Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92205074a5609045-3cc7f103-4daa4cc7-89d4a5e2-7ea04a8de0e769ccaa706074"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
\[Abadi 1996\] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="397f74e3af18b601-47d35058-413e45da-8ca9a281-738d97245e07da66196adb24"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="187bf8968accab04-150969c4-4cc648a6-ad1db9b1-d3040c086fcaf882fddeae77"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
\[Austin 2000\] [Advanced Programming for the Java 2 Platform|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents], by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea17cf39f484e948-28b15003-498c4b8d-a0c1ba8e-33a9055c4833f7e5acc83a79"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
\[Black 2004\] Paul E. Black and Paul J. Tanenbaum, "partial order", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 17 December 2004. (accessed TODAY) Available from: [http://www.itl.nist.gov/div897/sqg/dads/HTML/partialorder.html]

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7964eea6e305d6d8-8de3d12b-4f704e42-9adbb16f-f17e06a8998b27e8c667d640"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
\[Black 2006\] Paul E. Black and Paul J. Tanenbaum, "total order", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 30 March 2006. (accessed TODAY) Available from: [http://www.itl.nist.gov/div897/sqg/dads/HTML/totalorder.html]

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c24b6ad2dc576f69-825506b3-493a47ce-a1caab92-013222d6534706600a3ffd9c"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
\[Bloch 2001\] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="229473892b33dbad-cbdd4f1c-4742427e-969c9a96-06fb2296585b6356873a0a5f"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 2005\] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e34e1cd3b4ed26f-94dbe3f3-4ce24a0a-ad2f9486-540ca8f9bcbc943db20c7272"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
\[Bloch 2005b\] [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/], by Joshua Bloch and Neal Gafter. JavaOne Conference. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4daa50f3b506538-02dbc9ba-48de4e65-a5d4afd9-a643715499e54d1906b6ad0e"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
\[Bloch 2007\] [Effective Java™ Reloaded: This Time It's (not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf], by Joshua Bloch. JavaOne Conference. (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="480a36a1adbfa92b-827dc225-4bb04f2d-80cc96d3-3207f8b3edd56652a18e7dbe"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fab774810ea31a51-1c951f58-497241ab-bdeb9288-9ea43377c788b3ecf157aea7"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 2008\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

...

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cadb9e2366e7ab08-32aad582-405243c6-8f60a54b-8395757dbad8e712a6527657"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
\[Boehm 2005\] Finalization, Threads, and the Java™ Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c6b73e5b26807643-eefeb9e2-471241b2-a1c69d0f-9890ffad8d68202309470c3a"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 1996\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79d8b18bf40600ff-c185aaa8-44394e26-ad798b29-70b06ff0c26986e3cf5e0d0a"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
\[CCITT 1988\] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva.  (1988)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="839b880ed2c847b0-7dbf91cd-4f2e467e-8b3ea49e-7116ce673ff91d2d656941eb"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 1999\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2201e21417f435f-167b25da-4e5d4514-967aaea3-0c39caebfd8ed7bba5387e1f"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
\[Chess 2007\] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3198341efe12f08a-f3f3bde2-4e384c19-b88fb60b-c798cce9bdce95168f4b0a50"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
\[Christudas 2005\] [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], ONJava. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05001491ad792949-adff0a0c-442e42b0-bd548a83-78b3348cc7dbeadc868b58ed"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
\[Cohen 1981\] [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], IEEE Computer, vol. 14 issue 10 (1981)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="960ed367178c1774-16740c78-4a384738-9dd68ed5-301089bea23a780a60be243b"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
\[Conventions 2009\] [Code Conventions for the Java Programming Language|http://java.sun.com/docs/codeconv/]. Sun Microsystems, Inc. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c98005beb7b3ab5-58a04db4-4f2c4035-9ac7b8d4-7ccfbcd17c305f5d931ed91e"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
\[CVE 2008\] Common Vulnerability Exposure, MITRE Corporation. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64e02c8bea6763e4-d9372700-472e4716-b3619ffc-64652be6f67609303cd2b1ab"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
\[Coomes 2007\] [Garbage Collection-Friendly Programming|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2906.pdf] by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c8bac78470378f9-81eed079-4bc64a6b-9cb9ba05-8d6714a7069c50d2d2b505aa"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
\[Core Java 2004\] Core Java™ 2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2586822b5e161cca-9cf7e385-4c6a4c3d-903995cd-a110294f7fd3ada7813aba16"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
\[Cunningham 1995\] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2ab5fecf684b1c5-71468636-4c464aee-ad7398de-5c849ee88ecd399ad9d6280a"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
\[Daconta 2000\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com.  (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff29d3cc07b86aec-75e5267b-48a64fb2-9c55810b-d47d22f6f1e2eb3ef1f6dc2a"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
\[Daconta 2003\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c3b37123cffd3fe-126beccb-40e14f40-bd468fc6-fb9436a0d1e5bbe66a23d9b0"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
\[Darwin 2004\] Java Cookbook, by Ian F. Darwin (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86eef7f6e7d2b8fb-3e5579c3-4aa1493a-84cd84c5-6aff8b881567383c5e573fe1"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
\[Davis 2008\] [Unicode Standard Annex #15, Unicode Normalization Forms|http://unicode.org/reports/tr15/], by Mark Davis and Martin Dürst. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd0f0d3709c9df8f-5bc6db33-4eb24f24-a5209639-bb2de724958cc972a626a415"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
\[Davis 2008b\] [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/], by Mark Davis and Michel Suignard. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28c76e13fd628d1a-7d3e6de0-46024fb3-ba8fba60-f884260da8ebaa8702747f95"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
\[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/].

