<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="744c0fa6-23c5-485b-b246-1fb125caff74"><ac:parameter ac:name="">Abrahams 10</ac:parameter></ac:structured-macro>\[Abrahams 2010\] Abrahams, David. [Boost Library Error Handling Guidelines, #7|http://www.boost.org/community/error_handling.html], 2001-2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de8c4e23-19fb-4359-8a05-2f2445f3450a"><ac:parameter ac:name="">Barney 10</ac:parameter></ac:structured-macro>\[Barney 2010\] Barney, Blaise. [POSIX Threads Programming|https://computing.llnl.gov/tutorials/pthreads/], Lawrence Livermore National Security, LLC, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a98bf36-dbb9-46e2-adb7-d5afe8f82c49"><ac:parameter ac:name="">Becker 08</ac:parameter></ac:structured-macro>\[Becker 2008\] Becker, Pete. [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2008/n2521.pdf], April 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="54f0af4f-fde9-499d-b14d-e0b582b8813d"><ac:parameter ac:name="">Becker 09</ac:parameter></ac:structured-macro>\[Becker 2009\] Becker, Pete [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/JTC1/SC22/WG21/docs/papers/2009/n3000.pdf], September 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35ba25cb-49fa-4082-bfdd-0a5cb6db8c1b"><ac:parameter ac:name="">Black 07</ac:parameter></ac:structured-macro>\[Black 2007\] Paul E. Black, Michael Kass, Michael Koo. Source Code Security Analysis Tool Functional Specification Version 1.0. Special Publication 500-268. Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, May 2007. [http://samate.nist.gov/docs/source_code_security_analysis_spec_SP500-268.pdf]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c821a637-aaf3-42b8-8175-7ae81243ee80"><ac:parameter ac:name="">Cline 09</ac:parameter></ac:structured-macro>\[Cline 2009\] Cline, Marshall. [C+\+ FAQ Lite - Frequently Asked Questions|http://www.parashift.com/c++-faq-lite/index.html] 1991-2009

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f97b2d87-53a0-40ca-a0af-b3b124a6e83e"><ac:parameter ac:name="">CWE</ac:parameter></ac:structured-macro> \[CWE\] MITRE. [Common Weakness Enumeration|http://cwe.mitre.org/] -- A Community-Developed Dictionary of Software Weakness Types.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e857f43a-b913-48c9-8036-8364c6fa188c"><ac:parameter ac:name="">Dewhurst 03</ac:parameter></ac:structured-macro>\[Dewhurst 2003\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b37b3e97-714e-4266-ab74-164de35df915"><ac:parameter ac:name="">Dewhurst 05</ac:parameter></ac:structured-macro>\[Dewhurst 2005\] Dewhurst, Stephen C. _C+\+ Common Knowledge:  Essential Intermediate Programming_. Boston, MA: Addison-Wesley Professional, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0e2a5382-ff79-4e00-bdea-38c06fec1a7b"><ac:parameter ac:name="">Dowd 07</ac:parameter></ac:structured-macro>\[Dowd 2007\] Dowd, McDonald & Schuh. [The Art of Software Security Assessment - Attacking delete and delete\[\] in C+\+|http://taossa.com/index.php/2007/01/03/attacking-delete-and-delete-in-c]. (2007)

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c63ab24e-d5f5-469a-a83c-f5351781212a"><ac:parameter ac:name="">Fortify 06</ac:parameter></ac:structured-macro>\[Fortify 06\] Fortify Software Inc. [Fortify Taxonomy: Software Security Errors|http://www.fortifysoftware.com/vulncat/], 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d5f31ff-5efa-40e4-9c40-01eae95f5ac7"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro>\[FSF 2005\] Free Software Foundation. [GCC online documentation.|http://gcc.gnu.org/onlinedocs] (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3ed5091f-098d-4ade-a0e3-97ffa7fc32ea"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>\[Gamma 1995\] Gamma, Helm, Vlissides, and Johnson. Design Patterns Elements of Reusable Object Oriented Software. Addison Wesley, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b59b5142-dca4-40b0-a8b8-41c23f6f93ed"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84810366-323b-4ce2-b623-f061ff442ab0"><ac:parameter ac:name="">Graff 03</ac:parameter></ac:structured-macro>\[Graff 03\] Graff, Mark G. & Van Wyk, Kenneth R. _Secure Coding: Principles and Practices_. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b431e4fd-cb3a-470c-b7d3-f769b3329064"><ac:parameter ac:name="">Henricson 97</ac:parameter></ac:structured-macro>\[Henricson 1997\] Henricson, Mats & Nyquist, Erik. [_Industrial Strength C+\+_|http://www.sannabremo.se/nyquist/industrial/]. Upper Saddle River, NJ: Prentice Hall PTR, 1997 (ISBN 0-13-120965-5).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6c38d9b-b4db-4cea-824e-45daf0112c27"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>\[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7551c47-4613-4b64-85fe-531bbd1852f2"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>\[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. _Programming Languages --- C, Second Edition_, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="17f3b460-beef-46bf-9f3d-1670e12a07af"><ac:parameter ac:name="">ISO/IEC 14882-1998</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-1998\] ISO/IEC 14882-1998. _Programming Languages --- C++, First Edition_, 1998.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4c5c2fd6-6f3c-4221-b43f-7f0ddec0158e"><ac:parameter ac:name="">ISO/IEC 14882-2003</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-2003\] ISO/IEC 14882-2003. _Programming Languages --- C++, Second Edition_, 2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d07d9617-d9e7-48bc-a499-1f682486213c"><ac:parameter ac:name="">ISO/IEC DTR 24772</ac:parameter></ac:structured-macro>\[ISO/IEC DTR 24772\] ISO/IEC DTR 24772. _Information Technology_ --- _Programming Languages_ --- [_Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use_|http://www.aitcnet.org/isai/_Mtg_13/22-WG23-N-0238/n0238.pdf], November 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9481f456-daa1-49af-8c80-bf34956259a3"><ac:parameter ac:name="">Lions 96</ac:parameter></ac:structured-macro>\[Lions 1996\] Lions, J. L. [ARIANE 5 Flight 501 Failure Report|http://en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report]. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fd834add-bc98-4489-be0f-8a86d0a5b361"><ac:parameter ac:name="">Lockheed Martin 05</ac:parameter></ac:structured-macro>\[Lockheed Martin 2005\] Lockheed Martin. "[Joint Strike Fighter Air Vehicle C+\+ Coding Standards for the System Development and Demonstration Program.|http://www.research.att.com/~bs/JSF-AV-rules.pdf]" Document Number 2RDU00001 Rev C., December 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="677fad6f-74d8-4e39-8858-2a9ee84780a5"><ac:parameter ac:name="">Meyers 95</ac:parameter></ac:structured-macro>\[Meyers 1995\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley Professional, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2386a3bb-183f-45d9-9040-26670d394bc5"><ac:parameter ac:name="">Meyers 96</ac:parameter></ac:structured-macro>\[Meyers 1996\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley, 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="da8ab26e-1334-41f0-be26-e73c12f5b8f8"><ac:parameter ac:name="">Meyers 97</ac:parameter></ac:structured-macro>\[Meyers 1997\] Meyers, Scott. _Effective C+\+ : 55 Specific Ways to Improve Your Programs and Designs_, 3rd ed.  Boston, MA: Addison-Wesley Professional, 1997.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1b2e8b6-af0a-45da-9d7d-c1894a9811c6"><ac:parameter ac:name="">Meyers 01</ac:parameter></ac:structured-macro>\[Meyers 2001\] Meyers, Scott. _Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library_. Boston, MA: Addison-Wesley Professional, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1a162858-e5c2-45eb-8380-b59caa1503f1"><ac:parameter ac:name="">Meyers 05</ac:parameter></ac:structured-macro>\[Meyers 2005\] Meyers, Scott. _Effective C++: 55 Specific Ways to Improve Your Programs and Designs (3rd Edition)_. Boston, MA: Addison-Wesley Professional, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="390be6a3-5b29-4a41-850b-d89e34563da1"><ac:parameter ac:name="">Microsoft 10</ac:parameter></ac:structured-macro>\[Microsoft 2010\] [STL std::string class causes crashes and memory corruption on multi-processor machines|http://support.microsoft.com/kb/813810]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb159a57-4970-4dc9-bd6e-3c062720e780"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>\[MISRA 2004\] MIRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="95238f5a-0493-43fd-95e2-12db99cc0f4d"><ac:parameter ac:name="">MISRA 08</ac:parameter></ac:structured-macro>\[MISRA 2008\] MIRA Limited. "[MISRA C+\+|http://www.misra.org.uk/]: 2008 "Guidelines for the Use of the C+\+ Language in Critical Systems", ISBN 978-906400-03-3 (paperback), ISBN 978-906400-04-0 (PDF), June 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="514b69bf-e60a-40b6-b40f-1b95b7d3702d"><ac:parameter ac:name="">MITRE 07</ac:parameter></ac:structured-macro>\[MITRE 2007\] MITRE. [Common Weakness Enumeration, Draft 9|http://cwe.mitre.org/], April 2008.\\

