<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0215a2f5-7f2c-4d8a-bc1c-66333bce0002"><ac:parameter ac:name="">Abrahams 10</ac:parameter></ac:structured-macro>\[Abrahams 2010\] Abrahams, David. [Boost Library Error Handling Guidelines, #7|http://www.boost.org/community/error_handling.html], 2001-2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fcc11305-6807-49fb-84cb-8d593f64d5e5"><ac:parameter ac:name="">Barney 10</ac:parameter></ac:structured-macro>\[Barney 2010\] Barney, Blaise. [POSIX Threads Programming|https://computing.llnl.gov/tutorials/pthreads/], Lawrence Livermore National Security, LLC, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="683e43fe-a109-4b6c-9da5-f84cc2bec4a2"><ac:parameter ac:name="">Becker 08</ac:parameter></ac:structured-macro>\[Becker 2008\] Becker, Pete. [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2008/n2521.pdf], April 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1543d50-5647-47b4-ba70-a07148b31adb"><ac:parameter ac:name="">Becker 09</ac:parameter></ac:structured-macro>\[Becker 2009\] Becker, Pete [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/JTC1/SC22/WG21/docs/papers/2009/n3000.pdf], September 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ba99ec34-b4ea-4f8a-a7c3-c015447ddaee"><ac:parameter ac:name="">Black 07</ac:parameter></ac:structured-macro>\[Black 2007\] Paul E. Black, Michael Kass, Michael Koo. Source Code Security Analysis Tool Functional Specification Version 1.0. Special Publication 500-268. Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, May 2007. [http://samate.nist.gov/docs/source_code_security_analysis_spec_SP500-268.pdf]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63e33465-c769-4872-ac05-c2f130facfb1"><ac:parameter ac:name="">Cline 09</ac:parameter></ac:structured-macro>\[Cline 2009\] Cline, Marshall. [C+\+ FAQ Lite - Frequently Asked Questions|http://www.parashift.com/c++-faq-lite/index.html] 1991-2009

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2781e9b9-5794-401a-9bda-eccec5a9d9bf"><ac:parameter ac:name="">CWE</ac:parameter></ac:structured-macro> \[CWE\] MITRE. [Common Weakness Enumeration|http://cwe.mitre.org/] -- A Community-Developed Dictionary of Software Weakness Types.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5c1316a-ba49-4c6a-9998-2cd4ced98cd1"><ac:parameter ac:name="">Dewhurst 03</ac:parameter></ac:structured-macro>\[Dewhurst 2003\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc0b554d-2f6b-48f9-a90f-cbafcbfd3e35"><ac:parameter ac:name="">Dewhurst 05</ac:parameter></ac:structured-macro>\[Dewhurst 2005\] Dewhurst, Stephen C. _C+\+ Common Knowledge:  Essential Intermediate Programming_. Boston, MA: Addison-Wesley Professional, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="afce9f80-203b-4bd4-9561-ba5e0d899d3a"><ac:parameter ac:name="">Dowd 07</ac:parameter></ac:structured-macro>\[Dowd 2007\] Dowd, McDonald & Schuh. [The Art of Software Security Assessment - Attacking delete and delete\[\] in C+\+|http://taossa.com/index.php/2007/01/03/attacking-delete-and-delete-in-c], 2007.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2101db4-b398-4451-aff1-c89b625e8dab"><ac:parameter ac:name="">Fortify 06</ac:parameter></ac:structured-macro>\[Fortify 2006\] Fortify Software Inc. [Fortify Taxonomy: Software Security Errors|http://www.fortifysoftware.com/vulncat/], 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ab0a40e-eae6-4520-b170-0e873f9545b9"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro>\[FSF 2005\] Free Software Foundation. [GCC online documentation.|http://gcc.gnu.org/onlinedocs] (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1939b8f6-e513-4890-89de-bb4d00faf54f"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>\[Gamma 1995\] Gamma, Helm, Vlissides, and Johnson. Design Patterns Elements of Reusable Object Oriented Software. Addison Wesley, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47bce879-668f-4393-8026-ecb87fdeba73"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d8ec4de3-9ca8-4319-b4b5-6df7215a31a3"><ac:parameter ac:name="">Graff 03</ac:parameter></ac:structured-macro>\[Graff 2003\] Graff, Mark G. & Van Wyk, Kenneth R. _Secure Coding: Principles and Practices_. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9547bbc3-f180-49e9-8337-5c14d8083792"><ac:parameter ac:name="">Henricson 97</ac:parameter></ac:structured-macro>\[Henricson 1997\] Henricson, Mats & Nyquist, Erik. [_Industrial Strength C+\+_|http://www.sannabremo.se/nyquist/industrial/]. Upper Saddle River, NJ: Prentice Hall PTR, 1997 (ISBN 0-13-120965-5).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6ffb5425-bf5d-4a98-a252-8fa67d285a23"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>\[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dec65f47-ec78-4729-a28b-2566e9762d12"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>\[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. _Programming Languages --- C, Second Edition_, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="04fbfb55-349c-4e78-98d9-904da483d419"><ac:parameter ac:name="">ISO/IEC 14882-1998</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-1998\] ISO/IEC 14882-1998. _Programming Languages --- C++, First Edition_, 1998.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de1f0741-3d5b-410e-b2fe-eca773dd7769"><ac:parameter ac:name="">ISO/IEC 14882-2003</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-2003\] ISO/IEC 14882-2003. _Programming Languages --- C++, Second Edition_, 2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8fd55858-207a-4dad-95f7-674de374c36d"><ac:parameter ac:name="">ISO/IEC DTR 24772</ac:parameter></ac:structured-macro>\[ISO/IEC DTR 24772\] ISO/IEC DTR 24772. _Information Technology_ --- _Programming Languages_ --- [_Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use_|http://www.aitcnet.org/isai/_Mtg_13/22-WG23-N-0238/n0238.pdf], November 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67543710-469d-46e6-bf94-d1d99ef4b2d6"><ac:parameter ac:name="">Lions 96</ac:parameter></ac:structured-macro>\[Lions 1996\] Lions, J. L. [ARIANE 5 Flight 501 Failure Report|http://en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report]. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abb6cdd7-c165-4b9c-8b0f-f9c3295eac16"><ac:parameter ac:name="">Lockheed Martin 05</ac:parameter></ac:structured-macro>\[Lockheed Martin 2005\] Lockheed Martin. "[Joint Strike Fighter Air Vehicle C+\+ Coding Standards for the System Development and Demonstration Program.|http://www.research.att.com/~bs/JSF-AV-rules.pdf]" Document Number 2RDU00001 Rev C., December 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b7d90b77-45ec-42b7-ae08-93a767933332"><ac:parameter ac:name="">Meyers 95</ac:parameter></ac:structured-macro>\[Meyers 1995\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley Professional, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="987ea2f9-9b58-47e3-b56b-5c18f6bcfaca"><ac:parameter ac:name="">Meyers 96</ac:parameter></ac:structured-macro>\[Meyers 1996\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley, 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="64928027-d640-4ba8-8053-1c5c6e588471"><ac:parameter ac:name="">Meyers 97</ac:parameter></ac:structured-macro>\[Meyers 1997\] Meyers, Scott. _Effective C+\+ : 55 Specific Ways to Improve Your Programs and Designs_, 3rd ed.  Boston, MA: Addison-Wesley Professional, 1997.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fbd7b13-65bc-4b38-ab70-15adc568befb"><ac:parameter ac:name="">Meyers 01</ac:parameter></ac:structured-macro>\[Meyers 2001\] Meyers, Scott. _Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library_. Boston, MA: Addison-Wesley Professional, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ce07838-159d-46a5-8e05-c7d0918b06f8"><ac:parameter ac:name="">Meyers 05</ac:parameter></ac:structured-macro>\[Meyers 2005\] Meyers, Scott. _Effective C++: 55 Specific Ways to Improve Your Programs and Designs (3rd Edition)_. Boston, MA: Addison-Wesley Professional, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffc177ba-898d-438a-812e-e268101ee9b7"><ac:parameter ac:name="">Microsoft 10</ac:parameter></ac:structured-macro>\[Microsoft 2010\] [STL std::string class causes crashes and memory corruption on multi-processor machines|http://support.microsoft.com/kb/813810]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4ce73de-dd26-4318-bb92-a1f7ce867a37"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>\[MISRA 2004\] MIRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eeb67f4a-5b41-462b-9907-634368188168"><ac:parameter ac:name="">MISRA 08</ac:parameter></ac:structured-macro>\[MISRA 2008\] MIRA Limited. "[MISRA C+\+|http://www.misra.org.uk/]: 2008 "Guidelines for the Use of the C+\+ Language in Critical Systems", ISBN 978-906400-03-3 (paperback), ISBN 978-906400-04-0 (PDF), June 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2c948239-3b9d-436f-bd3e-f6350d974f46"><ac:parameter ac:name="">MITRE 07</ac:parameter></ac:structured-macro>\[MITRE 2007\] MITRE. [Common Weakness Enumeration, Draft 9|http://cwe.mitre.org/], April 2008.\\

