Java Reference
In-Depth Information
[Sethi 2009] Sethi, Amit. Proper Use of Java's SecureRandom. Cigital Justice League
Blog (2009). www.cigital.com/justice-league-blog/2009/08/14/proper-use-of-javas-se-
curerandom/
[Steinberg 2008] Steinberg, Daniel H. Using the Varargs Language Feature. Java
Developer Connection Tech Tips (2008). www.java-tips.org/java-se-tips/java.lang/using-
the-varargs-language-feature.html
[Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoid-
ing Vulnerabilities. JavaOne Conference (2006). https://confluence.ucdavis.edu/conflu-
ence/download/attachments/16218/ts-1238.pdf?version=1&modificatio
nd-
ate=1180213302000
[Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. “Composable Thread
Coloring.” In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and
Practice of Parallel Programming (PPoPP '10) . New York, NY: ACM (2010). ht-
tp://dl.acm.org/citation.cfm?doid=1693453.1693485
[Tutorials 2013] The Java Tutorials. Oracle (2013). http://docs.oracle.com/javase/tu-
torial/index.html
[Unicode 2013] Unicode 6.2.0. Mountain View, CA: The Unicode Consortium (2013).
www.unicode.org/versions/Unicode6.2.0/
[Viega 2005] Viega, John. CLASP Reference Guide, Volume 1.1 . Secure Software, 2005.
[W3C 2003] The World Wide Web Security FAQ. World Wide Web Consortium (W3C)
(2003). www.w3.org/Security/Faq/wwwsf2.html
[Ware 2008] Ware, Michael S. Writing Secure Java Code: A Taxonomy of Heuristics
and an Evaluation of Static Analysis Tools . James Madison University (2008). ht-
tp://mikeware.us/thesis/
[Zadegan 2009] Zadegan, Bryant. A Lesson on Infinite Loops. winJade.net (2009). ht-
tp://winjade.net/2009/01/lesson-on-infinite-loops/
 
 
Search WWH ::




Custom Search