Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup

...

" ac:schema-version="1" ac:macro-id="486fdb55-22ee-42e8-8a26-1d966decd2fb"><ac:plain-text-body><![CDATA[

[[API

...

2006

...

AA.

...

Bibliography#API

...

06]

...

]

...

Class

...

Object

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1a8ad701-e43a-4db9-a213-a1a524d049f0"><ac:plain-text-body><![CDATA[

[[Grosso 2001

AA. Bibliography#Grosso 01]]

[Chapter 10: Serialization

http://oreilly.com/catalog/javarmi/chapter/ch10.html]

...

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="cd9b4df3-d9e9-49dc-b7c2-ec9c9b5d926d"><ac:plain-text-body><![CDATA[

[[JLS

...

2005

...

AA.

...

Bibliography#JLS

...

05]

...

]

...

[Chapter

...

17,

...

Threads

...

and

...

Locks

...

http://java.sun.com/docs/books/jls/third_edition/html/memory.html]

...

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="39675e49-c5fb-481e-93f9-2292310d109c"><ac:plain-text-body><![CDATA[

[[Rotem

...

2008

...

AA.

...

Bibliography#Rotem

...

08]

...

]

...

[Falacies

...

of

...

Distributed

...

Computing

...

Explained

...

http://www.rgoarchitects.com/Files/fallacies.pdf]

]]></ac:plain-text-body></ac:structured-macro>

...

      08. Locking (LCK)      LCK10-J. Do not use incorrect forms of the double-checked locking idiom