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="338c0961-59fb-4585-abe3-d63985eff441"><ac:parameter ac:name="">MITRE 08a</ac:parameter></ac:structured-macro>\[MITRE 2008a\] MITRE. [CWE ID 327|http://cwe.mitre.org/data/definitions/327.html], "Use of a Broken or Risky Cryptographic Algorithm," 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e5117a6f-3366-44a2-9ef5-7ad5ba8db23e"><ac:parameter ac:name="">MITRE 08b</ac:parameter></ac:structured-macro>\[MITRE 2008b\] MITRE. [CWE ID 330|http://cwe.mitre.org/data/definitions/330.html], "Use of Insufficiently Random Values," 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="15e2b6e6-609d-4808-a641-e08e3f437cbf"><ac:parameter ac:name="">MSDN 10</ac:parameter></ac:structured-macro>\[MSDN 2010\] MSDN. "[CryptGenRandom Function|http://msdn.microsoft.com/en-us/library/aa379942.aspx]."

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c867bc0b-1ada-43b5-9958-37bc80a128f1"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>\[NIST 2006\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/] (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb437335-9141-4928-acab-03e895ef9ae3"><ac:parameter ac:name="">POSIX.1-2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4590f88b-9db8-4c4a-838a-9503e8b40531"><ac:parameter ac:name="">IEEE Std 1003.1-2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="81137d87-db85-4e7a-ac68-c33f855ee135"><ac:parameter ac:name="">ISO/IEC 9945:2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="044a9f76-00cf-4c1e-be5e-04a665eb1bf9"><ac:parameter ac:name="">Open Group 08</ac:parameter></ac:structured-macro>\[Open Group 2008\] The Open Group. "[_The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2008 Edition_|http://www.opengroup.org/onlinepubs/9699919799/toc.htm]." (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12454a88-8235-4c94-ae86-7236d52e52a0"><ac:parameter ac:name="">POSIX.1-2004</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45b6a588-83af-4d19-9752-91c27746c720"><ac:parameter ac:name="">IEEE Std 1003.1-2004</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="37986803-537a-4c80-b116-526e97615681"><ac:parameter ac:name="">ISO/IEC 9945:2003</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="72c7a042-e776-4fc6-936d-b287e57457c2"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>\[Open Group 2004\] The Open Group. "[_The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_|http://www.opengroup.org/onlinepubs/009695399/toc.htm]." (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3a4abdb-135d-407c-87fa-3db20078a3f9"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>\[Plum 1991\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, Inc., November 1991 (ISBN 0911537104).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a8729fe-af66-4eeb-9fe7-518774cb0e47"><ac:parameter ac:name="">Quinlan 06</ac:parameter></ac:structured-macro>\[Quinlan 2006\] Quinlan, Dan; Vuduc, Richard; Panas, Thomas; Härdtlein, Jochen; & Sæbjørnsen, Andreas. "Support for Whole-Program Analysis and the Verification of the One-Definition Rule in C++," 27-35. [NIST Special Publication 500-262|http://samate.nist.gov/docs/NIST_Special_Publication_500-262.pdf], _Proceedings of the Static Analysis Summit_. Gaithersburg, MD, July 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="27ad28f3-92dd-4d9f-b475-0dbe2366b7e5"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro>\[Saks 1999\] Dan Saks. _const T vs.T const_. Embedded Systems Programming. Pg. 13-16. February 1999. [http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6d71c062-b448-4dfb-a505-e6996da547aa"><ac:parameter ac:name="">Saks 07</ac:parameter></ac:structured-macro>\[Saks 2007\] Saks, Dan. "[Sequence Points|http://www.embedded.com/columns/programmingpointers/9900661?