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fb0c8654c6c5e43-24e7df22-48914e50-a234aea6-7b9232c47c6038f23f6c051a"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
\[Dormann 2008\] [Signed Java Applet Security: Worse than ActiveX?|http://www.cert.org/blogs/vuls/2008/06/signed_java_security_worse_tha.html], by Will Dormann. CERT Vulnerability Analysis Blog. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61e513bad432ed8f-bcea1760-4adb463c-931bba26-3aaa88e266d4f16009c744c6"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
\[Doshi 2003\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfca865a56f2bff5-7391424a-407f4f50-ac2eacc5-859252d43205ace252054b8a"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
\[Eclipse 2008\] The Eclipse Platform (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97cc8283ae6c6633-503c42ea-4f7b4899-a4b0b2ea-51c59f15ed176cc5c00f3f80"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
\[Encodings 2006\] [Supported Encodings|http://java.sun.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c87065240c60a854-241ebd90-40994be6-94799d55-4b4bd331b63d59de50607700"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 2003\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0dea1279fda326d4-e65ffda9-480a4d18-b65382f0-9c4714700a12e60d1c8d8495"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
\[ESA 2005\] [Java Coding Standards|ftp://ftp.estec.esa.nl/pub/wm/wme/bssc/Java-Coding-Standards-20050303-releaseA.pdf], prepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d781b0f1b4dbbe6-badb9349-45dd41a5-b010b84b-fbf60ceb2253f8dfc9e09d69"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
\[Fairbanks 2007\] [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20649a9e66d12b9e-6cb463d4-4232455a-b739b95b-a51b2d3c61fd0609bf097a52"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
\[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1fb63bbad4d354b9-e9b3fe5e-4e164b17-83ec8a45-cc7ba65ed2691494a0576f44"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
\[Fisher 2003\] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ab2085a9bf0534f-d4a57b93-4ade429e-aa2fb00d-3eee97c69a94913ab40098f6"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
\[Flanagan 2005\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e82e162dd601c64-1af2a650-4a7f4eaf-b60db2d2-d2acc4f57b6a15e18a1e3de0"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
\[Fortify 2008\] [A Taxonomy of Coding Errors that Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] Java/JSP, Fortify Software. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5779820e2688a96-bc9025ce-4c594789-a93d921c-fdc781edeef58c41cee7bf64"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
\[Fox 2001\] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3ede4e1da21dcf3-9c48d8f1-41d74038-b1de9ae8-96f2608b02f6ecde87d7fce9"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
\[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm] Class FunctionTable, Field detail, public static FuncLoader m_functions. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de25ac6ddb0d2a78-4264e2e5-4eab4c46-871f9cb4-d077f799530c1e74ba98d3e0"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
\[Gafter 2006\] [Neal Gafter's blog|http://gafter.blogspot.com/], by Neal Gafter's. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88a8f0fcef1c09db-f9a216cb-440849dd-b74a9c9f-3e92a286415724f2389e62c1"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
\[Gamma 1995\] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="587ef5026d91799f-6ac53a42-48564aad-8ed180c4-a5b72f0c811162319f046599"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 2001\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4b2e275a1248b62-3386a0bc-40e34980-b4cfbbf9-80f9de7cbf669c1e69b0f181"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
\[Goetz 2002\] [Java theory and practice: Don't let the "this" reference escape during construction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="73d90ea93a84f7f3-9b41a86d-455e41f4-aee48969-e0c7958fd5d2b2ed5be92624"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
\[Goetz 2004\] [Java theory and practice: Garbage collection and performance|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63eb42d6c1bebc1d-3081392c-4bf74fc8-8b6594e6-ac0a8979bbad888981bc0195"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
\[Goetz 2004b\] [Java theory and practice: The exceptions debate: To check, or not to check?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bffc3dddd247dbfb-f841b163-46aa4dd3-8bb68b4f-b08c72fa685fbf2bcfca3bdb"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
\[Goetz 2004c\] [Java theory and practice: Going atomic|http://www.ibm.com/developerworks/java/library/j-jtp11234/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="454e61ac3d43ce2a-f5ba001b-4df44713-a046a1a5-39136af4b070662e83540d76"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
\[Goetz 2005\] [Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcf03521da457b93-10e44683-4d7147ad-8b0dbeab-f7452c53d3b7547260f6f306"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
\[Goetz 2005b\] [Java theory and practice: Plugging memory leaks with weak references|http://www.ibm.com/developerworks/java/library/j-jtp11225/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c9949c7415bb294-0767b64e-44ed4a3c-9141abfa-9369bd0c79de0b8634a66165"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
\[Goetz 2006\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="982aadfe5fe40b23-f6601b9c-4c884330-9bad90be-196a5d03fefad3505bd0048b"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
\[Goetz 2006b\] [Java theory and practice: Good housekeeping practices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1371b581f4525231-e80d2249-40dc47e1-9779b014-075c96b81442d5c747ea554f"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
