You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 90 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21aa8548-bc0f-4809-8d56-e980d75f7895"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 96] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15652597-e81d-45a7-a772-26daae3db2ec"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="008c13b8-fac9-4e50-a117-00764ee69c7e"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a056d394-a9f2-4cdd-8800-e736c940e3d9"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro>
[Bea 08] Packaging WebLogic Server J2EE Applications (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0cf9201-5c33-4e17-ab57-6058076d652f"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5654695b-621c-46f5-8cbd-f19b420f6d1a"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ea44254-c59b-439a-a68d-a7b3de75d43d"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28615c05-df5f-4b88-af75-a800b6a4de38"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 05] Finalization, Threads, and the Java™ Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb68b20a-3c17-4416-bd68-ababcfef5e91"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="900e86e0-a2ca-4bcf-b762-70b2f643b78a"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 88] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06d4be37-2608-4417-98df-efd4e6d06015"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ee8d7e0-00de-438a-b145-f23c22b4d596"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 07] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="db127112-68f8-49d8-a543-1de8174d57df"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading, ONJava (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="75ed6f15-6cc7-4c3d-84d1-1bc648d9d64c"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 08] Common Vulnerability Exposure, MITRE Corporation (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfcde929-e126-4d6f-90f6-789da3bf6486"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 07] Garbage Collection-Friendly Programming by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="608df900-2e85-4573-891d-6bb858dbed5f"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 04] Core Java™ 2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69bfdb19-e571-4e37-b7f5-5cf75b08e9f0"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 95] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="451b6219-f0ba-4c11-bdbd-c27f32f34496"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't, by Michael C. Daconta, JavaWorld.com. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d3808ea-4646-4e30-8206-eeb8198dd910"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d82df64-1a3a-40a4-b158-cfd4704902ee"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eab9962a-6837-4d11-8987-9c3daa043945"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b44e140-883b-4c46-806d-0ddfbfb70c91"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 08] The Eclipse Platform (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2cf0f10-1380-40ff-8afb-963a3de6d1c8"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02f240b8-4bf1-46cb-b543-dbdfd84ddee8"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02d4d872-329a-444e-8862-2589ff6d46e8"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1de52bb1-5350-428a-8c76-0b0b3745c53f"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5936869-44be-4bdb-ba60-174a1ec30f37"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 01] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="809953ef-1945-4e11-ad51-6f2804a182ad"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 08] Function Table Class FunctionTable, Field detail, public static FuncLoader m_functions

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e4e8f9da-ab2d-4eaa-a6f2-2bd769d5e588"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 95] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="451430ca-1160-45dc-bf03-2ec129e393a4"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ff23b03-069d-4b6e-b46d-399bc0f4cd2d"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 04] Java theory and practice: Garbage collection and performance, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="532181b8-235e-4c53-aa42-1ace6dc8bc05"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 04b] Java theory and practice: The exceptions debate: To check, or not to check?, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60839607-808f-4049-b26d-f3a87aa0dbbc"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 05] Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86598943-9c2d-47b5-9fde-de7929352e1a"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cbe44a59-5531-4a33-b604-797e6aaaf722"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 06b] Java theory and practice: Good housekeeping practices, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f15bfc1-11a3-45e9-a765-7cb2e6148d2c"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e38a7105-98db-4c21-81a6-0df3b14c0aed"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7bf74258-29f8-4348-aef9-33dbc6620502"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API, by Todd Greanier, Sun Developer Network (SDN). (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="997cb80c-e81c-4c0a-858b-25c9641697d7"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b35d585-8727-4fea-a08d-25eecdc224f3"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can, by Satish Chandra Gupta and Rajeev Palanki. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f7e7960-3349-4ef4-9e73-11e5250a709c"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 00] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ac8f704-4514-4a2d-a67e-46d0998f8c54"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 01] Java Developer Connection Tech Tips, January 30, 2001, by Stuart Halloway.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85198477-cb6b-4f99-a11b-d86dc432c500"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5e8a358-1ad1-48b1-b075-67ca9d90d745"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50fd301b-85f8-4de0-91aa-df77113cdb46"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 03] Null Object, Something for Nothing, by Kevlin Henney (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14852db1-e437-4345-81fa-1949506e9cdf"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 08] J2SE Documentation version 1.5, Sun Microsystems. Jar File Specification (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4df9fbf4-2f88-4e33-b77f-1a595b564765"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 99] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="91add181-fb15-4781-babc-ba4649c770e9"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20ab41bf-cd44-4140-b37f-db356afb67e0"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html], Sun Microsystems (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b659a357-0a35-46ab-827b-20ced3cff164"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 99] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8526204d-d2d5-4844-b3b4-ce546cba1179"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 04] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4a968bf-f5e0-4634-8c49-3d2bf4d2b726"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 06] Java™ Platform, Standard Edition 6 documentation. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20be3130-88a7-43d2-b3ec-4037cb080dbe"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 08] Java™ Platform, Standard Edition 7 documentation, 19 Dec 2008. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f09bd64a-d821-488b-8d55-35235dcbfcb9"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76129524-ccda-4719-a5df-bf39a61db08d"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a47db55-b670-475b-bf8b-ef6f8012b52e"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro>
