You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 240 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c1702c3-3262-4df9-a7c9-97f88dbfe0a9"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 1996] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering 22(1):6–15 (1996).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f39d3c3c-f79d-40a0-b67b-19f52908efaf"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 2006] Java Platform, Standard Edition 6 API Specification. Oracle (2006/2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c64dd93b-c87d-46b0-b88c-5ef0e818a590"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro>
[API 2011] Java Platform, Standard Edition 7 API Specification. Oracle (2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06dc81cd-8ee0-423e-8e6e-6bef392729e0"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 2000] Austin, Calvin, and Monica Pawlan. Advanced Programming for the Java 2 Platform. Boston: Addison-Wesley Longman (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="330d7048-492c-4062-a468-114e1d395153"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro>
[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="823396a6-8a9b-4b35-94ca-2bd7aca0b78c"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro>
[Black 2006] Black, Paul E., and Paul J. Tanenbaum. "total order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d878a276-0912-4e6a-b58f-ab76d59ac447"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 2001] Bloch, Joshua. Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="807a393a-6e19-4df1-83c8-9c348a10921d"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 2005] Bloch, Joshua, and Neal Gafter. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1580db23-8668-4368-b6f8-98921ca3e16d"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro>
[Bloch 2005b] Bloch, Joshua, and Neal Gafter. Yet More Programming Puzzlers. JavaOne Conference (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4675601-f7c0-4edb-93ea-4c0ed077415b"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro>
[Bloch 2007] Bloch, Joshua. Effective Java™ Reloaded: This Time It's (Not) for Real. JavaOne Conference (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20b36037-3a37-4995-a538-d2ad81644205"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 2008] Bloch, Joshua. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b474ca9c-1770-428d-a20b-d6e90711fc7e"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro>
[Bloch 2009] Bloch, Joshua, and Neal Gafter. Return of the Puzzlers: Schlock and Awe. JavaOne Conference (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92abf64c-b7df-4cac-aeb9-d48fc7a6c98a"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 2005] Boehm, Hans-J. Finalization, Threads, and the Java™ Technology-Based Memory Model. JavaOne Conference (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f53f75c-e8f9-47d1-95f9-0b809b6c6051"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c00cc012-6b39-4509-849a-523e6dc27d4c"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 1988] CCITT (International Telegraph and Telephone Consultative Committee). CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva: International Telecommunication Union (1988).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94111b99-7ab6-4708-b364-486889b90d7e"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cd4490a1-79ea-4f91-81fd-cd0014931add"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 2007] Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Upper Saddle River, NJ: Addison-Wesley Professional (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="472dbc87-607f-427c-a5c4-25f02fc6917e"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 2005] Christudas, Binildas. Internals of Java Class Loading, ONJava (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="452df079-4f67-4c3b-9f1f-547a1936c122"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro>
[Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48–54 (1981).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="23e0c89f-7452-41f6-a9be-fbec7649d70d"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro>
[Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6fbcfc1a-d4b8-4284-bdc6-3b82ba77ca84"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="403b93cb-3da1-4c66-b3c7-1b86418ddb24"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 2004] Horstmann, Cay S., and Gary Cornell. _Core Java™ 2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ab7b76c6-9434-4c1a-8811-4b670374aaa1"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 1995] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In Pattern Languages of Program Design, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de9a7030-46f6-41fa-b2dc-33a7cffd0881"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 2008] MITRE Corporation. Common Vulnerabilities and Exposures (2008/2012).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="29c8276a-0294-454d-81a0-a62530df2552"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 2000] Daconta, Michael C. When Runtime.exec() Won't. JavaWorld.com (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c993df4c-a4bf-40a9-9e7a-270528cd6855"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls. Indianapolis: Wiley (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c7cc11f-55b3-4416-ba6e-0dfdd88ef333"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 2004] Darwin, Ian F. Java Cookbook, 2nd ed. Sebastopol, CA: O’Reilly (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05981029-ce71-4cd5-a517-d5d3e6012601"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro>