\[Goetz 2007\] [Java theory and practice: Managing volatility, Guidelines for using volatile variables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html], by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology). (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="742cc12583a19b62-61a6c5cb-487247e5-a1a08d2a-45553abc9e25b761b027ca9f"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, Inc. March 1991. (1991)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f035515d1a9fc52c-8b0588a7-4c464832-a3028eb0-5ca69667a7db185dd63dcdca"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 2003\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="122f0dc9bea0d63b-b8963029-4e0e4000-9fa9bcd7-e8da8e385442e0aa44bb4b8b"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
\[Grand 2002\] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f14d3de2e5a05145-2ddbca1a-419e49a1-860cb17a-54cdb7f43e7759169ac970f9"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
\[Greanier 2000\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcb898399a50622f-218af67c-45a545e5-a5f99526-2127645d08ac390d145d2159"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
\[Green 2008\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eac8900aef1f5357-1a596cb7-42344f6a-94239f89-6634c6f629c8dfabed384812"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
\[Grigg 2006\] [Reflection On Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] by Jeffery Grigg. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2f16c1811ad5131-6b98e5c2-424c47ba-8fb29889-984a51e9e733be257af21367"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
\[Grosso 2001\] [Java RMI|http://oreilly.com/catalog/javarmi/chapter/ch10.html], by William Grosso. O'Reilly. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ac3460e31f208cb8-5f1caf8f-445b43b3-af32a31b-cf56c1c845603183493c57bb"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
\[Gupta 2005\] [Java memory leaks - Catch me if you can|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/], by Satish Chandra Gupta and Rajeev Palanki. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82dcf5ff87ff4d25-941339e7-43434a95-a3fbabf7-502cbc57ef232f44b8b56696"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
\[Haack 2006\] [Immutable Objects in Java|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable], by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3299a8b744b838e2-46c78dbf-4fa24105-a3afb099-39e5cfc5e55f5c66e611f343"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
\[Haggar 2000\] Practical Java™ Programming Language Guide, by Peter Haggar. Addison-Wesley Professional. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="facbe60e803b553e-52e003d4-4a974e8e-a54cb1f8-6d51e7ee4301011320d5462f"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
\[Halloway 2000\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/TechTips/2000/tt0328.html], March 28, 2000, by Stuart Halloway.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="712bdea66a63f352-36caa34d-482c4bfb-94bd834f-423f63078ac0949ffc7671a7"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
\[Halloway 2001\] [Java Developer Connection Tech Tips|http://java.sun.com/developer/JDCTechTips/2001/tt0130.html], January 30, 2001, by Stuart Halloway.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b88e87070c92c875-dca127e0-44c34542-9c90a763-8f4857c01b006b16f4097fe8"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
\[Harold 1997\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2575f34cfb0cf40-28f20346-45f84e48-9422b25f-acf477724f0da2d49241b56a"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
\[Harold 1999\] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="352eb4308d0d1bd0-28502eb0-4d374be3-acab9bed-1f5574feb3ac1fef6b8595d5"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
\[Harold 2006\] Java I/O, by Elliotte Rusty Harold (2nd Edition). O'Reilley. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbbe1e5c3c869a4d-5698cd8e-4a914426-b7a59b44-a5e3427dc6ab52cdd63b76fd"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
\[Hawtin 2008\] [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf] by Thomas Hawtin, Sun Microsystems, Inc. Make it Fly 2008, London. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba6bec2985559d2f-7d4425c2-415d40e6-a5d7b872-4129535454f6ee3707599b1b"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
\[Henney 2003\] [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b8d2a9804bfe666-bcf63026-4bd64b63-9e6ab6e3-97fdf1d8d121a7601a16f149"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
\[Hitchens 2002\] Java™ NIO, by Ron Hitchens. O'Reilly. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3b21f58662068c6-5994264c-4cd94df1-bee8954f-6cdfb3f5c61021355e6b5d44"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
\[Hornig 2007\] [Advanced Java™ Globalization|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2873.pdf], by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b22102610a8c0c17-fd042ca5-412d4cd0-aa838d55-bc7a94f291e4ff4d1afaf8fc"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
\[Hovemeyer 2007\] Finding more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b61279cf28b61e7-e402f244-496d4bd9-b3fb922b-84d7679cdf68d1757749aa8a"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
\[Hunt 1998\] Java's reliability: an analysis of software defects in Java, by J. Hunt and F. Long. Software IEE Proceedings. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f67a0e37f1144704-8bb31d4f-41fe46a6-b9ec9acf-beaaf92313e61b2ee906e271"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
