<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a89f3fe-3de3-43ae-b5be-0376026fcc26"><ac:parameter ac:name="">Williams 10</ac:parameter></ac:structured-macro>\[Williams 2010\] Williams, Anthony. [Boost Library Thread|http://www.boost.org/doc/libs/1_44_0/doc/html/thread.html], 2007-2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9b235826-2326-4a05-ae64-b8396a0387d0"><ac:parameter ac:name="">Abrahams 10</ac:parameter></ac:structured-macro>\[Abrahams 2010\] Abrahams, David. [Boost Library Error Handling Guidelines, #7|http://www.boost.org/community/error_handling.html], 2001-2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14d252d1-e63d-4dca-9a20-4e5bc267cd49"><ac:parameter ac:name="">Barney 10</ac:parameter></ac:structured-macro>\[Barney 2010\] Barney, Blaise. [POSIX Threads Programming|https://computing.llnl.gov/tutorials/pthreads/], Lawrence Livermore National Security, LLC, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9609ada7-9c86-4423-b587-1fea4d172b74"><ac:parameter ac:name="">Becker 08</ac:parameter></ac:structured-macro>\[Becker 2008\] Becker, Pete. [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2008/n2521.pdf], April 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56d6f605-8642-4271-8384-77c8a2ba645d"><ac:parameter ac:name="">Becker 09</ac:parameter></ac:structured-macro>\[Becker 2009\] Becker, Pete [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/JTC1/SC22/WG21/docs/papers/2009/n3000.pdf], September 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50a6b862-a65c-4aa6-aeef-bf017de9e88a"><ac:parameter ac:name="">Black 07</ac:parameter></ac:structured-macro>\[Black 2007\] Paul E. Black, Michael Kass, Michael Koo. Source Code Security Analysis Tool Functional Specification Version 1.0. Special Publication 500-268. Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, May 2007. [http://samate.nist.gov/docs/source_code_security_analysis_spec_SP500-268.pdf]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cd6fa90-d631-471f-ac7c-631094dd2fdb"><ac:parameter ac:name="">Cline 09</ac:parameter></ac:structured-macro>\[Cline 2009\] Cline, Marshall. [C+\+ FAQ Lite - Frequently Asked Questions|http://www.parashift.com/c++-faq-lite/index.html] 1991-2009

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8d0b99fd-c3e2-4cf7-8eb5-a82869ecf4e3"><ac:parameter ac:name="">CWE</ac:parameter></ac:structured-macro> \[CWE\] MITRE. [Common Weakness Enumeration|http://cwe.mitre.org/] -- A Community-Developed Dictionary of Software Weakness Types.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd105d40-b160-4203-9566-8e9dff6a279f"><ac:parameter ac:name="">Dewhurst 03</ac:parameter></ac:structured-macro>\[Dewhurst 2003\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2076e2d3-9c7c-451c-b81c-58cf98c146c0"><ac:parameter ac:name="">Dewhurst 05</ac:parameter></ac:structured-macro>\[Dewhurst 2005\] Dewhurst, Stephen C. _C+\+ Common Knowledge:  Essential Intermediate Programming_. Boston, MA: Addison-Wesley Professional, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95cad12b-305e-45ae-8c40-29cfd915abd1"><ac:parameter ac:name="">Dowd 07</ac:parameter></ac:structured-macro>\[Dowd 2007\] Dowd, McDonald & Schuh. [The Art of Software Security Assessment - Attacking delete and delete\[\] in C+\+|http://taossa.com/index.php/2007/01/03/attacking-delete-and-delete-in-c], 2007.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4617496c-d320-4635-85d7-9093642484e0"><ac:parameter ac:name="">Fortify 06</ac:parameter></ac:structured-macro>\[Fortify 2006\] Fortify Software Inc. [Fortify Taxonomy: Software Security Errors|http://www.fortifysoftware.com/vulncat/], 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85019c0a-83e6-47bd-844b-934e3fd6ea35"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro>\[FSF 2005\] Free Software Foundation. [GCC online documentation.|http://gcc.gnu.org/onlinedocs] (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d89bdbc-ffbd-4e0c-a1b2-ad2a5e1ebae8"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>\[Gamma 1995\] Gamma, Helm, Vlissides, and Johnson. Design Patterns Elements of Reusable Object Oriented Software. Addison Wesley, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79f402bd-f98a-480b-a0c6-140ef4239749"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="063e7256-e9ed-467e-a675-0223616be54a"><ac:parameter ac:name="">Graff 03</ac:parameter></ac:structured-macro>\[Graff 2003\] Graff, Mark G. & Van Wyk, Kenneth R. _Secure Coding: Principles and Practices_. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5357900-64ba-4d7a-9afd-4c19e9a37d47"><ac:parameter ac:name="">Henricson 97</ac:parameter></ac:structured-macro>\[Henricson 1997\] Henricson, Mats & Nyquist, Erik. [_Industrial Strength C+\+_|http://www.sannabremo.se/nyquist/industrial/]. Upper Saddle River, NJ: Prentice Hall PTR, 1997 (ISBN 0-13-120965-5).