You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 11 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9fd11e93-0385-4163-adfb-0971a07676eb"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d89d81e-df40-4f82-b095-1d889a8bb7a3"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9900d2c6-84f0-471e-9996-0d3d1d144413"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="688533ea-dd4c-44d1-8bf3-dd8790186024"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cab24f1b-1a6b-438d-80a3-57fd485e8274"><ac:parameter ac:name="">Concurrency 06</ac:parameter></ac:structured-macro>
[Concurrency 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d5461ec-b1e9-4e69-9b4e-518cd2760d9a"><ac:parameter ac:name="">Cookbook 04</ac:parameter></ac:structured-macro>
[Cookbook 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cdd8585-e8b3-4db5-8dc9-681c5e784060"><ac:parameter ac:name="">EJPLG 01</ac:parameter></ac:structured-macro>
[EJPLG 01] Effective Java, Programming Language Guide, by Joshua Block. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34362e60-5d2b-46ce-a9c2-4de7eb2d3daa"><ac:parameter ac:name="">EJS 04</ac:parameter></ac:structured-macro>
[EJS 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d588931-e8e5-4052-9fa3-7a73eec6e96a"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c67aff7-6288-49f7-9873-54a5cdfa18cf"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb7319e0-1968-4ef9-9610-9c5cbd86f7da"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7d7248ad-18c0-4e7b-b25d-0b7611c8ee4b"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation ver 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab58e84c-6433-46d8-b77a-414664c17265"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be0dbe73-3f7b-42fc-b5e1-e77766029cca"><ac:parameter ac:name="">IO 99</ac:parameter></ac:structured-macro>
[Java I/O] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e2319ac-7f47-4c87-aa1f-89e9ffb077eb"><ac:parameter ac:name="">JNI 97</ac:parameter></ac:structured-macro>
[JNI 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b80989a-5b05-42e2-8e29-4fb9a0ec2ad2"><ac:parameter ac:name="">JNS 98</ac:parameter></ac:structured-macro>
[JNS 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a86f431f-d3e7-41aa-9e1f-cb5636d56fee"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd5484a5-cc3b-4fbf-8cdb-9edf077a34c7"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="51908671-be83-4e36-8f5b-353734e32739"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low, http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6fa3780-a374-49d0-b0ea-8dd8baea7fb8"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1210fbdf-177e-468a-ad09-430378184632"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15d1a15b-4a1b-44cf-bbec-565b91c9bea1"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler http://www.brouhaha.com/~eric/software/mocha/ (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a620412-55a7-4ae8-b09c-ce5898e6c9e1"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87da02ec-2c5c-44e8-ade2-1badf6874b29"><ac:parameter ac:name="">Patterns 05</ac:parameter></ac:structured-macro>
[Patterns 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d8afcba-254e-4fa0-8302-500b493d3223"><ac:parameter ac:name="">Pitfalls 03</ac:parameter></ac:structured-macro>
[Pitfalls 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f92f5c73-5f17-4a14-8d1f-e0d7f7766c73"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68c5078d-5852-45e7-9ed0-f49839004858"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="561d3f97-908d-44e5-8782-dcde83241ab2"><ac:parameter ac:name="">Secrets 97</ac:parameter></ac:structured-macro>
[Secrets 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6063168f-4340-450e-8cca-31acd0cc9291"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

  • No labels