\[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76573d771fd49a47-4f59266b-4e9346d5-a1c88c42-b484886916d83b3961d9cccb"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
\[IEEE 754 2006\] IEEE. [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9bcba53aeacdb084-48401351-42d3400e-a8618b84-f9f9fbaf1b5e605d50ec8bbc"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 2000\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/], Sun Microsystems, Inc. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fb6baf6cd852fb8-cd65c97b-441f4b40-99b69024-97954bdcecc5a25b28d2c8c0"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
\[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://java.sun.com/j2se/1.5.0/docs/guide/jar/jar.html], Sun Microsystems, Inc.  (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1469ac266a9b8d2e-b6c154bf-4ea8492c-ac5e9f12-1dc12fd920c3582cc2ba5800"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
\[Java 2006\] [java - the Java application launcher|http://java.sun.com/javase/6/docs/technotes/tools/windows/java.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8da6273cad90ec5-9119386b-48324996-92599c2b-00ee9fdccb8c3f889c61792f"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
\[Java2NS 1999\] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9a3b9b7d0e0b4e0-233b12df-49414c4d-9a18ab60-ea74bff8de9a11b1d3ba646f"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
\[JavaGenerics 2004\]&nbsp;\[[http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems, Inc. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3e153acf27d3dc7-9feefc07-42f94f25-adbc91be-dcc281a0db973e9a5d71003d"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
\[JavaThreads 1999\] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75760c8c794bc2aa-853206ff-4fc64aaa-8370b52d-7e4a1e94a875c03610a66555"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
\[JavaThreads 2004\] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="282a2c2e51dd0b01-e787ed3a-495046c0-88849a09-5bc196d3812ed0a247f0f269"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
\[JDK7 2008\] [Java™ Platform, Standard Edition 7 documentation|http://download.java.net/jdk7/docs/], Sun Microsystems, Inc., 19 Dec 2008. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9445e6027481853b-c965486b-412e4b85-b962b5a1-3602d123a308df03a8315b74"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 2005\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1436c80c54858a51-e0dff6dc-40ab4144-b2a3b29d-e8c911d9364e2c3369614b92"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
\[JMX 2006\] [Monitoring and Management for the Java Platform|http://java.sun.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="111dbb0420637888-38c76ba9-455a4e9a-88b69150-98596a7ba0fe8a604ee8617a"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
\[JMXG 2006\] [Java SE Monitoring and Management Guide|http://java.sun.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7478de985fd7940-463ec1cb-4375486a-ac8dba73-ebea041eea28a290c3dd2286"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
\[JNI 2006\] [Java Native Interface|http://java.sun.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e408b6dbc87cef4-3219823c-45d949f5-be69af95-f91aaed3ba48f3d37985e44c"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
\[Jovanovic 2006\] Nenad Jovanovic, Christopher Kruegel, Engin Kirda, [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29], Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), p.258-263, May 21-24 (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e87125414281422f-ae3a94cc-47d7485e-8eff9f20-0711f1e6160332dcdb9699d3"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
\[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://java.sun.com/javase/6/docs/technotes/guides/jpda/index.html], Sun Microsystems, Inc. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d6e60b566eddc4e-41def4e3-4fe74625-bf338bda-31a139523235cfac28a5c88a"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
\[JPL 2006\] The Java™ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4aebc8ef0f66019-c808be0f-4f84456c-b5dc88c1-cc758c12fbf7f922a44248ce"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
\[JSR-133 2004\] [JSR-133: JavaTM Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf]. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1d2c8f8f17cdd6a-842c3a50-49cf4c6a-af848a64-9b95cb77fd8a84ec9b55aecd"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
\[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://java.sun.com/javase/6/docs/technotes/guides/jvmti/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e902ccfdac9d7eb5-97c6c96a-4b1f4196-b74c8828-08df69066bcb44b980c73a58"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
\[JVMSpec 1999\] [The Java Virtual Machine Specification|http://java.sun.com/docs/books/jvms/], Sun Microsystems, Inc. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b565ebd636f95f86-a90c6f29-41fc4753-83d38b6d-89be23915783a3bffeaeddab"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
\[Kabanov 2009\] [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="274b3cf49f70aaaa-d9144cd9-44174af0-91849c62-a492e55d7b60bd0153b49c43"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
\[Kabutz 2001\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="480e92054eb074aa-d37a6e0d-41204e6c-a6bf8c8d-c35a312223fc5ec352026794"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 2004\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing.  (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d1a61840be75c3e-a4cc35d2-44b740ee-8f06880a-52fb438c04a541b62f02fc9a"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
\[Knoernschild 2001\]  Java™ Design: Objects, UML, and Process, by Kirk Knoernschild. Addison-Wesley Professional. (2001)

...

