Java Reference
In-Depth Information
[Guillardoy 2012] Guillardoy, Esteban. Java 0Day Analysis (CVE-2012-4681). (2012).
http://immunityproducts.blogspot.com.ar/2012/08/java-0day-analysis-
cve-2012-4681.html
[Hatton 1995] Hatton, Les. Safer C: Developing Software for High-integrity and Safety-
critical Systems . New York, NY: McGraw-Hill, (1995).
[Hawtin 2006] Hawtin, Thomas. [drlvm][kernel_classes] ThreadLocal Vulnerability.
MarkMail (2006). http://markmail.org/message/4scermxmn5oqhyi
[Havelund 2009] Havelund, Klaus, and Al Niessner. JPL Coding Standard, Version
1.1. California Institute of Technology (2009). http://lars-lab.jpl.nasa.gov/
JPL_Coding_Standard_Java.pdf
[Hirondelle 2013] Passwords Never Clear in Text. Hirondelle Systems (2013).
www.javapractices.com/topic/TopicAction.do?Id=216
[ISO/IEC 9126-1:2001] Software Engineering—Product Quality, Part 1, Quality Model
(ISO/IEC 9126-1:2001). Geneva, Switzerland: International Organization for Standardiz-
ation (2001).
[ISO/IEC/IEEE 24765:2010] Software Engineering—Product Quality, Part 1, Quality
Model (ISO/IEC/IEEE 24765:2010). Geneva, Switzerland: International Organization for
Standardization (2010).
[JLS 2013] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley.
The Java Language Specification: Java SE 7 Edition. Oracle America, Inc. (2013). ht-
tp://docs.oracle.com/javase/specs/jls/se7/html/index.html
[JVMSpec 1999] The Java Virtual Machine Specification, Second Edition. Sun Mi-
crosystems, Inc. (1999). http://docs.oracle.com/javase/specs/
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java : Techniques for Decompiling,
Patching, and Reverse Engineering . Indianapolis, IN: SAMS (2004).
[Knoernschild 2002] Knoernschild, Kirk. Java Design: Objects, UML, and Process .
Boston, MA: Addison-Wesley (2002).
[Lea 2000] Lea, Doug. Concurrent Programming in Java : Design Principles and Pat-
terns, Second Edition . Boston, MA: Addison-Wesley (2000).
[Lo 2005] Lo,Chia-TienDan,WitawasSrisa-an,andJ.MorrisChang.“SecurityIssuesin
Garbage Collection.” STSC Crosstalk (2005). www.eng.auburn.edu/users/hamilton/secur-
ity/papers/
STSC%20CrossTalk%20-%20Security%20Issues%20in%20Garbage%20Collection%20-%20Oct%a02005.pdf
 
 
Search WWH ::




Custom Search