[Davis 2008] Davis, Mark, and Martin Dürst. Unicode Standard Annex #15: Unicode Normalization Forms (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2212fc0f-b9b9-4793-ba16-9f3864d29332"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro>
[Davis 2008b] Davis, Mark, and Michel Suignard. Unicode Technical Report #36, Unicode Security Considerations (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f801468a-d37f-4059-8412-c8cf69d6a67a"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro>
[Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155 (1966). doi: 10.1145/365230.365252.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e062beab-8c1e-4800-b278-9076803a1b98"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro>
[DHS 2006] U.S. Department of Homeland Security. Build Security In (2006/2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a658bf9-b541-4189-9f8e-d243efc7845d"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro>
[Dormann 2008] Dormann, Will. Signed Java Applet Security: Worse Than ActiveX? CERT Vulnerability Analysis Blog (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3605e013-50fd-4c89-aa13-b8a9df09430d"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 2003] Doshi, Gunjan. Best Practices for Exception Handling. ONJava (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="492bdc9d-5385-4cf2-afe6-cf6e4fb3a804"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro>
[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc3f6fa3-4098-406c-9187-a577aa8b1d73"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 2008] Eclipse Platform, The Eclipse Foundation (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="415a10bb-4246-48d4-b9c9-75c52be9a2ee"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro>
[Encodings 2006] Supported Encodings, Oracle (2006/2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4003e63-8a07-42bc-8bdf-789f95399e6f"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 2003] Eckstein, Robert. Java Enterprise Best Practices. Sebastopol, CA: O'Reilly (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2ab6f45-d6b4-41d5-afeb-89ac6e3ad066"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro>
[ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bad1887e-f14b-4812-b49d-7c66cd5c5376"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro>
[Fairbanks 2007] Fairbanks, George. Design Fragments. PhD thesis, Carnegie Mellon University (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9afd03eb-b841-4de3-8a64-00d082badcfe"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 2008] FindBugs Bug Descriptions (2008/2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76b7e714-0fc4-44af-8635-eac1eb62d867"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 2003] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. JDBC API Tutorial and Reference, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89d3556b-e60b-4c1e-bcfe-2ab16af47577"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="236743b1-bae8-449b-9af1-a64cbfe8f6e5"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro>
[Fortify 2008] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f78812f-ca13-4a99-9f4c-7e9383c8e1bc"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 2001] Fox, Joshua. When Is a Singleton Not a Singleton? JavaWorld (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e26a537e-528a-4561-836d-7ddc06a71eb1"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 2008] Function Table: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="28e8d40f-44e6-492c-b595-df36562dd6cd"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro>
[Gafter 2006] Gafter, Neal. Neal Gafter's blog (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6941c8bf-8779-4960-8581-95d32f6d6286"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 1995] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Reading, MA: Addison-Wesley (1995).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8204dba1-3ac3-4b81-abc3-8eddd361f047"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 2001] Garms, Jess, and Daniel Somerfield. Professional Java Security. Birmingham, UK: Wrox Press (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ade3e2cd-f2af-4ecc-bb27-25c6ab4801d4"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro>
[Goetz 2002] Goetz, Brian. Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction. IBM developerWorks (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a38e28a-b1b1-46a4-99ee-d88cf1f299d5"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="346003a5-5da9-446e-b82b-c28f837b47c0"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 2004b] Goetz, Brian. Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check? IBM developerWorks (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="41e6332a-01ef-4c33-89f3-1b84728d208d"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro>