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="741a8731b2b1c30e-134b9b7a-4acd4825-ab3987dd-9278ecb3b8b154abe78cd191"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
\[Langer 2008\] [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ba2e99a8916afe9-5890bb92-440d413d-b85f9634-29050ccf4c55db8a76b81b32"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 2000\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3bce7e8a7292d673-24029bb5-48044d2e-a792badf-4bdefacd7565da9144abcb3b"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
\[Lea 2000b\] [Correct and Efficient Synchronization of Java™ Technology based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf], by Doug Lea and William Pugh. JavaOne Conference. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="672e5a7f21f7227b-8eb5dd57-48c14629-9c10b608-62b9c8074626834acf07e3ca"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
\[Lea 2008\] [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html], by Doug Lea. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c40195c82705f0c4-70ee5c48-4a6d4f7d-92fea479-c40626cdea8f3dca632fce17"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
\[Lee 2009\] [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf], by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db8b30f420105d6f-d52688f4-4f824c58-b0f098ee-c86067c25e9878a1681b17ff"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
\[Liang 1997\] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="916191c2818324ef-8c411f17-47234586-8c64b0bc-0c74286236235528d32b3387"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
\[Liang 1998\] [Dynamic Class Loading in the Java™  Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945], by Sheng Liang and Gilad Bracha. Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9fded1552aa35b6-2ce22e1e-414042a2-958389c3-5aa4d0d70a595be934f2e495"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
\[Lieberman 1986\] [Using prototypical objects to implement shared behavior in object-oriented systems|http://portal.acm.org/citation.cfm?id=28718]. In: Conference proceedings on Object-oriented programming systems, languages and applications. Portland 1986, p. 214-223 ISSN 0362-1340, by Henry Lieberman, Massachusetts Institute of Technology. (1986)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b1d87625fb59f2e-4d33b866-41964804-a41c8f55-ab27b6bb883cdf8d2510b78e"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
\[Lo 2005\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b377215c60d1113f-ed5829f5-47e442c2-960abfd2-d9d908dc1841f2b9eab40db1"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
\[Long 2005\] [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long, CMU/SEI-2005-TN-044. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d82a7a4fa6ced35c-623d2aee-4ad14a5f-9cd5b7bf-9e2acf160919d7960454d33d"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
\[Low 1997\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f330bb81088162ba-3d5f08ef-450a4582-8ebb80cb-59dfda188d9cee84b5119e13"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
\[Macgregor 1998\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9cb2f8015217d1f7-2c30d81d-49824b69-80fc8204-f27cf1c33dc7594b33368bac"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
\[Mahmoud 2002\] [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/], by Qusay H. Mahmoud. Oracle. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="81f009198fafc0e9-ed6fdaa7-4b364ae4-9c4cb17f-9b65b293c5b3dd68c2e0ec3b"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
\[Mak 2002\] Java Number Cruncher, The Java Programmer's Guide to Numerical Computing, by Ronald Mak. Prentice Hall. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2efd1c8d9e33bf6-4ac1c89f-445940b3-a4e593ba-15e6a9019c71ea57122851e1"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
\[Manson 2004\] [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight], by Jeremy Manson and Brian Goetz. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d514bff1f51390c2-9fb30278-49974b9b-8b8eb9d9-bc6d69e652d7469f9f6be2f9"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
\[Manson 2006\] [The Java™ Memory Model: the building block of concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf], by Jeremy Manson and William Pugh, JavaOne Conference. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f4f0651251db6fc-a426c7f3-4de448f1-9d698cad-4099c84984063bdc16921830"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
\[Martin 1996\] [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf], by Robert C. Martin. (1996)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="108ff510096f5753-c3d7038d-42464978-815fb301-4831406ea51e9e079d00f8c3"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
\[McCluskey 2001\] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2d9ff16c219b9194-fc4411d7-4ebe4865-94919177-fad2058bf3e1f35ae0b182fc"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 2000\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d04cf178ccc12ec5-2f1f7a38-425b49bd-b8e2a344-df3aa7ee92c33fc17443f974"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
\[Mcgraw 1998\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary Mcgraw and Edward Felten, JavaWorld.com. (1998)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c668cc223ac6fdeb-ad5f0296-43c54a1a-9de08e01-9e661f67b10e0ba6a2c7b239"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
\[Miller 2009\] [Java™ Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf], by Alex Miller, Terracotta. JavaOne Conference. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d2214e266c042e1-7d5f267c-464e4a72-8e438de3-465583e12cfe5c0e1942671b"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
