<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de4297bb-d799-4b82-bfba-17edc8158c7b"><ac:parameter ac:name="">Abrahams 10</ac:parameter></ac:structured-macro>\[Abrahams 2010\] Abrahams, David. [Boost Library Error Handling Guidelines, #7|http://www.boost.org/community/error_handling.html], 2001-2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3f1a656-5bf0-4eb5-b9b0-a2c7ab82f233"><ac:parameter ac:name="">Barney 10</ac:parameter></ac:structured-macro>\[Barney 2010\] Barney, Blaise. [POSIX Threads Programming|https://computing.llnl.gov/tutorials/pthreads/], Lawrence Livermore National Security, LLC, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0dc61417-c14c-442a-bb3c-59d9ea4c8cf2"><ac:parameter ac:name="">Becker 08</ac:parameter></ac:structured-macro>\[Becker 2008\] Becker, Pete. [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2008/n2521.pdf], April 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7ce64c8-003b-44ac-be89-2cd1a3b22723"><ac:parameter ac:name="">Becker 09</ac:parameter></ac:structured-macro>\[Becker 2009\] Becker, Pete [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/JTC1/SC22/WG21/docs/papers/2009/n3000.pdf], September 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b855b1e4-9bf1-41c5-9991-e54820fe556e"><ac:parameter ac:name="">Black 07</ac:parameter></ac:structured-macro>\[Black 2007\] Paul E. Black, Michael Kass, Michael Koo. Source Code Security Analysis Tool Functional Specification Version 1.0. Special Publication 500-268. Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, May 2007. [http://samate.nist.gov/docs/source_code_security_analysis_spec_SP500-268.pdf]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e0bc2716-192f-44f6-a47d-38f1cee3bcda"><ac:parameter ac:name="">Cline 09</ac:parameter></ac:structured-macro>\[Cline 2009\] Cline, Marshall. [C+\+ FAQ Lite - Frequently Asked Questions|http://www.parashift.com/c++-faq-lite/index.html] 1991-2009

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dca7c114-7172-4a46-a1b8-c1e47d00fe6d"><ac:parameter ac:name="">CWE</ac:parameter></ac:structured-macro> \[CWE\] MITRE. [Common Weakness Enumeration|http://cwe.mitre.org/] -- A Community-Developed Dictionary of Software Weakness Types.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="55a054b0-7b3d-4f80-8f5d-6f55416115f7"><ac:parameter ac:name="">Dewhurst 03</ac:parameter></ac:structured-macro>\[Dewhurst 2003\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2be31679-5fdb-4fd3-ac8e-25b781ceb8ce"><ac:parameter ac:name="">Dewhurst 05</ac:parameter></ac:structured-macro>\[Dewhurst 2005\] Dewhurst, Stephen C. _C+\+ Common Knowledge:  Essential Intermediate Programming_. Boston, MA: Addison-Wesley Professional, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="173071ba-06ef-4f46-84df-d3d86d25d31c"><ac:parameter ac:name="">Dowd 07</ac:parameter></ac:structured-macro>\[Dowd 2007\] Dowd, McDonald & Schuh. [The Art of Software Security Assessment - Attacking delete and delete\[\] in C+\+|http://taossa.com/index.php/2007/01/03/attacking-delete-and-delete-in-c], 2007.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="567ce3ef-bcb4-45f7-bec8-84ad22298a20"><ac:parameter ac:name="">Fortify 06</ac:parameter></ac:structured-macro>\[Fortify 2006\] Fortify Software Inc. [Fortify Taxonomy: Software Security Errors|http://www.fortifysoftware.com/vulncat/], 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07cdc597-cb1c-44b0-971b-73480f9fb904"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro>\[FSF 2005\] Free Software Foundation. [GCC online documentation.|http://gcc.gnu.org/onlinedocs] (2005).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="269045c4-7b3b-443e-a0fc-faeac9d8dfdc"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>\[Gamma 1995\] Gamma, Helm, Vlissides, and Johnson. Design Patterns Elements of Reusable Object Oriented Software. Addison Wesley, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="185eeaa5-be32-4df0-9699-d102bf51e965"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>\[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a36f61b-8278-422d-a52f-1734b93eea08"><ac:parameter ac:name="">Graff 03</ac:parameter></ac:structured-macro>\[Graff 2003\] Graff, Mark G. & Van Wyk, Kenneth R. _Secure Coding: Principles and Practices_. Cambridge, MA: O'Reilly, 2003 (ISBN 0596002424).