[Goetz 2004c] Goetz, Brian. Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent. IBM developerWorks (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d0084d1e-d8c7-4776-8746-b5320a5726fa"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 2005] Goetz, Brian. Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners. IBM developerWorks (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ab6cddc-aad6-4028-8618-6ef09c1f003a"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro>
[Goetz 2005b] Goetz, Brian. Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships. IBM developerWorks (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf482a3c-ac01-4f2f-91dc-cbfbed851602"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45c5b154-fbac-41ca-a50a-f2640e323f7d"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 2006b] Goetz, Brian. Java Theory and Practice: Good Housekeeping Practices. IBM developerWorks (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b913547-7471-495a-b1bf-3392eb4eade4"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro>
[Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3e246da5-9dbe-4980-9967-438783be3dae"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems (1991/2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="961b83fc-0f8e-4841-bae8-72b5fe8729f5"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d7f7043-1e43-474d-88f4-c445b8a07c9f"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro>
[Grand 2002] Grand, Mark. Patterns in Java, Vol. 1, 2nd ed. New York: Wiley (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f6e65ce-cd4a-4244-9699-bbef4148ec43"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 2000] Greanier, Todd. Discover the Secrets of the Java Serialization API. Sun Developer Network (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62e4369c-74aa-440e-bd89-e671d1d198d2"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 2008] Green, Roedy. Canadian Mind Products Java & Internet Glossary (2008/2012).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf33b16a-5978-4990-b235-7d063c817575"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro>
[Grigg 2006] Grigg, Jeffery. Reflection on Inner Classes (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b4e15ce1-e0e6-4f65-85b8-f58cf4880c0d"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro>
[Grosso 2001] Grosso, William. Java RMI. Sebastopol, CA: O'Reilly (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b44f1ff-b75f-43bb-a48b-7264b0c36915"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 2005] Gupta, Satish Chandra, and Rajeev Palanki. Java Memory Leaks—Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0. IBM developerWorks (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa92ee68-e31c-4245-8ec3-095ac8300024"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro>
[Haack 2006] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. Immutable Objects in Java. Research report, Radboud University Nijmegen (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a0679244-d319-4249-a31e-219e3555073a"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro>
[Haggar 2000] Haggar, Peter. _Practical Java™ Programming Language Guide_. Reading, MA: Addison-Wesley Professional (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e0af760-373b-44ea-82b1-e5d1b0fd665f"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 2000] Halloway, Stuart. Java Developer Connection Tech Tips, March 28, 2000. Sun Microsystems (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2a65115-6851-45a5-a148-25691d64e391"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 2001] Halloway, Stuart. Java Developer Connection Tech Tips, January 30, 2001. Sun Microsystems (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b21d7f94-929d-4ca2-bc21-03d3d7e301d4"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 1997] Harold, Elliotte Rusty. Java Secrets. Foster City, CA: IDG Books Worldwide (1997).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a3c829d-8de6-4925-b497-d1b17cd53ea8"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 1999] Harold, Elliotte Rusty. Java I/O. Sebastopol, CA: O'Reilly (1999).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b706f92f-6599-4543-8dae-999253ea348a"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro>
[Harold 2006] Harold, Elliotte Rusty. Java I/O, 2nd ed. Sebastopol, CA: O'Reilley (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e064c9d0-c004-4635-b2a4-baf426b1b8d2"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro>
[Hawtin 2008] Hawtin, Thomas. Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities. Sun Microsystems, Make It Fly, London (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfa7b6df-c58f-428f-921c-75b138a65129"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 2003] Henney, Kevlin. Null Object, Something for Nothing (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4fb81bc-91ab-41ab-a41c-6009d791a1af"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro>
[Hitchens 2002] Hitchens, Ron. _Java™ NIO_. Cambridge, MA: O'Reilly (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fa0183d-5923-4594-ab08-82572f594d69"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro>
[Hornig 2007] Hornig, Charles. Advanced Java™ Globalization. JavaOne Conference (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8e21edc6-4a72-4bcb-a9e0-3d8492cc267b"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro>
