fd86248410257-1bf231bf-4ba64644-8588abac-e451f8cadcd5871814c79c80"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="608c24c1c4ec9054-cc36c848-417c4868-a9599cbc-8a800e71c5828932435ad7de"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] [http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html][Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler (2003) |