You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 57 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc4f6f4f-f0a0-4cd9-9f5d-8eb396992652"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 96] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2a1fc15f-cf0c-4409-870e-02111ba96869"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15dc5306-dd36-4a70-8c57-84ab7946c271"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bcb2dc62-15d1-4a74-8f76-746e32a0ebb5"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf720bac-4c38-4ad1-925f-29b1aa46642a"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3919d87-761e-48b5-8dc0-8136659f3f02"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="82b07f45-c3b0-4363-9e1e-b1dbb996d003"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="079e56b5-98d1-4433-ae03-d683cc9a62e0"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 88] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e782b680-c668-4edf-9a3e-b23c2a92c311"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a82d54b-9e4e-4baa-90ce-5cca4a02671a"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading, ONJava (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99d481de-c091-400f-9673-a191a238b045"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 04] Core Java™ 2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9362138f-6c5c-4a45-9f97-4610560e0676"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't, by Michael C. Daconta, JavaWorld.com. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92919d72-ab30-446a-a1cc-3099986cb913"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="154f822e-3b92-4898-9f6d-fa0d1e3e4528"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6c663c8b-0f0c-4c23-b6de-2054fcbbeee6"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7acdb3f7-3273-480b-8bbf-562d25c5686e"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0bdbc383-95e7-4452-a56b-a203dbf1c0d7"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a3120a8-cb8a-491d-8392-31ed78e551fe"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ae891694-d521-4f8a-bda5-cefbef1dd4cf"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6991f532-5e3b-47cf-b342-8a943fc4cc9f"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 01] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="251503a7-0a91-4858-bcd5-17f59757d08f"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 08] Function Table Class FunctionTable, Field detail, public static FuncLoader m_functions

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45706835-3ba6-4e88-9ec4-b1af46fada6e"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7383a9e4-6c51-4203-9b73-8ec77d289a92"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="beb95845-961c-4f97-86ac-8f5810f78213"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3454571-7b3a-491c-8fa0-ad050821232f"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ccbf634-ebd9-452d-bc14-12013d0d1274"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API, by Todd Greanier, Sun Developer Network (SDN). (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62d1199e-b222-49eb-98a1-b00d69ac6bbe"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e25e2410-3558-40fd-a104-203c2cbd1b50"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can, by Satish Chandra Gupta and Rajeev Palanki. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b58cda63-09d8-4229-9e53-a50baa7b411e"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 00] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2b127c3-f42b-44a2-ad10-b049713fcd5a"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ba7ee6f-ae22-4cb6-ac2b-d692d6afd927"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="019d74f7-85ea-4b8d-af74-7e89e0e731d3"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11cd6cae-a93e-4017-be64-8ddf4e6572a7"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html], Sun Microsystems (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d020df2-de5b-46a5-adca-10377e413643"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 99] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2ddd6d8-1093-4412-bd27-e2055b844699"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 04] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="86e5301e-fbf2-476c-a0ab-629169acaed5"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f5764e1-37bd-47db-864f-ef702200a4f6"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd3c53a7-8377-49ff-9f79-019a0959fa93"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8327ef0-48a9-46a2-9b93-ea8d4ad17ea3"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c288cb45-4649-463d-842c-118ab471c5ec"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6bd9c7bc-3ca3-4840-8e22-73e62ec27d82"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA), Sun Microsystems, Inc. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8b2a318c-68a6-4790-bde3-b76ac29e1311"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI), Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e2e38a6-5423-4557-a69f-4317c4ca66b7"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification, Sun Microsystems, Inc. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4549079e-f244-4d3d-b541-0e4e481dfb5b"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b1cbc22-10bc-440f-af29-da0d8ec5cd52"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01b2731a-0b94-4216-a36d-08e22d08a316"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 08] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37172fea-7aa2-4889-89fd-bc910408cde3"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html, Angelica Langer (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad606c6a-b13e-4fdb-9b20-a4d029f20401"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="783b1852-0d3d-43ae-b3c0-8e8918617fa5"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f2564f1-1ecf-4062-8852-0e83699b7c45"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java, by Fred Long, CMU/SEI-2005-TN-044. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98dff260-35b9-4be2-8dbc-5ee7f412703d"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="775017ab-7953-45c4-8225-df68ab20bf70"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky, SAMS. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd85b06f-4ab4-48e6-bc68-43f49bfdd780"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b403a4f3-9d95-4c18-974d-ae93fd4d0de4"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67cfe09b-1ec5-4e19-bbec-cad58758ae45"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="887f37ed-2bfc-4d15-99b3-7e38ca5004c2"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5e256381-5a50-497f-b9ae-4279519b8bd7"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d43067ee-6602-472b-82e0-643dd60028c6"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8b01903-cfb1-459d-ba2a-71f82d39a388"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 07] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65b73e21-5282-4859-9e56-72a1c1530098"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eed59b21-cf38-4aeb-9f5e-92c9cf07a1c1"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12d58d67-2dc7-4b11-a26e-9679fec54db0"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c428c81c-5fd8-4ce0-9635-7643154d98ad"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems, Inc. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4411bb3e-b2c8-4743-83ba-e32a102f3d68"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8918408a-6899-495f-89c6-5f08a9b8afc1"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ea3b1be-1d80-42b6-b2a8-63d3ada054d2"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5643ded9-0cb4-4512-aa5e-9b6ed09ee326"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a6c187d-0e21-4001-8368-04b8c9768892"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76e22562-74e3-4906-94f4-e81accaca36d"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="606ebef5-5183-48b6-a2c3-13c4de3bcb57"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05028d15-26fe-444f-be9b-c08d11870be2"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 08] SUN Developer Network (1994-2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdca8745-3af6-4a5c-857c-1675b6242138"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 07] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift., by Josh Bloch and William Pugh, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c532e11a-77f2-4ca4-bd3b-676df07bf690"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9da1efbd-ff69-4d5b-8de3-9bb45134dd0d"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.htmlSecure Programming for Linux and Unix HOWTO, David A. Wheeler (2003)

  • No labels