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4c3b0f5-1a7d-42dc-9026-52c92551cbe7"><ac:parameter ac:name="">MITRE 08a</ac:parameter></ac:structured-macro>\[MITRE 2008a\] MITRE. [CWE ID 327|http://cwe.mitre.org/data/definitions/327.html], "Use of a Broken or Risky Cryptographic Algorithm," 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="11e16ec1-6997-44e1-98aa-92ff4265b96d"><ac:parameter ac:name="">MITRE 08b</ac:parameter></ac:structured-macro>\[MITRE 2008b\] MITRE. [CWE ID 330|http://cwe.mitre.org/data/definitions/330.html], "Use of Insufficiently Random Values," 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1af3d13a-0129-455a-ac81-628ed2432e4b"><ac:parameter ac:name="">MSDN 10</ac:parameter></ac:structured-macro>\[MSDN 2010\] MSDN. "[CryptGenRandom Function|http://msdn.microsoft.com/en-us/library/aa379942.aspx]."

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="88cdc541-8465-45e7-b293-deb6f2bbe19c"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>\[NIST 2006\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/] (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ca990ef6-6c77-4026-94f0-87e48c26c327"><ac:parameter ac:name="">POSIX.1-2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="767ccdf3-2734-4a85-9d20-a1f6ed9945ce"><ac:parameter ac:name="">IEEE Std 1003.1-2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ec6a171-7734-401a-8bff-5d90d97f64a2"><ac:parameter ac:name="">ISO/IEC 9945:2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a1a2ba46-9ddd-406e-bc0f-4f0b2ace3433"><ac:parameter ac:name="">Open Group 08</ac:parameter></ac:structured-macro>\[Open Group 2008\] The Open Group. "[_The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2008 Edition_|http://www.opengroup.org/onlinepubs/9699919799/toc.htm]." (2008).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9e64e78a-33a2-449b-8403-a7bd6e4910e9"><ac:parameter ac:name="">POSIX.1-2004</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dd031258-c344-4146-b38a-7d192d3efa9c"><ac:parameter ac:name="">IEEE Std 1003.1-2004</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb6291f7-07bf-41e5-a401-53eb5861ee58"><ac:parameter ac:name="">ISO/IEC 9945:2003</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb353398-a553-4411-abd3-a45629673b8a"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>\[Open Group 2004\] The Open Group. "[_The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_|http://www.opengroup.org/onlinepubs/009695399/toc.htm]." (2004).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e27f7487-32cd-4ec3-aac3-f6a0c0222a22"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>\[Plum 1991\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, Inc., November 1991 (ISBN 0911537104).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0085f297-550c-47c4-8dbb-4f4e12f25a2a"><ac:parameter ac:name="">Quinlan 06</ac:parameter></ac:structured-macro>\[Quinlan 2006\] Quinlan, Dan; Vuduc, Richard; Panas, Thomas; Härdtlein, Jochen; & Sæbjørnsen, Andreas. "Support for Whole-Program Analysis and the Verification of the One-Definition Rule in C++," 27-35. [NIST Special Publication 500-262|http://samate.nist.gov/docs/NIST_Special_Publication_500-262.pdf], _Proceedings of the Static Analysis Summit_. Gaithersburg, MD, July 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fadcfeec-a263-45c4-9534-22fd2c34ebba"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro>\[Saks 1999\] Dan Saks. _const T vs.T const_. Embedded Systems Programming. Pg. 13-16. February 1999. [http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07af0cda-dcf2-46d2-ac1f-b6c3cbe42b2e"><ac:parameter ac:name="">Saks 07</ac:parameter></ac:structured-macro>\[Saks 2007\] Saks, Dan. "[Sequence Points|http://www.embedded.com/columns/programmingpointers/9900661?