_requestid=481957]" Embedded Systems Design, 07/01/02.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8170b0ec-ddb3-406e-a240-06539c6a9e77"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>\[Seacord 2005\] Seacord, R. _Secure Coding in C and C+\+_. Upper Saddle River, NJ: Addison-Wesley, 2006 (ISBN 0321335724).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b638478c-18de-43b7-aeb3-356502d0a6f6"><ac:parameter ac:name="">Sebor 04</ac:parameter></ac:structured-macro>\[Sebor 2004\] Sebor, Martin. [C++ Standard Core Language Active Issues, Revision 68, Issue 475|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2010/n3026.html#475], 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8a2cc1b-e905-4fd5-a9c2-8e9ebcee9b1e"><ac:parameter ac:name="">SGI 06</ac:parameter></ac:structured-macro>\[SGI 2006\] Silicon Graphics, Inc. "[basic_string<charT, traits, Alloc>|http://www.sgi.com/tech/stl/basic_string.html]." _Standard Template Library Programmer's Guide_, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7e68e999-6b90-4810-844b-eb54c080d47c"><ac:parameter ac:name="">Steele 77</ac:parameter></ac:structured-macro>\[Steele 1977\]  Steele, G. L. 1977. [Arithmetic shifting considered harmful.|http://doi.acm.org/10.1145/956641.956647] _SIGPLAN Not._ 12, 11 (Nov. 1977), 61-69.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da742c82-4c14-4e4c-9aad-fc3416a40b3e"><ac:parameter ac:name="">Stroustrup 97</ac:parameter></ac:structured-macro>\[Stroustrup 1997\] Stroustrup, Bjarne. _The C+\+ Programming Language, Third Edition_. Reading, MA: Addison-Wesley, 1997 (ISBN 0201889544).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1ec8a4a0-1cc6-452a-b988-0c3304d871ce"><ac:parameter ac:name="">Stroustrup 06</ac:parameter></ac:structured-macro>\[Stroustrup 2006\] Stroustrup, Bjarne. [_C+\+ Style and Technique FAQ_|http://public.research.att.com/~bs/bs_faq2.html] (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3be08040-f2e1-46fe-b8f4-19fbd2ced5be"><ac:parameter ac:name="">Stroustrup 01</ac:parameter></ac:structured-macro>\[Stroustrup 2001\] Stroustrup, Bjarne. [Exception Safety: Concepts and Techniques|http://www.research.att.com/~bs/except.pdf] (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58a67154-2123-4e45-8d4a-fa7ebfd8c7ce"><ac:parameter ac:name="">Sun 93</ac:parameter></ac:structured-macro>\[Sun 1993\] [Sun Security Bulletin #00122|http://sunsolve.sun.com/search/document.do?assetkey=1-22-00122-1], 1993.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="78495116-b500-4bd5-816d-c13e72ac4551"><ac:parameter ac:name="">Sutter 00</ac:parameter></ac:structured-macro>\[Sutter 2000\] Sutter, Herb. _Exceptional C++: 47 Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2000 (ISBN 0201615622).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5940cc27-ba1f-4815-94a8-8c91fb83b5aa"><ac:parameter ac:name="">Sutter 01</ac:parameter></ac:structured-macro>\[Sutter 2001\] Sutter, Herb. _More Exceptional C++: 40 New Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2001 (ISBN 020170434).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17b6614f-a22b-43b1-9099-83ecd615a487"><ac:parameter ac:name="">Sutter 04</ac:parameter></ac:structured-macro>\[Sutter 2004\] Sutter, Herb & Alexandrescu, Andrei. _C+\+ Coding Standards: 101 Rules, Guidelines, and Best Practices_. Boston, MA: Addison-Wesley Professional, 2004 (ISBN 0321113586).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c34d1f1c-046e-4d81-8105-7a573131e84f"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>\[Viega 2003\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4bcbe65b-35f8-4ec0-a77d-1ca20681ef6d"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>\[Warren 2002\] Warren, Henry S. _Hacker's Delight_. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f15875a5-30f6-45e3-8ff2-03907c28769f"><ac:parameter ac:name="">Williams 10</ac:parameter></ac:structured-macro>\[Williams 2010\] Williams, Anthony. [Simpler Multithreading in C++0x|http://www.devx.com/SpecialReports/Article/38883/1954], Internet.com, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65fc41da-e6af-4047-a837-7737b2b44453"><ac:parameter ac:name=""> xorl 2009</ac:parameter></ac:structured-macro>\[xorl 2009\] xorl. [xorl %eax, %eax|http://xorl.wordpress.com/].