[Hovemeyer 2007] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE), San Diego (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9f354dd-0ceb-441a-af93-65d5f422c335"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro>
[Hunt 1998] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. IEE Proceedings: Software 145(2/3):41–50 (1998).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a10bf91f-3599-4a7a-a849-d68c53d94b98"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>
[IEC 60812 2006] IEE (International Electrotechnical Commission). Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed. Geneva: IEC (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7764d82-d68c-4533-a350-f02a015baef5"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro>
[IEEE 754 2006] IEEE (Institute of Electrical and Electronics Engineers). Standard for Binary Floating-Point Arithmetic (IEEE 754-1985). New York: IEEE (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa7a1bf6-4531-4821-9132-5c9eff65538c"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 2000] JavaTM 2 SDK, Standard Edition Documentation, J2SE Documentation version 1.3. Sun Microsystems/Oracle (2000/2010).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bfb81247-515e-4749-9615-97570770a0d7"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification. Oracle (2008/2010).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f03aa000-9f09-4e9f-8e04-bd5326f1063b"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro>
[Java 2006] java: The Java Application Launcher. Oracle (2006/2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3696d14f-c274-47e2-a79a-84defcfc4b0a"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 1999] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Upper Saddle River, NJ: Prentice Hall (1999).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2046add6-5d91-4c94-b25d-4c855dc0ac6a"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 2004] Java Generics. Oracle (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d93f049-ae65-4d00-a795-7f2f9b969626"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 1999] Oaks, Scott, and Henry Wong. Java Threads, 2nd ed. Sebastopol, CA: O'Reilly (1999).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97e7571d-633a-41bb-b74d-79de55952d22"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 2004] Oaks, Scott, and Henry Wong. Java Threads, 3rd ed. Sebastopol, CA: O'Reilly (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aecf8f83-1be1-4b0d-98c7-d499eb584fe7"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 2008] Java™ Platform, Standard Edition 7 Documentation. Oracle (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b2f69bd-1b63-4d3a-bec3-57e99bf15ed4"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 2005] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. Java Language Specification, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9aa1f36-e9d5-4e15-b670-9d1e13f2e636"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro>
[JLS 2011] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7600868-56e1-44f7-812d-04edc9e3848d"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 2006] Monitoring and Management for the Java Platform. Oracle (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d7d8156-4d75-4d8d-a1a1-eb73da7d2f0b"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 2006] Java SE Monitoring and Management Guide. Oracle (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bdd019d6-9d61-44f1-9650-469d8176bfe8"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 2006] Java Native Interface. Oracle (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="03c82dd9-e488-42d9-b03b-1e46a59c3d6d"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro>
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258–263, May 21–24, Oakland, CA (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f0e5153-416b-43d2-a957-122155d623b0"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 2004] Java Platform Debugger Architecture (JPDA). Oracle (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79c17780-2acf-4976-a26b-7555e8b64bf9"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro>
[JPL 2006] Arnold, Ken, James Gosling, and David Holmes. _The Java™ Programming Language_, 4th ed. Reading, MA: Addison-Wesley Professional (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="77637d1c-f8fe-45c1-a0bc-724f166489d7"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro>
[JSR-133 2004] JSR-133: JavaTM Memory Model and Thread Specification (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2fb0df8e-e82f-463d-9646-89e788583026"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI). Oracle (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cf95f6fa-ed3f-40e9-8d93-85d3bda2a7a0"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 1999] The Java Virtual Machine Specification. Oracle (1999).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="287c45d6-7cb7-4821-8da8-8c9cac040471"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro>
[Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5887751-5412-4e67-a8e7-70de312afc33"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 2001] Kabutz, Heinz M. The Java Specialists' Newsletter. (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f41da40-9aa5-4830-b010-b061ea6085bf"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b344466a-bfd4-4900-81b9-2ca4bf70fc73"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro>