_requestid=481957]" Embedded Systems Design, 07/01/02.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d464240-6778-4125-8149-cca634406ffd"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>\[Seacord 2005\] Seacord, R. _Secure Coding in C and C+\+_. Upper Saddle River, NJ: Addison-Wesley, 2006 (ISBN 0321335724).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ceb6925-9fdf-4191-a08a-15b1d77d2913"><ac:parameter ac:name="">Sebor 04</ac:parameter></ac:structured-macro>\[Sebor 2004\] Sebor, Martin. [C++ Standard Core Language Active Issues, Revision 68, Issue 475|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2010/n3026.html#475], 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="541ec5a1-8602-42d6-aaad-4e970be62b01"><ac:parameter ac:name="">SGI 06</ac:parameter></ac:structured-macro>\[SGI 2006\] Silicon Graphics, Inc. "[basic_string<charT, traits, Alloc>|http://www.sgi.com/tech/stl/basic_string.html]." _Standard Template Library Programmer's Guide_, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06d219ff-932f-4bd3-afd7-3f978e086b51"><ac:parameter ac:name="">Steele 77</ac:parameter></ac:structured-macro>\[Steele 1977\]  Steele, G. L. 1977. [Arithmetic shifting considered harmful.|http://doi.acm.org/10.1145/956641.956647] _SIGPLAN Not._ 12, 11 (Nov. 1977), 61-69.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="936b1263-8269-4594-a94d-85a9efd61e38"><ac:parameter ac:name="">Stroustrup 97</ac:parameter></ac:structured-macro>\[Stroustrup 1997\] Stroustrup, Bjarne. _The C+\+ Programming Language, Third Edition_. Reading, MA: Addison-Wesley, 1997 (ISBN 0201889544).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ff1b2796-a623-40cd-ace7-0cbb8bfdc6f2"><ac:parameter ac:name="">Stroustrup 06</ac:parameter></ac:structured-macro>\[Stroustrup 2006\] Stroustrup, Bjarne. [_C+\+ Style and Technique FAQ_|http://public.research.att.com/~bs/bs_faq2.html] (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c98ef65c-f2fb-44b2-9e46-36a24cec40ca"><ac:parameter ac:name="">Stroustrup 01</ac:parameter></ac:structured-macro>\[Stroustrup 2001\] Stroustrup, Bjarne. [Exception Safety: Concepts and Techniques|http://www.research.att.com/~bs/except.pdf] (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f55f44d6-10c8-4d44-8c22-6951e7e21202"><ac:parameter ac:name="">Sun 93</ac:parameter></ac:structured-macro>\[Sun 1993\] [Sun Security Bulletin #00122|http://sunsolve.sun.com/search/document.do?assetkey=1-22-00122-1], 1993.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c3d56a2-dccc-4c4e-9a7d-c00e61266a39"><ac:parameter ac:name="">Sutter 00</ac:parameter></ac:structured-macro>\[Sutter 2000\] Sutter, Herb. _Exceptional C++: 47 Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2000 (ISBN 0201615622).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc68bcfe-269a-45b1-932f-4aa8b49cd83d"><ac:parameter ac:name="">Sutter 01</ac:parameter></ac:structured-macro>\[Sutter 2001\] Sutter, Herb. _More Exceptional C++: 40 New Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2001 (ISBN 020170434).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c23cbd4a-f1a7-4ae7-8cee-2c8922f744c3"><ac:parameter ac:name="">Sutter 04</ac:parameter></ac:structured-macro>\[Sutter 2004\] Sutter, Herb & Alexandrescu, Andrei. _C+\+ Coding Standards: 101 Rules, Guidelines, and Best Practices_. Boston, MA: Addison-Wesley Professional, 2004 (ISBN 0321113586).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="49f6f65b-38ed-4c3f-9902-1da0d76640ce"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>\[Viega 2003\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1cf28f2e-3dea-4c7b-8794-025b367be2f1"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>\[Warren 2002\] Warren, Henry S. _Hacker's Delight_. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5a29f3dc-8626-4278-87b8-13841ad0e1a2"><ac:parameter ac:name="">Williams 10</ac:parameter></ac:structured-macro>\[Williams 2010\] Williams, Anthony. [Simpler Multithreading in C++0x|http://www.devx.com/SpecialReports/Article/38883/1954], Internet.com, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ee4d6313-e181-4a96-942b-120f271f5feb"><ac:parameter ac:name=""> xorl 2009</ac:parameter></ac:structured-macro>\[xorl 2009\] xorl. [xorl %eax, %eax|http://xorl.wordpress.com/].