...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Bibliography
| Wiki Markup |
|---|
\[[JVMSpec 1999|AA. Bibliography#JVMSpec 99]\] [§2.8.1 Class Names|http://java.sun.com/docs/books/jvms/second_edition/html/Concepts.doc.html] \[[Christudas 2005|AA. Bibliography#Christudas 05]\] \[[Mcgraw 1998|AA. Bibliography#Mcgraw 98]\] \[[Wheeler 2003|AA. Bibliography#Wheeler 03]\] [Java|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/java.html] \[[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 486|http://cwe.mitre.org/data/definitions/486.html] "Comparison of Classes by Name" |
...