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9bb22f1-2723-469a-9a22-ae2052fc2fa5"><ac:parameter ac:name="">Henricson 97</ac:parameter></ac:structured-macro>\[Henricson 1997\] Henricson, Mats & Nyquist, Erik. [_Industrial Strength C+\+_|http://www.sannabremo.se/nyquist/industrial/]. Upper Saddle River, NJ: Prentice Hall PTR, 1997 (ISBN 0-13-120965-5).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c24509c2-cdae-48a7-97c6-f321111d4579"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>\[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97293dab-dd3d-4594-960f-6862ebf04336"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>\[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. _Programming Languages --- C, Second Edition_, 1999.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8dfd8f47-4277-46c9-9723-24f5ac5c428f"><ac:parameter ac:name="">ISO/IEC 14882-1998</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-1998\] ISO/IEC 14882-1998. _Programming Languages --- C++, First Edition_, 1998.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d4383402-6f7a-4a27-8f5b-b9fefd3077c8"><ac:parameter ac:name="">ISO/IEC 14882-2003</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-2003\] ISO/IEC 14882-2003. _Programming Languages --- C++, Second Edition_, 2003.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="39dc8651-97c9-4e4f-9550-e20076098df1"><ac:parameter ac:name="">ISO/IEC DTR 24772</ac:parameter></ac:structured-macro>\[ISO/IEC DTR 24772\] ISO/IEC DTR 24772. _Information Technology_ --- _Programming Languages_ --- [_Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use_|http://www.aitcnet.org/isai/_Mtg_13/22-WG23-N-0238/n0238.pdf], November 2009.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50fd2a80-1176-4829-85b6-fb40a4cca438"><ac:parameter ac:name="">Lions 96</ac:parameter></ac:structured-macro>\[Lions 1996\] Lions, J. L. [ARIANE 5 Flight 501 Failure Report|http://en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report]. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d3ae9361-a1be-45ae-8607-3e0cbbe123b1"><ac:parameter ac:name="">Lockheed Martin 05</ac:parameter></ac:structured-macro>\[Lockheed Martin 2005\] Lockheed Martin. "[Joint Strike Fighter Air Vehicle C+\+ Coding Standards for the System Development and Demonstration Program.|http://www.research.att.com/~bs/JSF-AV-rules.pdf]" Document Number 2RDU00001 Rev C., December 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="67f459ad-ba46-4df5-a004-e14dc7f11593"><ac:parameter ac:name="">Meyers 95</ac:parameter></ac:structured-macro>\[Meyers 1995\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley Professional, 1995.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="811287c5-e396-4298-a5fe-4f48e47c07f6"><ac:parameter ac:name="">Meyers 96</ac:parameter></ac:structured-macro>\[Meyers 1996\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley, 1996.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7fd7f77c-e505-4954-88ab-abb6032c21ee"><ac:parameter ac:name="">Meyers 97</ac:parameter></ac:structured-macro>\[Meyers 1997\] Meyers, Scott. _Effective C+\+ : 55 Specific Ways to Improve Your Programs and Designs_, 3rd ed.  Boston, MA: Addison-Wesley Professional, 1997.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="36e28742-710e-4780-887a-16394cb07c36"><ac:parameter ac:name="">Meyers 01</ac:parameter></ac:structured-macro>\[Meyers 2001\] Meyers, Scott. _Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library_. Boston, MA: Addison-Wesley Professional, 2001.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="30987b25-5bdf-4fa2-883d-4dc379131f34"><ac:parameter ac:name="">Meyers 05</ac:parameter></ac:structured-macro>\[Meyers 2005\] Meyers, Scott. _Effective C++: 55 Specific Ways to Improve Your Programs and Designs (3rd Edition)_. Boston, MA: Addison-Wesley Professional, 2005.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b846bc0-e674-4f52-929e-0fd706ba92c4"><ac:parameter ac:name="">Microsoft 10</ac:parameter></ac:structured-macro>\[Microsoft 2010\] [STL std::string class causes crashes and memory corruption on multi-processor machines|http://support.microsoft.com/kb/813810]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8fd6172-5fd6-4b3c-a895-4703ec9638f4"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>\[MISRA 2004\] MIRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="659a7b26-8f09-4233-b610-db1f88330650"><ac:parameter ac:name="">MISRA 08</ac:parameter></ac:structured-macro>\[MISRA 2008\] MIRA Limited. "[MISRA C+\+|http://www.misra.org.uk/]: 2008 "Guidelines for the Use of the C+\+ Language in Critical Systems", ISBN 978-906400-03-3 (paperback), ISBN 978-906400-04-0 (PDF), June 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c220e7a2-9598-4a0d-b6d6-d889ee73fc2b"><ac:parameter ac:name="">MITRE 07</ac:parameter></ac:structured-macro>\[MITRE 2007\] MITRE. [Common Weakness Enumeration, Draft 9|http://cwe.mitre.org/], April 2008.\\

