Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7382011986177af9-5fba265b-4fdc4817-918cb933-063d605f0b28ce73d92ca867"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 96\] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f40ab9088838b815-f36ee1a1-4a1b4e35-a720925a-34e44a9e2b3a3873d5c0f609"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9656735baa774df6-2bff7a91-4f1444b3-b48aa4a9-ad561a830f0301aa7828bc9d"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 00\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0283f636cabaa551-a272a483-45f04bd6-97f79af6-493a4c1b3a1ac519334fefd0"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro> \[Bea 08\] [Packaging WebLogic Server J2EE Applications|http://edocs.bea.com/wls/docs61/programming/packaging.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10ff5016b2d71af8-f83a3dff-44254191-b984abc3-5cbfe9fff61f541f912cd20d"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 01\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5bbd686861a56f02-d197bf1c-485f47b5-ba5badb5-d89c7f0aaf66c04f1c7d8950"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3bdf652c4d882a2e-edd97362-455b4d5a-8254ab7b-e60b58c2104bf6c23e43b66c"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e714cb7eabf02cfe-5bea8c89-45bf455f-a7919c21-dc653c6a07e511517a157eaf"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro> \[Boehm 05\] Finalization, Threads, and the Java⢠Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="769fbb56494f4cb7-6a2beedd-42304a3e-ba679641-1099f6c3bbb53ad4e755ea63"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a94220a99ed08f41-9e1fa4f5-48fe41a3-9a4d8076-cafc647eb978ba17ed1e4177"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro> \[CCITT 88\] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7262e79a3e763b51-cdfcf9d4-41374e51-91cc807a-07140694c94cf7385693abe6"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f42dbcf68c335a26-df301dfb-4d3f48b9-b93ca286-a8f11f2dfd7a3601b82a39b2"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro> \[Chess 07\] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="257caee38b180f8a-a295fa95-43474879-b5c88230-1a502b1135339b03f83c0a1b"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 05\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6cf9d825dad2a29d-1c7be586-4fbc4e88-840caaaa-c990b5113518f942ec18ec4f"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro> \[CVE 08\] Common Vulnerability Exposure, MITRE Corporation (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1f055db869b09d8-33c28941-4d934d7a-b12c9192-9371e43531b354542063789d"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro> \[Coomes 07\] [Garbage Collection-Friendly Programming|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2906.pdf] by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64c6d55a50e620f5-bcaad403-48804407-83429e97-27441a6057cb1496bf2ce709"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 04\] Core Java⢠2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="621aa1136dc9bedc-a23e6743-46ee44c7-ab50a77c-7ff57380a4662482118c4ccf"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro> \[Cunningham 95\] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5afd66d296b5f0e2-0e55bcbf-4f38466a-90f4b695-dd6fd11bfe24eed7e55f9bb2"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88c05fc1177e655d-eb0429a1-41104e1f-844fb6a0-225e52dbb8f909abed699c57"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="935bb45c9da245ae-685386da-4cdf4b83-8aa49e23-d5e825ca0848892c118d4eed"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97f9ad5e29756764-5b4cb71a-49cd4c4b-a9fb949c-ea0ac6748b2f28b3d01f1de6"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5aafb97b81854b4c-ddaab1b6-43994e11-8aaf842e-653792adeda0bc56ec87b9f4"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro> \[Eclipse 08\] The Eclipse Platform (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35bc697db5ba69aa-246a4a5a-4a1c4842-8fdabc00-dd1503efe4604ab4066119e6"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9e8654d3c0c819e-542f4321-42d946cb-991182c0-f6c3e4ff5856042e2f869702"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bba9cab5e4443fbd-d3626dc9-43e94c3b-adf99bb6-1c43d12a369c76464df844e8"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 03\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="deb49fa3bb06e5ca-89830bee-4040462e-90a3af29-b285f834d3fe36105f350e77"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c3d44368653c926-4a98b929-4ff04990-a36a8e91-b4b8b2e1540117e80aca17ef"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 01\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e330e0fab8d5270f-a882e009-42394ab5-bfd6a94f-3331c876728f1c6059a29f75"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro> \[FT 08\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ad9fd213888a1f2-1eb50bfe-49e34133-ab3d8083-0e23a4e4df8b7d57ba7421c2"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro> \[Gamma 95\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eec5642b02fdb65d-7778b04e-4e4f4911-bd308f83-0b5e22e88e1d3c0265f0ba99"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5220c9e9af68aef3-88fb4b92-41834b6c-b8cab8d7-95b94b852484221687e0794d"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro> \[Goetz 04\] [Java theory and practice: Garbage collection and performance|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39bfcc150dcfc5c9-d7423cee-41a248ec-a3e2b372-acd343de58a7849ba661d8e3"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro> \[Goetz 04b\] [Java theory and practice: The exceptions debate: To check, or not to check?