You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 89 Next »

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ed2f7eca-614b-4819-ab95-8ed9aa824b9e"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro>
[Abadi 96] Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham, IEEE Transactions on Software Engineering Volume 22, Issue 1, Jan 1996 Page(s):6 - 15. (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39dc7f93-8b7d-419d-99d7-64a774ac1d3d"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro>
[API 06] Java Platform, Standard Edition 6 API Specification (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60d8e6e4-08b7-4765-98aa-2807dba0ccb2"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro>
[Austin 00] Advanced Programming for the Java 2 Platform, by Calvin Austin and Monica Pawlan, Addison Wesley Longman. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8b67422-730d-434c-b631-bac6d800c894"><ac:parameter ac:name="">Bea 08</ac:parameter></ac:structured-macro>
[Bea 08] Packaging WebLogic Server J2EE Applications (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7ab9b64-e5ce-4a3a-a76e-c29e52fb8eef"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro>
[Bloch 01] Effective Java, Programming Language Guide, by Joshua Bloch. Addison Wesley. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4405c33-acf7-42fd-86ac-737f0fdf1af7"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro>
[Bloch 05] Java™ Puzzlers: Traps, Pitfalls, and Corner Cases, by Joshua Bloch and Neal Gafter. Pearson Education, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ee230a3-6462-4c6e-99ab-d0977c12a7dd"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro>
[Bloch 08] Effective Java, 2nd edition, by Joshua Bloch, Addison Wesley. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7f4b9a4-7179-4cc6-af46-7e30a099c9db"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro>
[Boehm 05] Finalization, Threads, and the Java™ Technology-Based Memory Model, by Hans-J. Boehm. JavaOne Conference. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8637f4ff-d842-4c89-8417-81a57e2f9a57"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro>
[Campione 96] The Java Tutorial, by Mary Campione and Kathy Walrath (1996)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e716ac2c-3571-4163-af9b-ed3427f2f5c1"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro>
[CCITT 88] CCITT. CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva. (1988)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fbd2d040-00d0-4dfa-a3b6-83481502260e"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro>
[Chan 99] The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, second edition, Volume 1, by Patrick Chan, Rosanna Lee, Douglas Kramer. Prentice Hall. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6838133c-d46b-42f8-b743-e7844d25c9ee"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro>
[Chess 07] Secure Programming with Static Analysis, by Brian Chess and Jacob West. Addison-Wesley Professional. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c43773a5-a175-48fa-a5aa-233ad45eac3d"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro>
[Christudas 05] Internals of Java Class Loading, ONJava (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="291ed062-1a5d-48ec-82ea-822f5828bd13"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro>
[CVE 08] Common Vulnerability Exposure, MITRE Corporation (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="159c1509-e012-48be-a97b-ac5f1b8f5c9e"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro>
[Coomes 07] Garbage Collection-Friendly Programming by John Coomes, Peter Kessler, Tony Printezis. Java SE Garbage Collection Group Sun Microsystems, Inc. JavaOne Conference. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a740d9c5-b14a-4c5d-83d1-b62a0097d439"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro>
[Core Java 04] Core Java™ 2 Volume I - Fundamentals, Seventh Edition by Cay S. Horstmann, Gary Cornell. Prentice Hall PTR. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7277d67a-2cae-43b2-8070-dcecc5d3e5c4"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro>
[Cunningham 95] "The CHECKS Pattern Language of Information Integrity", Pattern Languages of Program Design, by Ward Cunningham, edited by James O Coplien and Douglas C Schmidt. Addison-Wesley. (1995)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc0d13a9-30e3-49dc-8285-6b55d0a76b5c"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro>
[Daconta 00] When Runtime.exec() won't, by Michael C. Daconta, JavaWorld.com. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8524f88-dde1-43ce-958e-63dd80c05d65"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro>
[Daconta 03] More Java Pitfalls, by Michael C. Daconta, Kevin T. Smith, Donald Avondolio and W. Clay Richardson. Wiley Publishing Inc. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ff5ae7c-84e3-4dc4-b138-bc0ee76970e9"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro>
[Darwin 04] Java Cookbook, by Ian F. Darwin (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="32e90c3e-9926-464a-b6eb-0fea2d4b6aac"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro>
[Doshi 03] Best Practices for Exception Handling by Gunjan Doshi. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="207ecd52-8809-4a2f-8f09-1a30a7ffa0f0"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro>
[Eclipse 08] The Eclipse Platform (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="808d0c7b-c0ef-44a2-a180-4ba4f174cf2e"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro>
[Enterprise 03] Java Enterprise Best Practices, by the O'Reilly Java Authors. O'Reilly. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a0dd20c-398e-4e58-98a6-16fe07b00a62"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro>
[FindBugs 08] FindBugs Bug Descriptions (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eb4169a0-a8c7-490e-afd5-a386a0e8ff5c"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro>
