<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34560360-9774-40d5-aea4-bcc0eb27f3d2"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="71ed6c29-ee4a-4786-9577-badcca197c0b"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ca44aa3-0318-4b84-8bab-cf828e8261e3"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6e1804c-46c2-482f-bd9b-0b2e72d26a73"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java⢠Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03d72ad3-d5a6-42aa-8c01-8472a8b47b10"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d09c412c-6be2-463d-98dc-c98c60878f0c"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="926318f5-965a-4407-a349-570ed1421941"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1e1731f-e8de-443e-a1a2-c2d58c85b456"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't, by Michael C. Daconta, JavaWorld.com. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dac3fa02-9ef4-4f0b-ba0e-fb8b85eb046e"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7a1b0f7-5a8d-4659-8068-88e33825b079"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a20c06d3-518b-4f6e-96f9-2845134cdf86"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0431368-1d27-42c9-85bd-5850270fab32"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="772827e9-7bd1-4b0f-b1e1-5c999fc117dc"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7edac102-1f78-4e56-a4cf-3ad613aa2815"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c6c8459-6d60-44cc-92a4-83f16a1602d5"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8fe402c3-d225-4d5d-b35c-d70d08d21cc2"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47045c07-1ecd-46f4-bbdf-916c80b7035a"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06e91c41-e8d0-49eb-bfd2-7849750d7ca3"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems, March 1991.
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="74e7d362-7987-4010-b615-dba9058afa86"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4a8014a-f4ba-4ce4-94d0-b78f096ccce3"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API, by Todd Greanier, Sun Developer Network (SDN). (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0118f9d4-3879-432e-a56b-af19c4ef1ae4"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="405669e8-7464-4416-8812-0833629273b0"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can, by Satish Chandra Gupta and Rajeev Palanki. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16017107-5761-4a45-af48-32da97cf2303"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cecd7dc6-39e7-4110-815a-34b3f925be43"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliote Rusty Harold. O'REILLY. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="485bcd8c-93be-469a-b058-a0b8d06b46a2"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="672117f7-3259-442c-a76a-4b0c6032dddf"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d0eaac9-346c-4f8e-9abb-df5ded4e36a9"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba542276-8c8e-44bf-89a3-6b23b0bbefa8"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b57f8fe-28c0-438c-96d0-b1f08a63b863"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="347c07e4-c1da-4d42-905f-996ea139795e"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75a3f802-939f-4aaf-9806-2a01c6329d11"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA), Sun Microsystems, Inc. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="26042377-c1ad-4809-8711-afeb910f5417"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI), Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2beeaed-5811-47a2-b969-79d46d172f71"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification, Sun Microsystems, Inc. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e5b618d1-fb43-4e2f-bc48-13a16535d370"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="66e908d6-a314-435d-872a-4644ed38ea3b"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="628c8222-7fe0-4b09-9945-511a8c856e8a"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8937c73-6994-49e5-8683-4daf22124045"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java⢠Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2758995b-86e6-419d-a4bb-7fb1cf5b69cb"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java, by Fred Long, CMU/SEI-2005-TN-044. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5cf3ec7-8437-4383-9d4b-fe31d8124b8e"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low. (1997)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99b2f2df-c529-4711-974d-78b2b51c536a"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c9001f7-77ca-40ec-a480-0af5006f1a5a"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8abe3bbc-1b92-4d13-b395-e94182152e25"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2d8056e-231a-4d88-9cc6-1a3c945d5a3d"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b57df544-7d32-4dad-80da-36a622fed902"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df628090-20f6-40b8-a290-e7d37b453c22"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1511361f-a46e-49ac-83e0-1d5abb8926ad"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP. (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfc86589-e9ed-4d16-84fe-84a0d3b14c7f"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9946270-5388-47b7-8a0d-c159f5abbe68"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems, Inc. (2002)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1f8d1997-a344-4e8a-8735-80cb67fc7c3e"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection, Sun Microsystems, Inc. (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ec16f39-3695-4082-a6d9-03ba87519b7f"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b775c8e1-433e-491c-85f8-0ea5548dcea9"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfc4f8e0-02d4-47ab-97ea-d17614ff42dc"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8cc8d9e4-868a-48d7-a8c8-922569f78b52"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d80665f6-71c0-4da2-a1da-aec5d0d6c54b"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df44743d-6654-4d44-a468-2b42bc91500b"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="729624aa-ee68-4ccf-a33e-dde441b8e34c"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading, ONJava (2005)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f558c875-d30e-421e-b786-abf293e21e2c"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c511a941-3ee5-4c28-84b9-16112ddc1619"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.htmlSecure Programming for Linux and Unix HOWTO, David A. Wheeler (2003)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="261fe852-53b6-4309-b3b5-ec9527ce09d9"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html], Sun Microsystems (2004)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="005777a1-2e51-4dff-ae5b-c43d2464c7b3"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2bdf51d0-44c8-4081-8902-a37c48573975"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html, Angelica Langer (2008)
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)