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79a571d9-3f30-4124-a08f-ebd17f8e2858"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>\[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9117087-a6df-4da5-914d-346e35cd7a76"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>\[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. _Programming Languages --- C, Second Edition_, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c056c16b-5b4d-4419-8db8-96e8f6e6470a"><ac:parameter ac:name="">ISO/IEC 14882-1998</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-1998\] ISO/IEC 14882-1998. _Programming Languages --- C++, First Edition_, 1998.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ebd630a7-c2e6-4ad2-b2a8-4580c8430485"><ac:parameter ac:name="">ISO/IEC 14882-2003</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-2003\] ISO/IEC 14882-2003. _Programming Languages --- C++, Second Edition_, 2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00c4ffc6-96fb-4f19-8b78-c20961e6a50f"><ac:parameter ac:name="">ISO/IEC DTR 24772</ac:parameter></ac:structured-macro>\[ISO/IEC DTR 24772\] ISO/IEC DTR 24772. _Information Technology_ --- _Programming Languages_ --- [_Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use_|http://www.aitcnet.org/isai/_Mtg_13/22-WG23-N-0238/n0238.pdf], November 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a11f086-e272-4049-acc5-7614594e2aec"><ac:parameter ac:name="">Lions 96</ac:parameter></ac:structured-macro>\[Lions 1996\] Lions, J. L. [ARIANE 5 Flight 501 Failure Report|http://en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report]. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b09d0691-1d23-457c-b0da-244eb8476e86"><ac:parameter ac:name="">Lockheed Martin 05</ac:parameter></ac:structured-macro>\[Lockheed Martin 2005\] Lockheed Martin. "[Joint Strike Fighter Air Vehicle C+\+ Coding Standards for the System Development and Demonstration Program.|http://www.research.att.com/~bs/JSF-AV-rules.pdf]" Document Number 2RDU00001 Rev C., December 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7e513f3-f1b3-426d-9b20-f4623383e8ed"><ac:parameter ac:name="">Meyers 95</ac:parameter></ac:structured-macro>\[Meyers 1995\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley Professional, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0200bf23-8b90-4b2a-a22a-f091d1150679"><ac:parameter ac:name="">Meyers 96</ac:parameter></ac:structured-macro>\[Meyers 1996\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley, 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67f0afab-9f6a-4a62-93b2-3c29e86bac09"><ac:parameter ac:name="">Meyers 97</ac:parameter></ac:structured-macro>\[Meyers 1997\] Meyers, Scott. _Effective C+\+ : 55 Specific Ways to Improve Your Programs and Designs_, 3rd ed.  Boston, MA: Addison-Wesley Professional, 1997.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f0b0677b-eb4f-4ddd-a07f-34ac19053a9b"><ac:parameter ac:name="">Meyers 01</ac:parameter></ac:structured-macro>\[Meyers 2001\] Meyers, Scott. _Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library_. Boston, MA: Addison-Wesley Professional, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b694965-aec5-4179-881a-8a7b53e53ab6"><ac:parameter ac:name="">Meyers 05</ac:parameter></ac:structured-macro>\[Meyers 2005\] Meyers, Scott. _Effective C++: 55 Specific Ways to Improve Your Programs and Designs (3rd Edition)_. Boston, MA: Addison-Wesley Professional, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5750457d-2a61-4a8f-8cdd-79089d26cd2f"><ac:parameter ac:name="">Microsoft 10</ac:parameter></ac:structured-macro>\[Microsoft 2010\] [STL std::string class causes crashes and memory corruption on multi-processor machines|http://support.microsoft.com/kb/813810]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2f8388e6-42d6-491c-a3e4-06daf338b7f3"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>\[MISRA 2004\] MIRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6943242f-24e7-4488-89c2-6acba0bc206b"><ac:parameter ac:name="">MISRA 08</ac:parameter></ac:structured-macro>\[MISRA 2008\] MIRA Limited. "[MISRA C+\+|http://www.misra.org.uk/]: 2008 "Guidelines for the Use of the C+\+ Language in Critical Systems", ISBN 978-906400-03-3 (paperback), ISBN 978-906400-04-0 (PDF), June 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07c9fdb3-6cd9-49e1-a5fb-f106a17dac4c"><ac:parameter ac:name="">MITRE 07</ac:parameter></ac:structured-macro>\[MITRE 2007\] MITRE. [Common Weakness Enumeration, Draft 9|http://cwe.mitre.org/], April 2008.