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5f638a36-3dee-4fd5-93b0-1cb744d193a1"><ac:parameter ac:name="">MITRE 08a</ac:parameter></ac:structured-macro>\[MITRE 2008a\] MITRE. [CWE ID 327|http://cwe.mitre.org/data/definitions/327.html], "Use of a Broken or Risky Cryptographic Algorithm," 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52b49d03-6b15-47cb-ac24-91ef2770760b"><ac:parameter ac:name="">MITRE 08b</ac:parameter></ac:structured-macro>\[MITRE 2008b\] MITRE. [CWE ID 330|http://cwe.mitre.org/data/definitions/330.html], "Use of Insufficiently Random Values," 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a9307bf3-6771-4ae2-99cf-d064ad86fd93"><ac:parameter ac:name="">MSDN 10</ac:parameter></ac:structured-macro>\[MSDN 2010\] MSDN. "[CryptGenRandom Function|http://msdn.microsoft.com/en-us/library/aa379942.aspx]."

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0493a212-a3cf-446d-9bee-a2376704432a"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>\[NIST 2006\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/], 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="063ebaaf-4aac-42cd-873d-eb87588d6918"><ac:parameter ac:name="">POSIX.1-2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="48069c96-f6a9-49fd-8090-0b88c2a7ccff"><ac:parameter ac:name="">IEEE Std 1003.1-2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d61adc34-2f96-4cfd-94db-16fe0e9b047e"><ac:parameter ac:name="">ISO/IEC 9945:2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c525602d-6b50-4631-a6af-617506eca4b0"><ac:parameter ac:name="">Open Group 08</ac:parameter></ac:structured-macro>\[Open Group 2008\] The Open Group. [_The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2008 Edition_|http://www.opengroup.org/onlinepubs/9699919799/toc.htm], 2008.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8d3834a-f9a0-46e9-a973-b077b766009d"><ac:parameter ac:name="">POSIX.1-2004</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89707f76-8205-4298-a670-25fbbceaa50b"><ac:parameter ac:name="">IEEE Std 1003.1-2004</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f8939e05-2431-461a-aa34-c32aed99a6aa"><ac:parameter ac:name="">ISO/IEC 9945:2003</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e8477927-96cc-4654-81b7-0f34043f8110"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>\[Open Group 2004\] The Open Group. [_The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_|http://www.opengroup.org/onlinepubs/009695399/toc.htm], 2004.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7c948f47-cd9f-42ef-b77a-1deb432d23a6"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>\[Plum 1991\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, Inc., November 1991 (ISBN 0911537104).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1814acc0-3143-46e7-a1cf-0fc1369c756e"><ac:parameter ac:name="">Quinlan 06</ac:parameter></ac:structured-macro>\[Quinlan 2006\] Quinlan, Dan; Vuduc, Richard; Panas, Thomas; Härdtlein, Jochen; & Sæbjørnsen, Andreas. "Support for Whole-Program Analysis and the Verification of the One-Definition Rule in C++," 27-35. [NIST Special Publication 500-262|http://samate.nist.gov/docs/NIST_Special_Publication_500-262.pdf], _Proceedings of the Static Analysis Summit_. Gaithersburg, MD, July 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e2d464d1-6f88-4227-bd0e-19624931bd12"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro>\[Saks 1999\] Dan Saks. _const T vs.T const_. Embedded Systems Programming. Pg. 13-16. February 1999. [http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf]