[JPL 05] The Java™ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d176a45-457f-4c3c-899e-776e4418b6e8"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0489051-532d-4edb-8122-7d1b0bfec6c9"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e9b857e-4a55-409c-9ad8-b46ca985dae6"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e94f23d-8a9b-4a59-8e8a-ba6665c00d9f"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA), Sun Microsystems, Inc. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb07dcc3-aa5f-498e-8e04-ff38f1c0ef62"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI), Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa1ede11-ef8f-449c-87bc-1eae56ad93b7"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification, Sun Microsystems, Inc. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a99fcf8-abdb-4407-b9ec-aebcf84b0d9d"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c5c91057-620e-41ad-9bb1-f9c575cec05c"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e2859bc-382f-477a-b58b-22fba69f3bae"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 08] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="222201bb-b5e0-4410-b675-eed5c8918dae"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html, Angelica Langer (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="adad028e-7797-422a-8aaa-7b0e7859464b"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0e87343-68b8-4b6d-ad64-e002becc48ea"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="127271c2-768b-441c-b71b-5949b100a8fa"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java, by Fred Long, CMU/SEI-2005-TN-044. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13f62b1e-fec1-4ab5-99a6-2785934614a4"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 05] Security Issues in Garbage Collection, by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d98b78df-6083-4d29-8108-38348059809d"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1abd1026-786e-4dd3-8f86-8814fdbbe495"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd0148e8-795a-4615-86e2-8c7f1405f3e5"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 01] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a51df270-494d-411d-bc41-d447d8c367d2"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a62c97c3-6ed6-414f-b829-27a8ef2b5aae"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="604d853d-ce11-4eb9-8659-9a7cef229486"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
[MITRE 09] Common Weakness Enumeration (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3dba93db-2e74-47ea-ae4b-ae4f0ee27298"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="393ac75e-cfe0-4c1f-b952-4fb35f21d2ed"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 01] MIDlet Packaging with J2ME, by John W. Muchow (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="684466b8-6c6b-417d-ba2a-8d8ad1a1189a"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9e52d0d-221d-4d69-aebf-44f2bc290f0e"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a3eab0a-9b6a-4a4d-8952-a6695175e288"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 06b] Java™ Generics and Collections: Tools for Productivity, by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52e3fc59-0123-4632-8dac-396520c857d2"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 04] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e18f1c27-0cdc-4a7e-a626-8e2ff40ca47f"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 07] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67b527e0-6421-4d7b-a2bb-d98781be95c1"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 04] Decompiling Java, by Godfrey Nolan, Apress. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="389921b1-eb00-4962-ab21-1cc394eea152"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49a8bdc1-3fc2-4a1e-9e63-2b7c502c1eee"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc719c0a-d540-4964-b7c2-7a66244b6614"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro>
[Patterns 02] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f922412e-9523-41d3-8fa6-287a5b5baac2"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 05] Are We Counting Bytes Yet? at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4951a4e1-ff8b-4496-be45-c2168efe269d"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00b67b1c-0a8c-4730-9809-2393284aa59f"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems, Inc. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92a21aed-87ec-49b6-bf46-fb9fe7e8e1aa"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cfb1b0b-0395-4a48-bc90-fb2f65b9cf93"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 03] Breaking Java exception-handling rules is easy, by Vladimir Roubtsov, JavaWorld.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="035dd8f6-d41e-40fd-97a9-5dc69fe7cd4d"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11260ec6-3f96-482b-8b25-61dfe5a28894"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53360c89-58f4-4526-9c39-49be3e4249eb"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 04] Avoiding Checked Exceptions, by Don Schwarz, ONJava (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="151afb0f-f815-40bb-a3c1-c58d6468b115"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 03] Java Tip 134: When catching exceptions, don't cast your net too wide, by Dave Schweisguth. Javaworld.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78cba592-b863-4b30-a307-85b30706c09c"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0695c60-eea4-4362-bfb5-6164c2fdc490"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfd96875-4fbf-45a2-9b2e-b1471083c0c2"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6522675e-4714-44fb-bb26-b4d781ca7436"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 08] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c473b527-b128-4069-a306-bb346f851add"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc2b52a2-5390-4e4f-95c0-95510eae5b04"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 08] SUN Developer Network (1994-2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99c9399b-4d6a-488d-929b-62cf3e0060d5"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 03] Sun ONE Application Server 7 Performance Tuning Guide (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3da08c9-44a5-47ee-a882-04ee41131d97"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 07] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift., by Josh Bloch and William Pugh, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57695f87-71cb-41b3-8de9-6a9b26456897"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cc67251-6c14-456a-91e8-8f39c01a7412"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 03] Failure and Exceptions, A Conversation with James Gosling, Part II, by Bill Venners. Artima.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a8643e8-e9a6-4f4a-bef2-936165bf1c72"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] Secure Programming for Linux and Unix HOWTO, David A. Wheeler (2003)

  • No labels