Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: erased broken link

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="35b035045390dcba-e8a1ee01-480b4288-baa6b5bd-c98a82b445b7fabaddf764a4"><ac:plain-text-body><![CDATA[

[[Bloch 2008

AA. Bibliography#Bloch 08]]

Item 11: Override clone judiciously

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2a360180b2843215-4e1e4863-40264cf7-9f88a186-1bd9594097f9a0c4125d38ff"><ac:plain-text-body><![CDATA[

[[Gong 2003

AA. Bibliography#Gong 03]]

 

]]></ac:plain-text-body></ac:structured-macro>

...