\\

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="445ba343-de17-40d2-ac54-4dce551bcc02"><ac:parameter ac:name="">MITRE 08a</ac:parameter></ac:structured-macro>\[MITRE 2008a\] MITRE. [CWE ID 327|http://cwe.mitre.org/data/definitions/327.html], "Use of a Broken or Risky Cryptographic Algorithm," 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af22efaf-1510-4650-a91b-b7c0e51577d9"><ac:parameter ac:name="">MITRE 08b</ac:parameter></ac:structured-macro>\[MITRE 2008b\] MITRE. [CWE ID 330|http://cwe.mitre.org/data/definitions/330.html], "Use of Insufficiently Random Values," 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9bf1d3fb-2ad1-4da5-bf8e-bc14684421c6"><ac:parameter ac:name="">MSDN 10</ac:parameter></ac:structured-macro>\[MSDN 2010\] MSDN. "[CryptGenRandom Function|http://msdn.microsoft.com/en-us/library/aa379942.aspx]."

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="be7200dd-38b9-4356-a031-ae01c2230c1c"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>\[NIST 2006\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/], 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97fb5d7a-f186-47da-973b-9337d3b025cf"><ac:parameter ac:name="">POSIX.1-2008</ac:parameter></ac:structured-macro><ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="981f3de0-d499-4173-b78f-de5f143716fe"><ac:parameter ac:name="">IEEE Std 1003.1-2008</ac:parameter></ac:structured-macro><ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfa78d32-4088-499c-a263-3ce12953eba9"><ac:parameter ac:name="">ISO/IEC 9945:2008</ac:parameter></ac:structured-macro><ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56f8ed30-c1dd-4dda-b5d5-cdf1e2270ce3"><ac:parameter ac:name="">Open Group 08</ac:parameter></ac:structured-macro>\[Open Group 2008\] The Open Group. [_The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2008 Edition_|http://www.opengroup.org/onlinepubs/9699919799/toc.htm], 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="13e9402e-bf3b-4878-8198-a08ef352effe"><ac:parameter ac:name="">POSIX.1-2004</ac:parameter></ac:structured-macro><ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7edd08c6-3cd1-4a66-9d39-e4ca9c5c7ec1"><ac:parameter ac:name="">IEEE Std 1003.1-2004</ac:parameter></ac:structured-macro><ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf9e6e28-487d-4b12-bb6d-c518d6d67acd"><ac:parameter ac:name="">ISO/IEC 9945:2003</ac:parameter></ac:structured-macro><ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1533fc86-ea68-4520-966e-d1b967528cef"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>\[Open Group 2004\] The Open Group. [_The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_|http://www.opengroup.org/onlinepubs/009695399/toc.htm], 2004.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="99925b56-6a53-44da-af62-c785062d43ca"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>\[Plum 1991\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, Inc., November 1991 (ISBN 0911537104).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c9182f9d-55d5-438b-b799-6ed0e490a35d"><ac:parameter ac:name="">Quinlan 06</ac:parameter></ac:structured-macro>\[Quinlan 2006\] Quinlan, Dan; Vuduc, Richard; Panas, Thomas; Härdtlein, Jochen; & Sæbjørnsen, Andreas. "Support for Whole-Program Analysis and the Verification of the One-Definition Rule in C++," 27-35. [NIST Special Publication 500-262|http://samate.nist.gov/docs/NIST_Special_Publication_500-262.pdf], _Proceedings of the Static Analysis Summit_. Gaithersburg, MD, July 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36eb8f56-38bf-47ba-af6f-94fb5f6d205c"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro>\[Saks 1999\] Dan Saks. _const T vs.T const_. Embedded Systems Programming. Pg. 13-16. February 1999. [http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="388348fe-320f-4d52-afe1-e71062eb2974"><ac:parameter ac:name="">Saks 07</ac:parameter></ac:structured-macro>\[Saks 2007\] Saks, Dan. "[Sequence Points|http://www.embedded.com/columns/programmingpointers/9900661?_requestid=481957]" Embedded Systems Design, 07/01/02.