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8cbef2681aa48593-d37f5e65-427b4340-96619e02-30b6fc8037218a1c1ca66492"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro> \[Goetz 05\] [Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6742d7b99bf83a85-06d7581e-42be4190-93b884c8-e77617738f6c4b5b8e77a7cb"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a2279bf333048fd-7343d67b-49c14223-a6229cd6-f5d38842de52fff94f4f7fa1"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro> \[Goetz 06b\] [Java theory and practice: Good housekeeping practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35048d5a8254ca01-17878f1f-485f4db8-8769b229-3b6bc9f7d16ed75bcc917600"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 91\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f678455cf716d30f-4c543ab1-4a2a458f-bd4e9bfa-d7e1f32dac3cb1d302e5bd33"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="597993918a8af222-a973197a-45464fc3-8b23b407-9f73a7ea206ac1109f2652bd"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 00\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45ccc203cf86f4d8-5adbc25d-4d4e4e06-a2c39981-5c9d018b67f1233453bd89e7"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2eaca55391c1c67b-471f1f37-43744800-b7b19d82-26d9269613c9a6be80e8c9a2"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 05\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d1e280652b40d96-570cc68c-4ccb4e22-96289ee6-bc3ad819c4174acabc03b538"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 00\] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0e8afb7ab432074-c6f2debc-40c34f5f-8225af8e-e04235bca37154882904b8a2"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro> \[Halloway 01\] [Java Developer Connection Tech Tips|http://web.mit.edu/java/JDCNewsletter/JDC-TECH1-01b], January 30, 2001, by Stuart Halloway. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96fad0c4a1efe53c-01c68338-47834b47-bb6e8023-d7542ede2f07a3bca068f87f"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d87586ebe1e0f8f3-24026bc7-4e514dd6-ba408130-e5076a67a4112e776e1e5c65"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 99\] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4faba360fa5dfc2e-d0363f12-432d45d5-93888fb2-b3456d55ca4dc9111e0f0b91"><ac:parameter ac:name="">Henney>Harold 03<06</ac:parameter></ac:structured-macro> \[HenneyHarold 0306\] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89ec7354-f561-4f01-8426-938c1c9db173"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro> \[Henney 03\] [Null Object, Something for Nothing[Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e730f18397120d2b-2e6131bf-4d4c484c-9ef29175-c3e8b4b4cb86f1bd55115b1d"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro> \[JarSpec 08\] J2SE Documentation version 1.5, Sun Microsystems. [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d18378f7725a003-595ab00e-49f24ab4-ba8faf52-dc6336c6209e1d76c1f65427"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro> \[Java2NS 99\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48c1c5a21c6050a0-8360dd9f-4ff74953-b813aa2d-58b63cc98a307854081eb6bb"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ae15f84a6a1fccd-1bf973ff-458e46fe-b0b784d6-fcddb199d6ecf6ad6b58a6dc"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 04\] \[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="150092a76a6d97fd-86eb0dce-41bf4909-875bab38-6ea3bf5db766a8b192a6f123"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro> \[JavaThreads 99\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0267a3295655c3f4-d69d037a-4aff40eb-9fea8c77-86b9384be645d056e3209371"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaThreads 04\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="572e12941b38e08d-cf8da9bf-4fdf49a0-9beeb45b-a1ffc65aa57726c7025c036f"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro> \[Sun 06\] [Java⢠Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html]. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03be8f8c0fbcb1b9-7d901288-417e4d23-a341ae36-45eac39d8c66213fbdddf6ef"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 08\] [Java⢠Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], 19 Dec 2008. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d7959a8e0b75fa6-70774955-46ab44b2-92908ff2-d6d7a32f0b9f82c0acaa9d63"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83de2867be630e42-47beaa7a-44704558-ac469975-8cc0f1ec0aecce631e86b294"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro> \[JLS 06\] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b76197e258eac563-e897e06d-4c8c48b5-a9239a51-e071ccbbcdb4e408d1177273"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro> \[JPL 05\] The Java⢠Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21a0a1d1cd94cf8b-f1b055c4-4fc341dc-909c8f0e-51a452a85e7a9e857c75c21d"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 06\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="359508792efba02f-bbeb5c28-4e624cfa-8f9f9a3a-326c18e94a17409b28d46593"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 06\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3c4513f9dfe30d8-d4945777-463a4ecc-98d1b1da-f6fb490ed14305e121336e86"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 06\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58ef7b4f8a1fb6e2-d5a077ee-44e44889-9a0396e7-57e8e728d5be86d785f03afa"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 04\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dcd5da1471901227-4351ad42-4ba74b47-a75fb37f-e9f017bbb564a2080ff53225"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 06\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b31e52c8e51f8a3f-9787ba02-466242a6-b2bc8d4a-f359cdc03e171408ba7c0ea0"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 99\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fef9be9f4b90eecd-4036a0d9-418049bc-abc89dba-993584364e94f9d1ce6534e5"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 01\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5d481cc18724220-d1b0f604-42694bec-aa77b1c4-3c4e5841eeb5cb027ef7fe64"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b19f5ee8f0f26241-d5d280bf-47984e24-9a8a9b3c-f01c8c0481f8314120f983f9"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro> \[Lai 08\] [Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems|http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4420062] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0acd94c91891909-60200bb0-4403473e-a004b763-1e6b5d433725102260ef2fc8"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 08\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8bc22fb9e4cccc1a-6fed8baf-495546a1-a76a96b8-f291ae3662b3e6803a77caba"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88c6ca7fca434a40-ebc025cd-4ab0453b-8d0a9512-20f4b5e9dd424897cb7139da"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="172f6eee78099afa-89186c2c-4e2a45d4-994f9ebb-08faac41295c396838eeeb85"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 05\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8130d8e1004391ea-aff15063-41f14142-9d41ab28-9aeb12d01c8daaba1365df66"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro> \[Lo 05\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="238b35d0e6f54cf2-69cf09f0-4c48459c-9c9b91b9-9551de3d98471f2981dc1fb4"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d60fe2d36e2764b-a1fa0029-459147e8-aba5bb2c-86139e42fbaae476e83486f7"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a8ba655ccb27ab4-ee7c7f68-408d43f0-959aace0-fe553f5b32b6dfffdb5599fc"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 01\] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef5f3f989d01d663-6b9ad863-43ee4678-8ac895be-947ba06c8c740239ef3ad641"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71a3d348abd868c4-8cdc3722-43634ec6-9c6286f6-afce615897d9f75ed7c902f1"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro> \[Mcgraw 98\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1bfc1adcb3349e8-82453cd7-424544de-a809938a-8972a0b706d08b7ebe1ab735"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro> \[MITRE 09\] [Common Weakness Enumeration|http://cwe.mitre.org/] (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18ceef03de54acff-35996974-496442d0-88db956b-a782014b5fbc4fbd8666f1be"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34cc2a58f04cf628-004d30a9-44d04a43-ae41a434-7a0fd1e2617a92594b2163fc"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro> \[Muchow 01\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61b719f3423d20ed-458fda03-4b2f42b1-b350bfe4-007e806f989748137ec87b21"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro> \[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="720770a8480471d1-952e1836-41cd43b2-8c169c3d-0836b38a0ce5ace73ad775d2"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 06\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0122d35649a00ce7-c1d03d61-45ab4d2f-8e87a73c-e20ea3b434eb8a797c150b8b"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro> \[Naftalin 06b\] [Java⢠Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb8ee78ce3b2f5d5-0ff2eb42-46c84940-9ceea8d1-6c33e478ad4768f4b99c4e0b"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro> \[Neward 