[Knoernschild 2001] Knoernschild, Kirk. _Java™ Design: Objects, UML, and Process_. Boston: Addison-Wesley Professional (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1847c100-b204-4f0c-bb1a-a940cd37596b"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 2008] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. IEEE Software 25(1):13–19 (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c55f4ea-200b-4922-b923-da82a46c1b0b"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 2008] Langer, Angelica, trainer and consultant. http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1aa59880-2714-47d3-bf2f-9a1b587c0fcd"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Reading, MA: Addison-Wesley (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fab260be-4360-48c3-aebc-be0b2bce3e86"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro>
[Lea 2000b] Lea, Doug, and William Pugh. Correct and Efficient Synchronization of Java™ Technology–based Threads. JavaOne Conference (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e57b51b3-3f21-410e-8c4f-e099b577c542"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro>
[Lea 2008] Lea, Doug. The JSR-133 Cookbook for Compiler Writers (2008/2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ae2616a-e8a7-44c5-81ae-cf624ab879b7"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro>
[Lee 2009] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. Robust and Scalable Concurrent Programming: Lessons from the Trenches. JavaOne Conference (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a43f8be2-50ab-406b-afed-d9c3f573ec1e"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 1997] Liang, Sheng. _The Java™ Native Interface, Programmer's Guide and Specification_. Reading, MA: Addison-Wesley (1997).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e70b2b75-57f0-47fb-9424-df44bf315aba"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro>
[Liang 1998] Liang, Sheng, and Gilad Bracha. Dynamic Class Loading in the Java™ Virtual Machine. In Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, New York (1998).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a39f858-298f-4dae-aee2-aad58ef88c7c"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro>
[Lieberman 1986] Lieberman, Henry. Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 214–223, Portland, OR (1986).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aa338f85-d589-4e4f-b903-70ad934d5316"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 2005] Lo, Chia-Tien Dan, Srisa-an, Witawas, and Chang, J. Morris. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7573a960-f3ce-4b78-8cf7-979892df3c39"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 2005] Long, Fred. Software Vulnerabilities in Java. CMU/SEI-2005-TN-044 (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="996ac508-f1ca-4c0f-beee-dc4a1ac47fa5"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro>
[Long 2011] Long, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4385bd14-7765-40eb-a5a5-58f2345807ba"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 1997] Low, Douglas. Protecting Java Code via Obfuscation. Crossroads 4(3):21–23 (1997).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f98e7fa-3598-4d71-9c76-dddf594033fc"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 1998] MacGregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. Java Network Security. Upper Saddle River, NJ: Prentice Hall PTR (1998).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a90d7665-29ad-43dc-b66a-65844e7885d2"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro>
[Mahmoud 2002] Mahmoud, H. Qusay. Compressing and Decompressing Data Using Java APIs. Oracle (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7f8eba8-5b55-40a0-a03c-94f72452f5b4"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro>
[Mak 2002] Mak, Ronald. Java Number Cruncher: The Java Programmer's Guide to Numerical Computing. Upper Saddle River, NJ: Prentice Hall (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8edac924-4d24-4079-8e63-6ef554d7ac2b"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro>
[Manson 2004] Manson, Jeremy, and Brian Goetz. JSR 133 (Java Memory Model) FAQ (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fb6b85a-2509-44ea-b586-c95b32d9a759"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro>
[Manson 2006] Manson, Jeremy, and William Pugh. The Java™ Memory Model: The Building Block of Concurrency. JavaOne Conference (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="948d5a3d-7fcf-4c36-9782-fde7908635eb"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro>
[Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57–62 (1996).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afc6221b-72c3-4654-9750-7715c0641e06"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 2001] McCluskey, Glen. Java Developer Connection Tech Tips. (2001, April 10).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="845397ab-957e-457e-9a89-a75bb665e5f0"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code. New York: Wiley (1999).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ed296c6-13f5-45ee-b977-9c9f6ac56818"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro>