[Fisher 03] JDBC API Tutorial and Reference, 3rd edition, by Maydene Fisher, Jon Ellis, and Jonathan Bruce, Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6764e17e-aefb-46dd-b686-bdb0d908da75"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro>
[Flanagan 05] Java in a Nutshell, 5th edition, by David Flanagan, O'Reilly Media, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7230f9cf-763a-4bd0-8f24-b695e401010f"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro>
[Fox 01] When is a Singleton not a Singleton?, by Joshua Fox, Sun Developer Network (SDN) (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f7b2c91-e775-4caa-a1a8-e85394017d5f"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro>
[FT 08] Function Table Class FunctionTable, Field detail, public static FuncLoader m_functions

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c199e39f-c737-4a85-949c-e1b34284c982"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>
[Gamma 95] Design Patterns: Elements of Reusable Object-Oriented Software, by Erich Gamma, Richard Helm, Ralph Johnson, John M. Vlissides. Addison-Wesley Professional Computing Series. (1995)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce7261c3-ea82-439d-a94e-25daa0c29957"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro>
[Garms 01] Professional Java Security, by Jess Garms and Daniel Somerfield. Wrox Press Ltd. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27cf27f8-0484-4617-8e36-11e906bb633c"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro>
[Goetz 04] Java theory and practice: Garbage collection and performance, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04836861-916b-4dd7-9f22-66789f577204"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro>
[Goetz 04b] Java theory and practice: The exceptions debate: To check, or not to check?, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97fb98d3-1a0c-4f25-9e2d-7a96685aa08b"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro>
[Goetz 05] Java theory and practice: Be a good (event) listener, Guidelines for writing and supporting event listeners, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31148dd5-d889-4479-9b23-fd389c5c5356"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro>
[Goetz 06] Java Concurrency in Practice, by Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, Doug Lea. Addison Wesley Professional. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a740296-aa43-41a5-9bd8-5a4a102a5e17"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro>
[Goetz 06b] Java theory and practice: Good housekeeping practices, by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7402104e-166b-4971-9d1b-f1ce42a0c288"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>
[Goldberg 91] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19c8f17b-e3dd-4a36-9da1-d5a1cc958344"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro>
[Gong 03] Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edition, by Li Gong, Gary Ellison, and Mary Dageforde. Prentice Hall, The Java Series. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4ed3ee3d-0161-46e2-9037-c4ca8aeaf71e"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro>
[Greanier 00] Discover the secrets of the Java Serialization API, by Todd Greanier, Sun Developer Network (SDN). (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d34af57c-71bc-4637-961e-45714b614126"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro>
[Green 08] Canadian Mind Products Java & Internet Glossary by Roedy Green. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c8ff420-75ad-4455-a190-3dd2465c4953"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro>
[Gupta 05] Java memory leaks - Catch me if you can, by Satish Chandra Gupta and Rajeev Palanki. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="01babd52-b1e7-4308-96e8-dc408e905650"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro>
[Halloway 00] Java Developer Connection Tech Tips, March 28, 2000, by Stuart Halloway.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0293727c-da90-48de-b593-3afa6d66eb0c"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro>
[Halloway 01] Java Developer Connection Tech Tips, January 30, 2001, by Stuart Halloway.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d7bcb60-893c-413b-b147-de2b8f3cb1be"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro>
[Harold 97] Java Secrets by Elliotte Rusty Harold. Wiley. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4f9ba54-ec5a-402e-a5be-87f84531487f"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro>
[Harold 99] Java I/O, by Elliotte Rusty Harold. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e20ca831-d1b5-4318-a182-2d2a5a9d6605"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro>
[Henney 03] Null Object, Something for Nothing, by Kevlin Henney (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88e51037-c6e0-4d22-adba-9de9fa7a8de1"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro>
[JarSpec 08] J2SE Documentation version 1.5, Sun Microsystems. Jar File Specification (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="222a82e9-5270-4be9-9da8-eacb34c20764"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro>
[Java2NS 99] Java 2 Network Security, by Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani. IBM Corporation. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="431c22ba-ecb9-4210-bc87-3e37f07de6f5"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro>
[J2SE 00] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems. J2SE Documentation version 1.3 (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3f096e21-f62d-464f-b60e-c9f51a981959"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro>
[JavaGenerics 04] [http://java.sun.com/j2se/1.5.0/docs/guide/language/generics.html], Sun Microsystems (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="988f195e-f078-4708-9be9-68cf238fc6e8"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro>
[JavaThreads 99] Java Threads (2nd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05e9c7b9-68b9-41d3-92a8-ad85c9133543"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro>