04\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e8060d42334a6d9-dfd409bc-44574f15-b30d9dab-e5608fd09be9ea2a7a4cd684"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro> \[Nisewanger 07\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="573ec1edf81890c3-31e002af-41684218-acb0b097-019d93036476d8e3d1a68354"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro> \[Nolan 04\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed29b34bc507ed12-2827223e-4f3e407c-b773bdad-d91e262bf87808fcd7d648d3"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c46edcc195cb6ad7-64f73436-444542ad-a36b91f9-eaea32e2bf2f7f8d5742b1de"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro> \[OWASP 05\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96a5bdad633e7911-856a13cf-4a654912-b6839280-0d59725a605dfe3364f8a0ab"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d36757114b443dad-39d30854-41b948b6-91919f18-93155ff43c658e26c7c0de1c"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro> \[Patterns 02\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a30f1096508b72fe-2fcf9047-42434bf7-b551adce-1d15c14b494c31f383e977a1"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro> \[Philion 03\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="124b1d0fad4fc775-ad7d3beb-49c8406f-b7deaf36-258d5dcd19afab59b6a5eba0"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro> \[Phillips 05\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd0d577391f7850b-c6b096cf-42b24855-8e0a8140-ab5e2cad522becfb1d0582ec"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f551aeacfbc8bd4-a02f1900-405146b8-acbf9fab-7943dde1a31a7dc9d3e5c230"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 02\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85e07df4e843980a-c95565e5-439d4049-beec8d9c-3d5801c76636e391dbec5ecf"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro> \[Pugh 08\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c1719c2bd9d931a-61a1d4c0-49b048bf-8230ac19-f6d3a7a9b18640513eb38d11"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 06\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cbc20ad107c6e001-d0bfae08-4fab4fd0-a5548a29-8311d9fa2d25e58bfcc537bb"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro> \[Roubtsov 03\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4fce1cbd78d90dc-19e97cb0-42d34716-bd1eaa2a-e54776459c18551d6c4b43d5"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a67677a3a6ac7b0d-f85b7cf4-499a4b02-9b15b09c-0f582a59b59d245ee32273bc"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 07\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24808ca57a6f6030-114cad81-4e3a4f70-b1dea581-6a63feb2d72fa2a4a5bc195e"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro> \[Schwarz 04\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6fdfb6cd50e2b9a-228f2da2-4fe64ea6-9f1185e4-8748d8b5da91ecfa0191b251"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro> \[Schweisguth 03\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by Dave Schweisguth. Javaworld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ff5b96ddfad9f2a-f88e106d-46a64203-b7ba9de1-bf6e73c240d581a25f46cdf9"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 05\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="632a242d09e4d479-59c5dcb0-46824772-9c879822-0b78fef59b7d400ddb35e649"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9cdab20eba54541b-036284fe-4111491a-9123af9b-308a58b33770ed38af7581ac"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98e50ea374346f64-17e3ad80-42c447a3-ae62a405-af187d4e36c714ab5048d2ee"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 08\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8265f91cd8704ce-c69eaabb-4a674134-9327a4d0-d813000e11b5c9b25f2cc337"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ac9e84bbbe42eea-b56cbe68-4d884969-ab329b89-ca352aa90c34738840a910b9"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 08\] [SUN Developer Network|http://developers.sun.com/] (1994-2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b125ebc163f907a7-791c463d-4c3c40ea-b27aa614-f5aaeed440c1a09ad965fd16"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro> \[Sun 03\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/] (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27dbdb22f6adb8ef-ff8acb94-4d1d460f-afeab8ee-f7df0c43e0c0d6db5c1a6b17"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 07\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68283f00b84d21c9-c97a1b07-42be4ea9-86e69ca5-0dba7bb0b058a1984cf423ca"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f43d4465923d5ac-94044653-487c4caa-b70e936e-c149866f2f6aff3d5dda4076"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro> \[Venners 03\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fade868adc55b00e-0394c924-416f4b0b-972e9903-d9b16fed35aa170bd8f11017"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 03\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler (2003) |