Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup

...

" ac:schema-version="1" ac:macro-id="e5e55779-460c-4d99-90f5-dd9edf3ff739"><ac:plain-text-body><![CDATA[

[[Bloch

...

2008

...

AA.

...

Bibliography#Bloch

...

08]

...

]

...

Item

...

39:

...

Make

...

defensive

...

copies

...

when

...

needed

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0bf47d63-a8b7-4688-9622-2431cb0f1242"><ac:plain-text-body><![CDATA[

[[Pugh 2009

AA. Bibliography#Pugh 09]]

Returning references to internal mutable state

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b09fa1cf-e12c-42ca-82e4-a6fd99ae15ba"><ac:plain-text-body><![CDATA[

[[SCG 2007

AA. Bibliography#SCG 07]]

Guideline 2-1 Create a copy of mutable inputs and outputs

]]></ac:plain-text-body></ac:structured-macro>

...

OBJ13-J. Do not expose sensitive private members of an outer class from within a nested class      04. Object Orientation (OBJ)      05. Methods (MET)