[McGraw 1998] McGraw, Gary, and Edward W. Felten. Twelve Rules for Developing More Secure Java Code. JavaWorld.com (1998).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c3e0d10-542b-403c-94c9-3d3719cf25f7"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro>
[Miller 2009] Miller, Alex. Java™ Platform Concurrency Gotchas. JavaOne Conference (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcfdc95b-ca1b-4d19-bb19-c4bc7bb9fd8e"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
[MITRE 2009] MITRE Corporation. Common Weakness Enumeration (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27e3cb7c-5e59-49db-b312-4d913153627c"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 2007] Mocha, the Java Decompiler (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="550d5cf6-2d09-429c-a6af-9a71cb87333b"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro>
[Monsch 2006] Monsch, Jan P. Ruining Security with java.util.Random, Version 1.0 (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b5c2746-1e84-4b45-b736-807e09c08531"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro>
[MSDN 2009] Microsoft. Using SQL Escape Sequences (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b769b72b-8d5c-45bb-ba45-25d6fe041194"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 2001] Muchow, John W. MIDlet Packaging with J2ME. ONJava (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdf47097-6c36-489c-b1a9-ef1fdda71445"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro>
[Müller 2002] Müller, Andreas, and Geoffrey Simmons. Exception Handling: Common Problems and Best Practice with Java 1.4. Sun Microsystems (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d2bb9b92-22c9-4ecd-8ebd-fc1f65b72ad5"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 2006] Naftalin, Maurice, and Philip Wadler. Java Generics and Collections. Sebastopol, CA: O'Reilly (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bc2a83e-5b34-4889-b97e-bb8bd4bfca51"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro>
[Naftalin 2006b] Naftalin, Maurice, and Philip Wadler. Java™ Generics and Collections: Tools for Productivity. JavaOne Conference (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="411a3f37-4b8f-453a-bd4a-ec59a8128e06"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro>
[Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74–88 (1992).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c095e386-d4d1-43bd-a097-7921f8589a77"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 2004] Neward, Ted. Effective Enterprise Java. Boston: Addison-Wesley (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5845f50b-7865-4a26-a155-94886c43e962"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 2007] Nisewanger, Jeff. Avoiding Antipatterns. JavaOne Conference (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="43bcdf85-f091-4eaa-9acd-26769ddf1a28"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 2004] Nolan, Godfrey. Decompiling Java. Berkeley, CA: Apress (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85353599-d8af-4487-af75-f38dc6117fe9"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d6499676-d94c-42c3-9490-0014d005f517"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro>
[Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning. Oracle (2010).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84117cc9-8510-490a-bde4-58bc1d5ccc57"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro>
[OWASP 2005] OWASP (Open Web Application Security Project). A Guide to Building Secure Web Applications and Web Services (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="383270b5-ba8c-4930-9b09-563562945f34"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro>
[OWASP 2007] OWASP (Open Web Application Security Project). OWASP Top 10 for JAVA EE (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6931db8-5c2f-4f99-8db5-879f724f5ecf"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 2008] OWASP (Open Web Application Security Project). (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c142b88-2aee-4698-8773-c26544c801f1"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro>
[Permissions 2008] Permissions in the Java™ SE 6 Development Kit (JDK). Oracle (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="184fc78c-a7c6-4849-ac00-fdc58b7b87c2"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro>
[Philion 2003] Philion, Paul. Beware the Dangers of Generic Exceptions. JavaWorld.com (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ea6e147-fb18-4430-ae7c-273709b69d9b"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 2005] Phillips, Addison P. Are We Counting Bytes Yet? Writing Encoding Converters Using Java NIO. Paper presented at the 27th Internationalization and Unicode Conference, April 6–8, Berlin (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0fc239c-dcfd-4d5d-867f-eeb28af96f0b"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae77ef9a-63ee-407b-b9ee-0110d7f43b2e"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 2002] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems/Oracle (2002/2010).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9643f1d5-3cda-4c36-89ab-fd6668c0cbdc"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro>
