[Apache 2014] Apache Tika: A Content Analysis Toolkit. The Apache Software Foundation (2014). [API 2006] Java Platform, Standard Edition 6 API Specification, Oracle (2006). [API 2011] Java Platform, Standard Edition 7 API Specification, Oracle (2011). [API 2014] Java Platform, Standard Edition 8 API Specification, Oracle (2014). [Arnold 2006] Ken Arnold, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed., Boston: Addison-Wesley (2006). [ASVS 2019] OWASP Application Security Verification Standard Project (2019). [Black 2004] Black, Paul E., and Paul J. Tanenbaum. "Partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004). [Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001). [Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005). [Bloch 2008] Bloch, Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).[Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996). [Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48–54 (1981). Anchor |
---|
| Conventions 09 |
---|
| Conventions 09 |
---|
|
[Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009). [Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007). [Core Java 2004] Horstmann, Cay S., and Gary Cornell. Core Java™ 2, Vol. I: Fundamentals, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004). [Coverity 2007] Coverity Prevent User's Manual (3.3.0). Coverity (2007).[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls: 50 New Time-Saving Solutions and Workarounds. Indianapolis, IN: Wiley (2003). [Davis 2008] Davis, Mark, and Ken Whistler (Ed.). Unicode Standard Annex #15: Unicode Normalization Forms (2008). [Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155 (1966). doi: 10.1145/365230.365252. Anchor |
---|
| Dougherty 2009 |
---|
| Dougherty 2009 |
---|
|
[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).[ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005). [FindBugs 2008] FindBugs Bug Descriptions (2008/2011). [Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005). [Fortify 2014] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2014).[GNU 2013] GNU Coding Standards, §5.3, "Clean Use of C Constructs." Richard Stallman and other GNU Project volunteers (2013). [Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Boston: Addison-Wesley Professional (2006). [Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2007). [Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Boston: Addison-Wesley (2003).
[Goodliffe 2007] Pete Goodliffe. Code Craft: The Practice of Writing Excellent Code. San Francisco: No Starch Press (2007). [Grand 2002] Grand, Mark. Patterns in Java, Vol. 1: A Catalog of Reusable Design Patterns Illustrated with UML, 2nd ed. Indianapolis, IN: Wiley (2002).[Grubb 2003] Penny Grubb, and Armstrong A. Takang. Software Maintenance Concepts and Practice, 2nd ed. River Edge, NJ: World Scientific (2003). Anchor |
---|
| Guillardoy 12 |
---|
| Guillardoy 12 |
---|
|
[Guillardoy 2012] Guillardoy, Esteban. Java 0-day Analysis (CVE-2012-4681) (2012).[Hatton 1995] Hatton, Les. Safer C: Developing Software for High-Integrity and Safety-Critical Systems. New York: McGraw-Hill (1995).[Havelund 2009] Havelund, Klaus, and Al Niessner. JPL Coding Standard, Version 1.1 (2009) [Hawtin 2006] Hawtin, Thomas. [drlvm][kernel_classes] ThreadLocal Vulnerability. MarkMail (2006). Anchor |
---|
| Hirondelle 13 |
---|
| Hirondelle 13 |
---|
|
[Hirondelle 2013] Hirondelle Systems. Passwords Never Clear in Text (2013). [ISO/IEC 9126-1:2001] Software Engineering—Product Quality—Part 1, Quality Model (ISO/IEC 9126-1:2001). Geneva, Switzerland: International Organization for Standardization (2001). [ISO/IEC 24765:2010] Systems and Software Engineering—Vocabulary (ISO/IEC 24765:2010). Geneva, Switzerland: International Organization for Standardization (2010). [JLS 2013] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2013). Anchor |
---|
| Jovanovic 06 |
---|
| Jovanovic 06 |
---|
|
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258–263, May 21–24, Oakland, CA (2006). [JPL 2006] Arnold, Ken, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed. Reading, MA: Addison-Wesley Professional (2006).[JVMSpec 1999] The Java Virtual Machine Specification. Sun Microsystems (1999). [JVMSpec 2013] The Java Virtual Machine Specification: Java SE 7 Edition. Oracle America (2013). [Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009). Anchor |
---|
| Kalinovsky 04 |
---|
| Kalinovsky 04 |
---|
|
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004). Anchor |
---|
| Knoernschild 02 |
---|
| Knoernschild 02 |
---|
|
[Knoernschild 2002] Knoernschild, Kirk. Java™ Design: Objects, UML, and Process. Boston: Addison-Wesley Professional (2002).[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Boston: Addison-Wesley (2000). [Lo 2005] Lo, Chia-Tien Dan, Witawas Srisa-an, and J. Morris Chang. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October). [Long 2012] Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and David Svoboda. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Boston: Addison-Wesley (2012).[Manion 2013] Manion, Art. Anatomy of Java Exploits, CERT/CC Blog (January 15, 2013).[Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57–62 (1996).[McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code, 2nd ed. New York: Wiley (1999). [Mettler 2010] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI: 10.1145/1814217.1814224, 2010. [Miller 2009] Miller, Alex. Java™ Platform Concurrency Gotchas. JavaOne Conference (2009). [Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74–88 (1992). [NIST 2017] NIST Special Publication 800-63 (2017).[Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001). [Oracle 2008] Permissions in the Java™ SE 6 Development Kit (JDK). Oracle (2008). [Oracle 2010a] Java SE 6 HotSpot™ Virtual Machine Garbage Collection Tuning. Oracle (2010). [Oracle 2010b] New I/O APIs. Oracle (2010). [Oracle 2011a] Java PKI Programmer's Guide, Oracle, 2011. [Oracle 2011b] Java Platform™, Standard Edition 6 Documentation, Oracle, 2011. [Oracle 2011c] Package javax.servelt.http, Oracle 2011. [Oracle 2011d] Permissions in the Java™ SE 6 Development Kit (JDK), Oracle, 2011. [Oracle 2012a] API for Privileged Blocks. Oracle (1993/2012). [Oracle 2012b] "Reading ASCII Passwords from an InputStream Example," Java Cryptography Architecture (JCA) Reference Guide. Oracle (2012). [Oracle 2012c] Java Platform Standard Edition 7 Documentation. Oracle (2012). [Oracle 2013a] API for Privileged Blocks, Oracle, 1993/2013. [Oracle 2013b] Reading ASCII Passwords from an InputStream Example, Java Cryptography Architecture (JCA) Reference Guide, Oracle, 2013. [Oracle 2013c] Java Platform Standard Edition 7 Documentation, Oracle, 2013. [Oracle 2013d] Oracle Security Alert for CVE-2013-0422, Oracle, 2013. [OWASP 2005] OWASP (Open Web Application Security Project). A Guide to Building Secure Web Applications and Web Services (2005). [OWASP 2008] OWASP. Open Web Application Security Project homepage (2008). [OWASP 2009] OWASP. Session Fixation in Java (2009). [OWASP 2011] OWASP. Cross-site Scripting (XSS) (2011). [OWASP 2012] OWASP. "Why Add Salt?" Hashing Java (2012). [OWASP 2013] OWASP. OWASP Guide Project (2011).
[Paar 2010] Paar, Christof, and Jan Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. New York: Springer (2009). (Companion website contains online cryptography course that covers hash functions.)
[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004). [Policy 2010] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Oracle (2010).[Reddy 2000] Reddy, Achut. Java Coding Style Guide. (2000). [Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000). [SCG 2010] Secure Coding Guidelines for the Java Programming Language, version 4.0. Oracle (2010). [Seacord 2009] Seacord, Robert C. The CERT C Secure Coding Standard. Boston: Addison-Wesley (2009).[Seacord 2012] Seacord, Robert, Will Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch. Source Code Analysis Laboratory (SCALe) (CMU/SEI-2012-TN-013). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2012. http://www.sei.cmu.edu/library/abstracts/reports/12tn013.cfm. [Seacord 2013] Seacord, Robert C. Secure Coding in C and C++, 2nd ed. Boston: Addison-Wesley (2013). See http://www.cert.org/books/secure-coding for news and errata. Anchor |
---|
| SecuritySpec 08 |
---|
| SecuritySpec 08 |
---|
|
Anchor |
---|
| SecuritySpec 10 |
---|
| SecuritySpec 10 |
---|
|
[SecuritySpec 2010] Java Security Architecture. Oracle (2010). [Sen 2007] Sen, Robi. Avoid the Dangers of XPath Injection. IBM developerWorks (2007). [Sethi 2009] Sethi, Amit. Proper Use of Java's SecureRandom. Cigital Justice League Blog (2009).[Steinberg 2008] Steinberg, Daniel H. Using the Varargs Language Feature. Java Developer Connection Tech Tips (2008). [Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006).[Sun 2006] Java™ Platform, Standard Edition 6 Documentation. Oracle (2006). Anchor |
---|
| Sutherland 10 |
---|
| Sutherland 10 |
---|
|
[Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. Composable Thread Coloring. In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. New York: ACM (2010). [Tools 2011] JDK Tools and Utilities Specification. Oracle (2011). [Tutorials 2013] The Java Tutorials. Oracle (2013). [Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by The Unicode Standard, Version 5.2. Mountain View, CA: The Unicode Consortium (2009). [Unicode 2013] The Unicode Consortium. The Unicode Standard, Version 6.2.0, defined by Unicode 6.2.0. Mountain View, CA: The Unicode Consortium (2013). [Vermeulen 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).[Viega 2005] Viega, John. CLASP Reference Guide, Volume 1.1. Secure Software (2005). [W3C 2003] The World Wide Web Security FAQ. World Wide Web Consortium (W3C) (2003). [Ware 2008] Ware, Michael S. Writing Secure Java Code: A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools (thesis). James Madison University (2008). [White 2003] White, Tom. Memoization in Java Using Dynamic Proxy Classes. O'Reilly onJava.com (2003). [Zadegan 2009] Zadegan, Bryant. A Lesson on Infinite Loops (2009). Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a0d0739-3fb5-4229-a5f8-f9bee9610d78"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
\[API 06\] [Java Platform, Standard Edition 6 API Specification|http://java.sun.com/javase/6/docs/api/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1992eefc-fba8-4ec5-a9af-9b5b9afb38c7"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
\[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f1f4fe8-01c4-4074-b855-4b35723f3d6d"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
\[Bloch 05\] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c36756fe-9531-48e8-975c-01d01ba8adfe"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
\[Bloch 08\] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="18305853-9cf2-4e90-9244-b6d489168ac4"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
\[Campione 96\] [The Java Tutorial, by Mary Campione and Kathy Walrath|http://www.telecom.ntua.gr/HTML.Tutorials/index.html] (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce3d9a74-f928-451c-959f-b59ba8d6a74f"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
\[Chan 99\] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff014af6-a407-4b84-be65-c515f609464a"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
\[Daconta 00\] [When Runtime.exec() won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html], by Michael C. Daconta, JavaWorld.com. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="892757af-0246-4e6d-95c0-f6f5b43b70ac"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
\[Daconta 03\] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="284db678-ba8c-414a-ae87-1e579c4ce225"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
