...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="486fdb55-22ee-42e8-8a26-1d966decd2fb"><ac:plain-text-body><![CDATA[ | [[API |
...
2006 |
...
AA. |
...
Bibliography#API |
...
06] |
...
] |
...
Class |
...
| ]]></ac:plain-text-body></ac:structured-macro> | |||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1a8ad701-e43a-4db9-a213-a1a524d049f0"><ac:plain-text-body><![CDATA[ | [[Grosso 2001 | AA. Bibliography#Grosso 01]] | [Chapter 10: Serialization | http://oreilly.com/catalog/javarmi/chapter/ch10.html] |
...
]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="cd9b4df3-d9e9-49dc-b7c2-ec9c9b5d926d"><ac:plain-text-body><![CDATA[ | [[JLS |
...
2005 |
...
AA. |
...
Bibliography#JLS |
...
05] |
...
] |
...
[Chapter |
...
17, |
...
Threads |
...
and |
...
Locks |
...
http://java.sun.com/docs/books/jls/third_edition/html/memory.html] |
...
]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="39675e49-c5fb-481e-93f9-2292310d109c"><ac:plain-text-body><![CDATA[ | [[Rotem |
...
2008 |
...
AA. |
...
Bibliography#Rotem |
...
08] |
...
] |
...
[Falacies |
...
of |
...
Distributed |
...
Computing |
...
Explained |
...
http://www.rgoarchitects.com/Files/fallacies.pdf] | ]]></ac:plain-text-body></ac:structured-macro> |
...
08. Locking (LCK) LCK10-J. Do not use incorrect forms of the double-checked locking idiom