[Pugh 2004] Pugh, William. The Java Memory Model (discussions reference). Discussion based on work supported by the National Science Foundation under Grant No. 0098162 (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62a97dd9-c05d-4cf0-9c81-416b9b2a0147"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro>
[Pugh 2008] Pugh, William. Defective Java Code: Turning WTF Code into a Learning Experience. JavaOne Conference (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="570799e7-941a-46a6-8687-400f036c6d14"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro>
[Pugh 2009] Pugh, William. Defective Java Code: Mistakes That Matter. JavaOne Conference (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37ff0d73-aa3b-47a3-8b35-961c64f93541"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro>
[Reasoning 2003] Reasoning Inspection Service Defect Data: Tomcat v 1.4.24 (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4cd2f18e-be53-4100-b41d-3b0f8bc173f7"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 2006] Reflection. Oracle (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40294e99-9f91-4cb0-9a97-80ad575f464e"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro>
[Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15757733-a20e-4d16-bfdd-d79be60bad38"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro>
[Rotem 2008] Rotem-Gal-Oz, Arnon. Fallacies of Distributed Computing Explained (white paper) (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="123f0b78-b8ad-413c-bc1d-974c0880d7c8"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 2003] Roubtsov, Vladimir. Breaking Java Exception-Handling Rules Is Easy. JavaWorld.com (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8194a76b-b05c-485b-9179-01076f5d96bf"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro>
[Roubtsov 2003b] Roubtsov, Vladimir. Into the Mist of Serialization Myths. JavaWorld.com (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0138f133-a772-4c09-9549-ab7a41b84ce7"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro>
[Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17(7):388–402 (1974).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bdbc18e5-254e-414e-831d-1a71f4df1692"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro>
[Saltzer 1975] Saltzer, J. H., and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE 63(9):1278–1308.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="108959ae-a9bd-47e1-9ae4-12daf1ec1f3e"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0. Sun Microsystems (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcf92332-50f9-4dfb-aef9-85026407d7f4"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro>
[SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0. Oracle (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8628bac8-b330-4625-b09b-875d2337ef79"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 2007] Schildt, Herb. Herb Schildt's Java Programming Cookbook. New York: McGraw-Hill (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="defb2f56-6684-4d7d-b94d-09d38cd554bf"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro>
[Schneier 2000] Schneier, Bruce. _Secrets and Lies—Digital Security in a Networked World_. New York: Wiley (2000).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cab5caa4-d650-43ce-a429-b186d7f4fb47"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro>
[Schoenefeld 2004] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com) (2004, November).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbffe041-20c9-4e0e-bede-d9f694b6e2d2"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 2004] Schwarz, Don. Avoiding Checked Exceptions. ONJava (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b95bb334-fde9-414a-a363-f45eec6da9e3"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 2003] Schweisguth, Dave. Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide. JavaWorld.com (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05aeed47-1c07-4a5b-b37a-fb40f2d24037"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 2008] Sun Developer Network. Sun Microsystems (1994/2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="296eeebe-38e5-47ce-b44f-5aad8f168845"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston: Addison-Wesley (2005). See http://www.cert.org/books/secure-coding for news and errata.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12ff4c29-daf3-4604-800f-dcbefbe8cbf6"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 2006] Java 2 Platform Security Architecture. Oracle (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f90e5ef5-97b1-49c8-ad82-cd49b628ec49"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 2006] Java Security Guides. Oracle (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cbc0f9f-f4ce-4d43-ad7b-24f4141bdd8b"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 2008] Java Security Architecture. Oracle (2008/2010).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d9e95104-1522-42bb-8fb7-2914c29b8574"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro>
[Sen 2007] Sen, Robi. Avoid the Dangers of XPath Injection. IBM developerWorks (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06aa54a8-3063-4869-958e-7379befcb1ef"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 2005] Steel, Christopher, Ramesh Nagappan, and Ray Lai. _Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management_. Upper Saddle River, NJ: Prentice Hall PTR (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c78d829f-9e6e-47a2-b181-65245793ae2e"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro>