\[Darwin 04\] Java Cookbook, by Ian F. Darwin (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5fb8f8b-c2ea-4e57-9386-4d12a7fd7dec"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
\[Doshi 03\] [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html] by Gunjan Doshi. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="968be1b1-9202-4e04-99d2-5070029544f4"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
\[Enterprise 03\] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a45794db-89e0-4c16-bef5-f3d3c5fee6ef"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
\[FindBugs 08\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2171ef52-b921-4175-b703-6c073ebf225f"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
\[Fisher 03\] JDBC API Tutorial and Reference, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab1bce9a-9319-4a1c-af6e-85d9426d8fdb"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
\[Flanagan 05\] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3bef79ff-abde-44a6-89d0-befb8ddbf0e2"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
\[Garms 01\] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb684c90-9a6a-48d4-aa5a-ab7e9182ef71"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
\[Gong 03\] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fbe773c-eb5e-4251-b6bf-d725447343d1"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
\[Greanier 00\] [Discover the secrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier, Sun Developer Network (SDN). (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dd2ec51-86f9-4998-8fb6-b7c2f8e764cc"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
\[Green 08\] [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dcc51d45-d6fe-4c8a-b954-73f11297620c"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
\[Goetz 06\] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b967c924-6d94-40e6-b60a-0268c8ae348f"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
\[Harold 97\] Java Secrets by Elliotte Rusty Harold. Wiley. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00e08e6b-2864-497a-bf5b-9fb13934be86"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
\[Harold 99\] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db409f78-9347-4a85-852c-8f029bc06b2d"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
\[J2SE 00\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. [J2SE Documentation version 1.3|http://java.sun.com/j2se/1.3/docs/guide/] (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3bf860f-e4ca-4527-832e-8132b113757e"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
\[JLS 05\] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. [The Java Language Specification.|http://java.sun.com/docs/books/jls/index.html] (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a1ea4c7-2411-4654-91e4-c7a10e3d5ab0"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
\[JLS 06\] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55d0ce93-7610-4b59-9f38-65cc82a7caf9"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
\[Kabutz 01\] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="012fe670-b034-4e7d-b775-247fad34e6ba"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da197654-6351-4407-bf8a-0c1043da463b"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
\[Lea 00\] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cfd5906-c82a-4638-8dcb-37c14cea7225"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
\[Liang 97\] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a0144ee-d9b5-4ec4-9e5c-296bf7b2c3a7"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
\[Low 97\] [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65faae4c-5b39-4fed-ba52-88ba0139aede"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
\[Kalinovsky 04\] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="202d4d0e-d7ac-4224-8f8a-768be0a87539"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
\[McGraw 00\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b0a96a91-c0d2-428f-940c-634e3cd5d59f"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
\[Macgregor 98\] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24ccdf27-02bf-4d43-8940-b9a3dd530249"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
\[Mocha 07\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a6cbf370-f75d-4e3f-a997-9acd25dbcf6d"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
\[Müller 02\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4577b4f8-60ec-4001-a8ef-e6aabd09a2ae"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
\[Oaks 01\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="403a6cde-8724-4a27-a892-b509b4329cde"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
\[OWASP 08\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4358d52b-e48a-4bb5-9b32-5ce0acf99aa9"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
\[Pistoia 04\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b158be0-027e-425a-bf57-44279d43b418"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
\[SCG 07\] [Secure Coding Guidelines for the Java Programming Language, version 2.0|http://java.sun.com/security/seccodeguide.html] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="214f3dfd-45f8-4127-8df2-eed334c6f307"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
\[SecArch 06\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bea49c15-0168-47e6-a1d4-4c56f11a058e"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
\[Security 06\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/] (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f73a4b8-216d-4953-afa4-ac67e4219b02"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
\[Steel 05\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005) |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1429335c-466f-43fe-86f8-40fd31a0c4da"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
\[Tutorials 08\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html] (2008)