...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="e5e55779-460c-4d99-90f5-dd9edf3ff739"><ac:plain-text-body><![CDATA[ | [[Bloch |
...
2008 |
...
AA. |
...
Bibliography#Bloch |
...
08] |
...
] |
...
Item |
...
39: |
...
Make |
...
defensive |
...
copies |
...
when |
...
needed | ]]></ac:plain-text-body></ac:structured-macro> | |||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0bf47d63-a8b7-4688-9622-2431cb0f1242"><ac:plain-text-body><![CDATA[ | [[Pugh 2009 | AA. Bibliography#Pugh 09]] | Returning references to internal mutable state | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b09fa1cf-e12c-42ca-82e4-a6fd99ae15ba"><ac:plain-text-body><![CDATA[ | [[SCG 2007 | AA. Bibliography#SCG 07]] | Guideline 2-1 Create a copy of mutable inputs and outputs | ]]></ac:plain-text-body></ac:structured-macro> |
...
OBJ13-J. Do not expose sensitive private members of an outer class from within a nested class 04. Object Orientation (OBJ) 05. Methods (MET)