\[MITRE 2009\] [Common Weakness Enumeration|http://cwe.mitre.org/], MITRE Corporation. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ead6cf5cc372997-744ea758-40624e7f-888eba0c-e41e0a11372defee3974fe5f"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87cfbbd1a31bf829-fac6c1bc-4b194cc5-aba3877e-1b195119852c43788f27f74c"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
\[Monsch 2006\] [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p] Version 1.0, by Jan P. Monsch. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6be166d26539236f-996332b7-460048fc-b19191fd-ec3469de25a6e6b3717874e1"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
\[MSDN 2009\] [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx], Microsoft Corporation. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98e30762d9717ce5-398d5e74-46f94abe-b7af8edb-0552a2e54fd843bb7ef0c243"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
\[Muchow 2001\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e363272581c0129-3ed25fbb-41334cdc-9f498305-e9b30fb86f5e3a301b577538"><ac:parameter ac:name="">M&amp;#xFC;ller 02</ac:parameter></ac:structured-macro>
\[Müller 2002\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fc8edbc21873bd9-598f1f79-49164efe-95e8bda5-eaf3a70e74dc4b10dd33d6d3"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
\[Naftalin 2006\] Java Generics and Collections, Maurice Naftalin and  Philip Wadler, O'Reilly (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="281603a2f3a3bd39-6022a9e7-445a4438-9034af34-882ddc78752c55caa7e1e148"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
\[Naftalin 2006b\] [Java™ Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c0f150d0a0fab66-4673b1ef-4b884d9d-9cceaa95-5c8012491dff740e3b4d608c"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
\[Netzer 1992\] [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623], by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin --- Madison. (1992)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2d95f8f360e00b76-f29c8f73-49d5417a-9e268815-17b3d1309dad3ce2da8795af"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
\[Neward 2004\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf9a3277beb4c736-2605c650-4dd04e28-a9e7a036-aadb0d31688861242ba644a3"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
\[Nisewanger 2007\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="326e5a6c13105fa8-093624cb-46d04657-94db8f2d-668d6f264d524a5f1b66bd83"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
\[Nolan 2004\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76c28418f3866d50-b896f4c3-460d4ffa-b7dea3d0-2b2d6e0ed48e442289fe66f1"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 2001\] Java Security, by Scott Oaks. O'REILLY. (2001)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa05615e925be7ec-e3dce070-4fc646c7-88ec9f01-358ddf53cb1b00362a7138b2"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
\[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://java.sun.com/javase/technologies/hotspot/gc/gc_tuning_6.html], Oracle Corporation.  (2010)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd6c78b60ebe723e-07347826-4e7f44dc-87da9f30-66c7976d035c812a49ec8f5f"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
\[OWASP 2005\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bee49e1e7018e933-db84cbe8-4baa4ea4-87a1b9be-c8c8270c827208352433ecd4"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
\[OWASP 2007\] [OWASP TOP 10 FOR JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf]. The Open Web Application Security Project. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb93277f4fe6d73c-972d96c4-46b047c4-a575846e-79a6f01d37034e94d82bbe26"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
\[OWASP 2008\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69fa297c362e103b-392cfd35-4a2c482a-b8739649-c3c19da00d32f2385d97a4cf"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
\[Permissions 2008\] [Permissions in the Java™ SE 6 Development Kit (JDK)|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html], Sun Microsystems, Inc. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f03e07202e2ea43a-74f7214a-40704d74-96bb9033-61d2edbb9c7c983d4caf6866"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
\[Philion 2003\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef39f1652d78ea15-63bfb629-48004ff4-89ba9250-8f99b8a3f94e8bde4b72f5a5"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
\[Phillips 2005\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea5da43cbbfc0615-dbe3677d-4c5e496c-9933bb98-8bca8c20e78af6ffbcbbbfe9"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
\[Pistoia 2004\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4062299a220f436-6cc94f5c-43f5451d-8ea68398-ec2856ea02646fc1fd2ef062"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
\[Policy 2002\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32499d28f644ff48-4eb51e4c-4b114084-b5ca8e4d-39e869bb8415c5945fdfebf5"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
\[Pugh 2004\] [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/] by William Pugh, Univ. of Maryland. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8242d148f9e63f17-f7b4ae8a-4c9441a6-8fd5b371-6500418cf37aa9cef27f0192"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
\[Pugh 2008\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae758395e32b2d4b-346abc94-4c3447fe-a7a1a94c-f38a1083a71bb20425135c99"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