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0644ce6-e5c0-404a-9dad-d438ec374a5b"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>\[Seacord 2005\] Seacord, R. _Secure Coding in C and C+\+_. Upper Saddle River, NJ: Addison-Wesley, 2006 (ISBN 0321335724).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9a291733-b849-40c8-80bf-81af5eb7b7aa"><ac:parameter ac:name="">Sebor 04</ac:parameter></ac:structured-macro>\[Sebor 2004\] Sebor, Martin. [C+\+ Standard Core Language Active Issues, Revision 68, Issue 475|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2010/n3026.html#475], 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a47e9a1e-923a-482f-94aa-7d76ffdb0815"><ac:parameter ac:name="">SGI 06</ac:parameter></ac:structured-macro>\[SGI 2006\] Silicon Graphics, Inc. "[basic_string<charT, traits, Alloc>|http://www.sgi.com/tech/stl/basic_string.html]." _Standard Template Library Programmer's Guide_, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a544c107-e27c-48bc-8065-5ab3b6303c23"><ac:parameter ac:name="">Steele 77</ac:parameter></ac:structured-macro>\[Steele 1977\]  Steele, G. L. 1977. [Arithmetic shifting considered harmful.|http://doi.acm.org/10.1145/956641.956647] _SIGPLAN Not._ 12, 11 (Nov. 1977), 61-69.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a886d31-d5d8-488f-992f-569f496b80d3"><ac:parameter ac:name="">Stroustrup 97</ac:parameter></ac:structured-macro>\[Stroustrup 1997\] Stroustrup, Bjarne. _The C+\+ Programming Language, Third Edition_. Reading, MA: Addison-Wesley, 1997 (ISBN 0201889544).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27a3f4e7-544c-40e9-8c88-dbc46d9d1afe"><ac:parameter ac:name="">Stroustrup 06</ac:parameter></ac:structured-macro>\[Stroustrup 2006\] Stroustrup, Bjarne. [_C+\+ Style and Technique FAQ_|http://public.research.att.com/~bs/bs_faq2.html] (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f23d96cb-b3c3-488a-9e3b-2fde45be60cd"><ac:parameter ac:name="">Stroustrup 01</ac:parameter></ac:structured-macro>\[Stroustrup 2001\] Stroustrup, Bjarne. [Exception Safety: Concepts and Techniques|http://www.research.att.com/~bs/except.pdf] (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="979d1c12-0901-4075-b1b8-321536659e98"><ac:parameter ac:name="">Sun 93</ac:parameter></ac:structured-macro>\[Sun 1993\] [Sun Security Bulletin #00122|http://sunsolve.sun.com/search/document.do?assetkey=1-22-00122-1], 1993.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="08031e03-34e7-4708-8727-3905f0e0df1a"><ac:parameter ac:name="">Sutter 00</ac:parameter></ac:structured-macro>\[Sutter 2000\] Sutter, Herb. _Exceptional C++: 47 Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2000 (ISBN 0201615622).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="57fb4cd3-fcd2-4ecd-81a3-1d307ee3592b"><ac:parameter ac:name="">Sutter 01</ac:parameter></ac:structured-macro>\[Sutter 2001\] Sutter, Herb. _More Exceptional C++: 40 New Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2001 (ISBN 020170434).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0a7f2771-e603-4f88-94cf-85231db6a547"><ac:parameter ac:name="">Sutter 04</ac:parameter></ac:structured-macro>\[Sutter 2004\] Sutter, Herb & Alexandrescu, Andrei. _C+\+ Coding Standards: 101 Rules, Guidelines, and Best Practices_. Boston, MA: Addison-Wesley Professional, 2004 (ISBN 0321113586).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5421d47-5c7c-48c7-835a-fba9a6c2d83f"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>\[Viega 2003\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fed7eac-2696-4a75-ac31-c813981cfab6"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>\[Warren 2002\] Warren, Henry S. _Hacker's Delight_. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53b385bb-f87f-420d-b9f1-d8f2f4495e94"><ac:parameter ac:name="">Williams 10</ac:parameter></ac:structured-macro>\[Williams 2010\] Williams, Anthony. [Simpler Multithreading in C++0x|http://www.devx.com/SpecialReports/Article/38883/1954], Internet.com, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c02982aa-e587-47c6-9d1a-f869e1225b35"><ac:parameter ac:name=""> xorl 2009</ac:parameter></ac:structured-macro>\[xorl 2009\] xorl. [xorl %eax, %eax|http://xorl.wordpress.com/].