[Steele 1977] Steele, Guy Lewis. Arithmetic Shifting Considered Harmful. SIGPLAN Notices 12(11):61–69 (1977).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25e5e911-c8c9-46d9-bd52-710910502c58"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro>
[Steinberg 2005] Steinberg, Daniel H. Java Developer Connection Tech Tips: Using the Varargs Language Feature. (2005, January 4).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bab666fc-06f3-4125-ab30-3572877e9a2a"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro>
[Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d96ce469-853e-4ebd-ae99-37c399b4acb2"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro>
[Steuck 2002] Steuck, Gregory. XXE (Xml eXternal Entity) Attack. SecurityFocus (2002).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3370243a-6d15-45b2-8c5e-1e40fc3ac4be"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro>
[Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated? Oracle (1999).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="25796387-b540-4412-a504-c33d9bae4fee"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide. Oracle (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bfc94fa-8824-413e-b175-e39560399b88"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 2006] Java™ Platform, Standard Edition 6 Documentation. Oracle (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ad71989-a513-480f-9fcf-98b095a1efe5"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro>
[Sun 2008] Java™ Plug-in and Applet Architecture. Oracle (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82795039-043b-44ca-8e85-672dfa75e19d"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro>
[Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. Composable Thread Coloring. In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. New York: ACM (2010).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="24faaf88-887d-4ab7-a87d-ecd0767e5648"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro>
[Tanenbaum 2003] Tanenbaum, Andrew S., and Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2nd. ed. Upper Saddle River, NJ: Prentice Hall.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bef1b8ad-4521-4ba4-b67b-b281d19fe338"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 2007] Bloch, Josh, and William Pugh. The Phantom-Reference Menace, Attack of the Clone, Revenge of the Shift. JavaOne Conference (2007).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f52e8afc-e6c5-4291-8723-f4ead94d1abc"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro>
[Tomcat 2009] Tomcat Documentation: Changelog and Security Fixes. Apache Software Foundation (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aada5030-9320-46cd-9a75-227c70ce6546"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro>
[Tools 2011] JDK Tools and Utilities Specification. Oracle (2011).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="618d1bae-b126-4efe-ae1b-85c6e33c5187"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 2008] The Java Tutorials. Oracle (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a43c1c6e-3beb-4c07-a8cb-c7084c4ca613"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro>
[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by The Unicode Standard, Version 5.2. Mountain View, CA: The Unicode Consortium (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="16176cdc-7239-4829-9b1d-a90050acd5bc"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro>
[Venners 1997] Venners, Bill. Security and the Class Loader Architecture. Java World.com (1997).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48abe481-d326-4772-8bc9-290660d4d65e"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 2003] Venners, Bill. Failure and Exceptions: A Conversation with James Gosling, Part II. (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9157189-d96d-4d83-85e8-7f38b80a965a"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro>
[W3C 2008] Bray, Tim, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau. Extensible Markup Language (XML) 1.0, 5th ed. W3C Recommendation (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c2351cee-fd6b-4f57-bdc4-200c203d1c97"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro>
[Ware 2008] Ware, Michael S. Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools (thesis). James Madison University (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2246452-0130-4cd0-a38e-4e36fd0ae0ee"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro>
[Weber 2009] Weber, Chris. Exploiting Unicode-Enabled Software. CanSecWest (2009).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="880752d0-7a3d-445a-8366-e2ab58e62849"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 2003] Wheeler, David A. Secure Programming for Linux and UNIX HOWTO (2003).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="976da623-e7a6-4bed-9929-afa3b8fc65e3"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro>
[Zukowski 2004] Zukowski, John. Java Developer Connection Tech Tips: Creating Custom Security Permissions (2004).

  • No labels