[JavaThreads 04] Java Threads (3rd Edition) by, Scott Oaks and Henry Wong. O'REILLY. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cc36221-d08d-4882-b2d6-cbb0e2eb9f5e"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro>
[Sun 06] Java™ Platform, Standard Edition 6 documentation. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb2f25cb-f410-4d89-b33d-c560d236d28d"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro>
[JDK7 08] Java™ Platform, Standard Edition 7 documentation, 19 Dec 2008. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c85628dc-4e4f-48d3-b0a4-ef2eb073e994"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro>
[JLS 05] Java Language Specification, 3rd edition. by James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. Prentice Hall, The Java Series. The Java Language Specification. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="710f2012-0bcf-4a52-8869-677ae5481b11"><ac:parameter ac:name="">JLS 06</ac:parameter></ac:structured-macro>
[JLS 06] Java Language Specification, 4th edition. by Ken Arnold, James Gosling, and David Holmes. Prentice Hall, The Java Series. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="646f1ec6-df2e-4ea6-9ac2-c6599612c047"><ac:parameter ac:name="">JPL 05</ac:parameter></ac:structured-macro>
[JPL 05] The Java™ Programming Language, Fourth Edition, by Ken Arnold, James Gosling, David Holmes. Addison Wesley Professional. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a764bb9-dd4f-41fb-a4db-8026f454f2b9"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro>
[JMX 06] Monitoring and Management for the Java Platform, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7099ca6e-f504-44f3-a012-60d4a5582a76"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro>
[JMXG 06] Java SE Monitoring and Management Guide, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="248ed79f-e440-4a08-a061-4fe2d7fc257b"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro>
[JNI 06] Java Native Interface, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99c0c999-a7e8-460d-ba76-3b2d3372c517"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro>
[JPDA 04] Java Platform Debugger Architecture (JPDA), Sun Microsystems, Inc. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fa20a46-3938-448c-9c6f-65fa4209fbcc"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro>
[JVMTI 06] Java Virtual Machine Tool Interface (JVM TI), Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2959723-ddcd-4b22-bb75-94519a303732"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro>
[JVMSpec 99] The Java Virtual Machine Specification, Sun Microsystems, Inc. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0de6f6db-2814-40fc-a2a7-19802de97913"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro>
[Kabutz 01] The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8798b65-da28-4677-bc1d-b79dbc604c2a"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro>
[Kalinovsky 04] Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky. SAMS Publishing. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="840ce619-5b6c-4066-813f-30ccde416671"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro>
[Lai 08] Java Insecurity: Accounting for Subtleties That Can Compromise Code, by Charlie Lai, Sun Microsystems (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d354cb1a-438f-4701-a5b6-e124757d229f"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro>
[Langer 08] http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html, Angelica Langer (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85bf937d-be7e-4826-b1a0-c18d60684216"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro>
[Lea 00] Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems. (2000)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f304be7-4fe7-4ece-88e8-f7f652f2bdad"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro>
[Liang 97] The Java™ Native Interface, Programmer's Guide and Specification, by Sheng Liang. ADDISON-WESLEY. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e29ecf77-0460-4629-b21c-d2231d4b320d"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro>
[Long 05] Software Vulnerabilities in Java, by Fred Long, CMU/SEI-2005-TN-044. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5db06919-00de-49a1-90d3-ff5eff0a8ce8"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro>
[Lo 05] Security Issues in Garbage Collection, by Dr. Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, University of Nebraska at Lincoln, Dr. J. Morris Chang, Iowa State University. STSC Crosstalk, October 2005 issue. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="411e84bd-f3a9-4a1a-b989-4d3b093b7a8f"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro>
[Low 97] Protecting Java Code via Obfuscation, by Douglas Low. (1997)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3469e50-71c4-49d1-9078-bbba53dba3de"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro>
[Macgregor 98] Java Network Security, by Robert Macgregor, Dave Durbin, John Owlett and Andrew Yeomans. Prentice Hall. (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1b81d8e-598e-42aa-8907-b0009310df18"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro>
[McCluskey 01] Java Developer Connection Tech Tips, April 10, 2001, by Glen McCluskey.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ad63fcd-acb0-442a-8adf-ebc4e5f90fdc"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro>
[McGraw 00] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8062df4f-e6ab-4861-8ed3-3c95d57542d3"><ac:parameter ac:name="">Mcgraw 98</ac:parameter></ac:structured-macro>
[Mcgraw 98] Twelve rules for developing more secure Java code, Gary Mcgraw and Edward Felten, JavaWorld.com (1998)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4528bd5d-6688-4207-ba0f-f5b83b5686e6"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro>
[MITRE 09] Common Weakness Enumeration (2009)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13cc3f7f-54ab-4bd4-a66a-79f9a04a72b1"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro>