\[Pugh 2009\] [Defective Java Code: Mistakes That Matter|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5335.pdf], by William Pugh, Univ. of Maryland. JavaOne Conference. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f592aa58b4bad04-e6f66bf3-4cb54e1d-bfe48fa5-69d671efdc7142bcb0cfcbbb"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
\[Reasoning 2003\] [Reasoning Inspection Service Defect Data Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf], Reasoning. 14 Nov 2003. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d9e5edac737bae0-00d47868-4b9741b8-82de804c-49bdcd81a533f8acea233bb8"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
\[Reflect 2006\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a97782be-1262-4919-b75d-171a2af9d3ec"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
\[Rogue 2000\] [The Elements of Java Style:http://www.ambysoft.com/books/elementsJavaStyle.html], by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a16315ce82689401-84250643-4690435d-90779f23-d49faa857c43e3d09dc8cf7b"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
\[Rotem 2008\] [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf], by Arnon Rotem-Gal-Oz. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ddacc0acfd6584e8-264c1557-461f4884-8405aae2-a4cf7bdb30075f1c296eb6cd"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
\[Roubtsov 2003\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com.  (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9d72a546786e7d8-355668be-4ca9403f-af9084ce-373d74ccca87eb3d9216be0d"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
\[Roubtsov 2003b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com.  (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="22fe5fe10e75e07e-94229ba2-497e4dae-9ef7a0df-3bb06d087f56388c2af5cd57"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
\[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8956c9b8e8f25525-25ddc2cc-47004392-bab3a4fc-51e2eddd1eceeb8ce752d339"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
\[Saltzer 1975\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="406e89cdc77afc47-307058d1-4ed74509-87f8b99f-96d0c395062aec49e9abc8e5"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 2007\] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="598638163f5ea0e5-accf90b0-4f254361-8d35ad0c-f3d0d8bb74a206f303d95d8a"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
\[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|http://java.sun.com/security/seccodeguide.html], Sun Microsystems, Inc. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae021e31f5064066-08ef5c34-4cb545ac-93cc9b7e-2fc49247453bc72cbcacd811"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
\[Schildt 2007\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="878df4a680507a8f-dc3a8f51-458a41b5-aed5bd47-f3335fb309babc8674c7d51d"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
\[Schneier 2000\] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8520b958a039560a-7ad5a7a5-4d2f4541-92458bb6-aa7eae9fb31961d435d0fdff"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
\[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54  BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aef8105bda16a3d4-6b0deb5f-4cb94a22-8b5396ad-102c21ff14f541cdab34c9a3"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
\[Schwarz 2004\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc0cc063ddd2fc2a-39972dd0-49664105-8e20a9f6-1170570b71dfdc3e154d1340"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
\[Schweisguth 2003\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by  Dave Schweisguth. Javaworld.com. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca7d1386c4fb5279-30de801a-4b254734-ae0aa13b-d7e6d3d94b24ea1369063ec2"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
\[SDN 2008\] [SUN Developer Network|http://developers.sun.com/], Sun Microsystems, Inc. (1994-2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fae8b8a1a5fa425f-299692f2-46504b46-8a9ea29f-70093cfb69f00322811e4b6d"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
\[Seacord 2005\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005)
See [http://www.cert.org/books/secure-coding] for news and errata.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89848ae0d57fd9b1-08328fa8-452d4dcd-86dc8d49-1b36299c86a1b53633b6e13d"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 2006\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7798e6bc92f38787-21de544a-4b154fdc-90f2a7b3-ed22c518a40fc03fcf9d69e2"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 2006\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f65618918b1988d-17e932fe-42b3459a-a43396bc-acd967a5b099a0fde4abd96a"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
\[SecuritySpec 2008\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html], Sun Microsystems, Inc. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4bfd6454e160b80-0d5f768a-4fc544f1-b15ca011-1004aa159447adcef973fdd3"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
\[Sen 2007\] [Avoid the dangers of XPath injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html], by Robi Sen, IBM developerWorks. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5fbc5a6da4d7ab20-f453d002-47cc490b-a2798e39-c734ceb29c16921c2878dda7"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
\[Steel 2005\] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2d60b5eefef3d60-1eda8995-4fe7446a-82948ff5-4267d6bd7cf445d54c4073c7"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
\[Steinberg 2005\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], Daniel H. Steinberg, January 4, 2005. (2005)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51bd7a8960f18c34-a88df0e4-467e485e-90dcaac9-bc498d3d94b176d5c077aef4"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
