Extreme Search Solutions: Understanding and Surpassing Joomla! Search
Joomla Appstore/ JoomRepo/ a new JED
What's new in joomla! 3.3
Ffi
Javascript Dependency Management
8 Most Common Joomla! Hacks and How to Avoid Them
JLayout for extension developers
Protecting Browsers from Extension Vulnerabilities
A Methodology for Empirical Analysis of Permission -Based Security Models and its Application to Android
David Barrera, H. Güne¸s Kayacık , P.C. van Oorschot , Anil Somayaji