You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 78 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e38fb0a-801c-4238-9be1-c68a7f826dbe"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 96] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8aa1c1d0-7d99-4316-97b6-64a8a239a567"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8ffc4b5-afca-4b41-a6c5-b0f65f19939d"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a396a731-e778-4d5e-8f24-827a6e072992"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro>
[Bea 08] Packaging WebLogic Server J2EE Applications (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d349a2e-1c8c-4f26-8b9e-5bf8c2fed5f6"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e57f71a-3bf5-4933-946e-61306f65edbc"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d3ade49-1a1a-4b98-9c50-6839bf1f2568"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e26a39d3-45c1-43d9-9fff-fd3b05e1e8b9"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 05] Finalization, Threads, and the Java™ Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="201912c6-c241-4e06-a41e-df9ad7a93f15"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a63253d-1e09-4521-893e-79005c3e6066"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 88] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50d98dd0-e1ef-4c86-aa57-1dd14c1a9fa6"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d703971-9a9b-4efb-8dd3-db6fb23afe5d"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading, ONJava (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c230efd3-6045-4c65-b991-b7ebfda8fdfa"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 08] Common Vulnerability Exposure, MITRE Corporation (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86cfcf31-f01a-41dc-b4a5-e9a0ef5e20f0"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 07] Garbage Collection-Friendly Programming by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed98b013-5540-4305-b0d1-548a4a80553a"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 04] Core Java™ 2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e3e2358-f39f-4aa6-8f58-d5ff568556dc"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 95] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="efc138d7-2557-4ce9-9c03-11df525054c0"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't, by Michael C. Daconta, JavaWorld.com. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b36d5bf8-0cbe-4ee9-8815-d6430752524b"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="96ba0131-f829-4e4d-ba98-7b6b5c476316"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33ac5977-4547-4daf-afd5-bc39803d2910"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5232320-b362-4ed6-be33-0af0e6bc1bfb"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 08] The Eclipse Platform (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9b6346b-f70c-486a-b916-c029ac3f5b32"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f531c6a-11ed-4702-a4e0-5872ff6bea2a"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8f47830-5cd2-4888-b001-cc2ac2bbc3f5"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="68b709ff-c909-46e8-9dfb-ce146d5b8245"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36540f39-1b63-485c-8964-ed5608c93084"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 01] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb2c60a6-4c11-4569-b633-01df115d4a4b"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 08] Function Table Class FunctionTable, Field detail, public static FuncLoader m_functions

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb808ab5-c0bb-42d2-aa0a-02e989bb154f"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 95] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a9c5463-2cab-4800-9a9f-db7fd1e1c62a"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dce2fdb9-e21c-4163-8e5c-443e2efd9098"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 04] Java theory and practice: Garbage collection and performance, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9dbfbe2e-5450-4b27-898a-bad1994c15af"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 05] Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="83d30370-3802-49cd-a80f-7fa7c9006f9d"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63792167-5b2a-42d5-a484-2b6837f1fcb4"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99980454-1e65-4f9f-9d85-acc04bcfec1a"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df5e8f1d-a97a-46ca-821b-6a17746db72a"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API, by Todd Greanier, Sun Developer Network (SDN). (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="332bd607-7282-4079-8bfd-a2a3eaf9c7be"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ea5cef7-779a-4500-87cc-e98f6d3ea0c7"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can, by Satish Chandra Gupta and Rajeev Palanki. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="042422b9-fb36-4c29-a47b-5c78cce918c5"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 00] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af34c7b0-2caa-49e4-8520-a9d154ea56cb"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 01] Java Developer Connection Tech Tips, January 30, 2001, by Stuart Halloway.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8bc14991-362c-466e-bdc9-a0c91236ec9e"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="635c4c9a-b14b-471b-aeb6-b5f46390f17f"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6f9e4034-f2a4-49f5-b3de-b9516d72ac23"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 03] Null Object, Something for Nothing, by Kevlin Henney (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3818999-6dd5-4917-af49-75e139fa1908"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 08] J2SE Documentation version 1.5, Sun Microsystems. Jar File Specification (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19813d1f-d477-4522-bfdf-62d550625c57"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 99] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df5a2784-b3db-49ad-866d-6741bcca7234"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc122c99-2168-46f3-9ee6-99c5fcb81e85"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html], Sun Microsystems (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50f85f43-511b-443b-bcc5-17d795e6e802"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 99] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24dea93f-9581-4168-9ca7-0ab9983fcfd4"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 04] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d6bad48-c0bb-4dc7-ad93-c86657800fac"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 08] Java™ Platform, Standard Edition 7 documentation, 19 Dec 2008. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0dabeb0-931d-40da-ad2c-6a64bf43133b"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53046c13-0644-41a5-b494-c7c4761fd6d1"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5c7743b8-058a-45a6-b66d-96040f9728f0"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro>