\[Sterbenz 2006\] [Secure Coding Antipatterns: Avoiding Vulnerabilities|http://gceclub.sun.com.cn/java_one_online/2006/TS-1238/TS-1238.pdf], by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da40167cdd88c58a-24fbd8f5-4068477e-aeaf8556-723c47e13fa90b7e474b5398"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
\[Steuck 2002\] [XXE (Xml eXternal Entity) attack|http://www.securityfocus.com/archive/1/297714], by Gregory Steuck (www.securityfocus.com). (2002)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="025b535cf8d39f74-d45c9fb2-43764bfd-a82d89eb-ea3cc364cdcad6510235010f"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
\[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://java.sun.com/j2se/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html], Sun Microsystems, Inc. (1999)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a750f5992cc96a8d-c8d79a6d-44634033-95ed8b9a-98afbcca42c0ab8fec33b043"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
\[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/], Sun Microsystems, Inc. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="59681a79feda7f56-63cbc7c7-4f2141b4-89cd8717-a1f8f34c452ae12aff9cf1bf"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
\[Sun 2006\] [Java™ Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html], Sun Microsystems, Inc. (2006)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b0266e46479bfdc-3e93d041-46004191-9a9d85da-7bc37822331a70aa43a3cf80"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
\[Sun 2008\] [Java™  Plug-in and Applet Architecture|http://java.sun.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html], Sun Microsystems, Inc. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7300c0bc9703ba8b-3111e53f-431742e7-bc6382be-645c137aac2339a2813eba2d"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
\[Sutherland 2010\] [Composable thread coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485], by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a575dda280d7cbb4-d320ced7-4e024156-90738bab-b6ddb2a9da52386e31d25c25"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
\[Tanenbaum 2003\] Andrew S. Tanenbaum, Maarten Van Steen. [Distributed Systems: Principles and Paradigms, 2/E|http://www.pearsonhighered.com/educator/academic/product/0,,0132392275,00%2ben-USS_01DBC.html]. March, 2003. ISBN-10: 0132392275.

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="81f474d6008e0725-13dc5392-405e40d8-a5f6b4d3-67e58831b858acaf4328cd49"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
\[Techtalk 2007\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference. (2007)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ee51343ee29c699-7dd54c3e-443e4a6c-82418b2c-e85a21baf11f335d66abee56"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
\[Tomcat 2009\] Tomcat documentation, [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security fixes|http://tomcat.apache.org/security-6.html], the Apache Software Foundation. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f839420117b2ee33-c1407625-4c35481b-828c87ea-c557b81e3aa65093f72334fa"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
\[Tutorials 2008\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html], Sun Microsystems, Inc. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb0bab4be18bb745-7317bd9e-451848b9-9340a5e9-060e6ed1e2b747edd29e1fde"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
\[Unicode 2009\] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: [_The Unicode Standard, Version 5.2_|http://www.unicode.org/versions/Unicode5.2.0/], Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c151162bf1b05c0-a9ee3ba6-4c6245b6-b3638870-f8723172fc3acf0b6e5024ea"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
\[Venners 1997\] [Security and the class loader architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1] Java World.com, by Bill Venners. (1997)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a07200607764d1e-a70ec8ed-4eeb476c-95239add-a236daac0310456773f87804"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
\[Venners 2003\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8bc97206847c2be0-2b7afff4-47024e67-aa6ebd37-0d51df0538287e200c970bc3"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
\[W3C 2008\] [Extensible Markup Language (XML) 1.0 (Fifth Edition)|http://www.w3.org/TR/REC-xml/#include-if-valid], W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f81e9d0546afbb86-2a5513e1-40244e75-bfcba4fb-6727c849bd0deb84992bbf0f"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
\[Ware 2008\] [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/], Michael S. Ware. (2008)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8594a247b28b6ee8-29ea40de-4fc84fc1-b906b036-b1e88337321c045a48b190f2"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
\[Weber 2009\] [Exploiting Unicode-enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf], by Chris Weber, Casaba Security. CanSecWest March 2009. (2009)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64f13544dd961a58-3dc82da5-4fd249bb-9e72b75c-59e566dd4d6ed288d021b449"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
\[Wheeler 2003\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler. (2003)

Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="798e4f937d86d796-3b83000b-49844026-922f8ce1-bbbe9562ccb788792d0299b4"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
\[Zukowski 2004\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], John Zukowski, May 18, 2004. (2004)