[Mocha 07] Mocha, the Java Decompiler (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3b86b9f4-41ae-45d3-9f04-3fd7c302bd02"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro>
[Muchow 01] MIDlet Packaging with J2ME, by John W. Muchow (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f14deaf3-3ea3-43d6-930e-467664194379"><ac:parameter ac:name="">Müller 02</ac:parameter></ac:structured-macro>
[Müller 02] Exception Handling: Common Problems and Best Practice with Java 1.4 by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0d55f82e-3a4b-4a93-b90a-0ffe6724fbe1"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro>
[Naftalin 06] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="98ea70a6-c261-44e5-8703-cb73b5f7c8ad"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro>
[Neward 04] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3d2b3d5-c1af-4899-aec9-294c4bb4529f"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro>
[Nisewanger 07] Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ad638d9f-dc27-4f55-9608-5adab6c5b115"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro>
[Nolan 04] Decompiling Java, by Godfrey Nolan, Apress. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="774a55e6-7852-4b89-9b0b-c9ddd9bbe0b8"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro>
[Oaks 01] Java Security, by Scott Oaks. O'REILLY. (2001)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e6ccf57-13d9-439a-8e2f-3a90dd045d63"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro>
[OWASP 08] OWASP. (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7d1aa94-d3fb-4151-8e77-551a254989d7"><ac:parameter ac:name="">Patterns 02</ac:parameter></ac:structured-macro>
[Patterns 02] Patterns in Java, Volume 1, Second Edition, by Mark Grand. Wiley. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="341ea817-aa2c-4a3d-a213-2a0b75a61092"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro>
[Phillips 05] Are We Counting Bytes Yet? at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="df498900-e1a2-4ec8-9301-b7977e223a0c"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro>
[Pistoia 04] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79f0d3bd-0548-4663-a4c3-eead580e779b"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro>
[Policy 02] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems, Inc. (2002)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a78f69bc-cc27-4d3d-a272-f57851c7afaa"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro>
[Reflect 06] Reflection, Sun Microsystems, Inc. (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aaea4cbd-4ae2-4ef6-9664-ce07e2d7b0dc"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro>
[Roubtsov 03] Breaking Java exception-handling rules is easy, by Vladimir Roubtsov, JavaWorld.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4de3aac5-b086-44cd-8f54-63bf32917244"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro>
[SCG 07] Secure Coding Guidelines for the Java Programming Language, version 2.0 (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5076855d-ca34-4a1e-87af-8776f986361d"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro>
[Schildt 07] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05825185-eb49-4c11-886d-632388795857"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro>
[Schwarz 04] Avoiding Checked Exceptions, by Don Schwarz, ONJava (2004)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f4ef6fd3-8737-46e9-b2dc-202a42e474a7"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro>
[Schweisguth 03] Java Tip 134: When catching exceptions, don't cast your net too wide, by Dave Schweisguth. Javaworld.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="94240777-0ff8-466a-8d41-fe3181eb5762"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>
[Seacord 05] Seacord, Robert C. Secure Coding in C and C++. Boston, MA: Addison-Wesley. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1c07c7d-4c7a-4ae5-ae96-3b59cd217641"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro>
[SecArch 06] Java 2 Platform Security Architecture (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1786915e-4f64-454c-9745-5f672034702d"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro>
[Security 06] Java Security Guides (2006)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6b76e8f4-690a-446c-9925-1a648197b5d8"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro>
[SecuritySpec 08] http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c0f20c6a-9958-433e-b0ef-3aa00331affe"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro>
[Steel 05] Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Micros. (2005)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8cb6e094-e20c-4fcb-bfb4-02b2a61b18c7"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro>
[SDN 08] SUN Developer Network (1994-2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e844a22-58b2-4339-a3d0-9ccc9687a513"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro>
[Sun 03] Sun ONE Application Server 7 Performance Tuning Guide (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c3b7ff0e-dfae-4aba-9067-95d09438680b"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro>
[Techtalk 07] The PhantomReference Menace. Attack of the Clone. Revenge of the Shift., by Josh Bloch and William Pugh, JavaOne Conference (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55eb0867-d015-4d77-b294-5ed8c956c86c"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro>
[Tutorials 08] The Java Tutorials (2008)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3fc1ce17-7bc7-436a-8ad4-464ba37e8560"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro>
[Venners 03] Failure and Exceptions, A Conversation with James Gosling, Part II, by Bill Venners. Artima.com. (2003)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8146501c-e15b-41fa-b118-ae85c2ea3740"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro>
[Wheeler 03] Secure Programming for Linux and Unix HOWTO, David A. Wheeler (2003)

  • No labels