[JPL 05] The Java™ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4eb97eac-20ce-414b-9684-adf24bf7a1ac"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a775107-895b-48d6-af12-120f80e5e59a"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="02d99f8f-76d9-4a1f-91b9-a5911888f7d0"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1b7afb4-dfb3-4294-81c1-7c1b0c962f28"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA), Sun Microsystems, Inc. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5c1f371-829f-4edb-b903-12a7ddf6a117"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI), Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c69dbf99-8e53-4dd2-accf-5f6e935fbdcf"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification, Sun Microsystems, Inc. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="80333acd-4ac1-49cc-be0f-e977756e8bb9"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ea34c07-f662-47ae-a971-263ccbf34ff3"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5772cadc-2bd6-42f4-9d8c-7581b5c099a5"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 08] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7687b8c-43d2-4ef1-bd4e-a006ab962822"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html, Angelica Langer (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="729861b1-55ba-4c17-bd0a-84311ea528d1"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="167630a7-37f7-4823-a3ee-5370df8a8aa6"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f3c4cd2e-1911-40d6-8772-bf55e95fb80e"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java, by Fred Long, CMU/SEI-2005-TN-044. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0346e0d-6285-4d69-9b5b-0c296b107eda"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 05] Security Issues in Garbage Collection, by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d150815b-cd2b-4360-acaf-6bfc91fef440"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78eb56ed-f9ab-427c-853d-5212696b7c3e"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fee2a6c-76fd-44c5-8aef-8aff1dc939fa"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 01] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9452292-0a1f-47cb-bc91-31c5cec77cd3"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d056b8bd-c594-45d3-b434-b294aa4ddf44"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ebc95d9-72f0-41ef-bf01-ef0863325d31"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daf90c63-1f16-4107-8cb3-0a3dcbad37ab"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 01] MIDlet Packaging with J2ME, by John W. Muchow (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40a1a604-afdc-400c-a10e-4018447cb758"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f7e2af4-2f1e-4022-9ce0-d6806ed1fa65"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b305111-3343-471c-a4e2-cfa0c6312509"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 04] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b5535e17-8c4a-4232-8c07-5485818b1c02"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 07] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52ea9cf2-feda-4925-96f9-66e705fa7b36"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 04] Decompiling Java, by Godfrey Nolan, Apress. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e00fe53e-e388-4cd2-90a2-7b32f7fa55c3"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1acacd9a-2029-46f2-8fcb-4c8315b38684"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28cb6846-a029-46ec-b2c7-73b1d16d283b"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro>
[Patterns 02] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da646ae0-c7fb-49ba-a84e-748b7f7350bc"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 05] Are We Counting Bytes Yet? at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9edc0964-2d1f-42bd-8d99-5033570552a0"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a57b81c8-022d-42e5-aec2-c35b0aeb3b26"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems, Inc. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="368b9a71-668a-403b-99e7-5d2e9de47c53"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4fac427d-0b5f-42e7-afea-285a01cc39c7"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a08f2259-978b-471e-9948-2c62d0afd1c6"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e369891-ce40-4243-9a45-50b48c952600"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1f9e072-4949-448c-912c-7c9229e7aa26"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="720515e6-e899-49df-9178-c65c59fbb407"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f13f9f9a-1081-4041-94e9-a261f7166d0a"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 08] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16fbeae5-dc07-4052-8aec-20fa363a697a"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf4b33ca-99fe-4f5c-aeac-169014a16d64"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 08] SUN Developer Network (1994-2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ec16223-3c71-48d5-827d-d7caba58b1d8"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 07] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift., by Josh Bloch and William Pugh, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a7b77da-1b4d-4c37-82c5-d584ee121fdd"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="568fc6f5-17c8-4d54-bc6d-972c9931188e"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.htmlSecure Programming for Linux and Unix HOWTO, David A. Wheeler (2003)

  • No labels