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbe4f209-ff95-403f-add7-1bfa27526f9b"><ac:parameter ac:name="">Saks 07</ac:parameter></ac:structured-macro>\[Saks 2007\] Saks, Dan. "[Sequence Points|http://www.embedded.com/columns/programmingpointers/9900661?_requestid=481957]" Embedded Systems Design, 07/01/02.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="89e50f9c-072e-41c6-a2a5-cc822c86769c"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>\[Seacord 2005\] Seacord, R. _Secure Coding in C and C+\+_. Upper Saddle River, NJ: Addison-Wesley, 2006 (ISBN 0321335724).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f7779abf-e002-41a9-a16c-56833c6e3d08"><ac:parameter ac:name="">Sebor 04</ac:parameter></ac:structured-macro>\[Sebor 2004\] Sebor, Martin. [C++ Standard Core Language Active Issues, Revision 68, Issue 475|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2010/n3026.html#475], 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6a1307d3-6209-44b4-a7d3-ba8075f0fc6c"><ac:parameter ac:name="">SGI 06</ac:parameter></ac:structured-macro>\[SGI 2006\] Silicon Graphics, Inc. "[basic_string<charT, traits, Alloc>|http://www.sgi.com/tech/stl/basic_string.html]." _Standard Template Library Programmer's Guide_, 2006.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f960b64-e153-4314-b18c-d976753f7ce2"><ac:parameter ac:name="">Steele 77</ac:parameter></ac:structured-macro>\[Steele 1977\]  Steele, G. L. 1977. [Arithmetic shifting considered harmful.|http://doi.acm.org/10.1145/956641.956647] _SIGPLAN Not._ 12, 11 (Nov. 1977), 61-69.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9995f990-a42f-480f-bf61-1c702a463fda"><ac:parameter ac:name="">Stroustrup 97</ac:parameter></ac:structured-macro>\[Stroustrup 1997\] Stroustrup, Bjarne. _The C+\+ Programming Language, Third Edition_. Reading, MA: Addison-Wesley, 1997 (ISBN 0201889544).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8928af3-dcfb-45f9-bc87-bef5b276c2a4"><ac:parameter ac:name="">Stroustrup 06</ac:parameter></ac:structured-macro>\[Stroustrup 2006\] Stroustrup, Bjarne. [_C+\+ Style and Technique FAQ_|http://public.research.att.com/~bs/bs_faq2.html] (2006).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8f078ee4-511c-4172-9e35-1e545a031e76"><ac:parameter ac:name="">Stroustrup 01</ac:parameter></ac:structured-macro>\[Stroustrup 2001\] Stroustrup, Bjarne. [Exception Safety: Concepts and Techniques|http://www.research.att.com/~bs/except.pdf] (2001).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="60fb2983-6e10-4c89-827d-cda6eff55a71"><ac:parameter ac:name="">Sun 93</ac:parameter></ac:structured-macro>\[Sun 1993\] [Sun Security Bulletin #00122|http://sunsolve.sun.com/search/document.do?assetkey=1-22-00122-1], 1993.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e68a7192-1d87-4bb4-92ef-67e526b0e03a"><ac:parameter ac:name="">Sutter 00</ac:parameter></ac:structured-macro>\[Sutter 2000\] Sutter, Herb. _Exceptional C++: 47 Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2000 (ISBN 0201615622).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1e019922-0b82-46d1-bcd4-add0623d20ca"><ac:parameter ac:name="">Sutter 01</ac:parameter></ac:structured-macro>\[Sutter 2001\] Sutter, Herb. _More Exceptional C++: 40 New Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2001 (ISBN 020170434).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dca7633f-32c0-4d7d-879a-fd4ea37fef88"><ac:parameter ac:name="">Sutter 04</ac:parameter></ac:structured-macro>\[Sutter 2004\] Sutter, Herb & Alexandrescu, Andrei. _C+\+ Coding Standards: 101 Rules, Guidelines, and Best Practices_. Boston, MA: Addison-Wesley Professional, 2004 (ISBN 0321113586).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="143eb5f0-da4b-48f7-8ac2-e77fa2494587"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>\[Viega 2003\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d269b440-201b-41cb-843c-c2f7069b50ae"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>\[Warren 2002\] Warren, Henry S. _Hacker's Delight_. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654).

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf3939b6-26dc-44a4-bc82-9b46eb84af2c"><ac:parameter ac:name="">Williams 10</ac:parameter></ac:structured-macro>\[Williams 2010\] Williams, Anthony. [Simpler Multithreading in C++0x|http://www.devx.com/SpecialReports/Article/38883/1954], Internet.com, 2010.

<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0059602d-3241-45e6-82d4-7f1bbc124819"><ac:parameter ac:name=""> xorl 2009</ac:parameter></ac:structured-macro>\[xorl 2009\] xorl. [xorl %eax, %eax|http://xorl.wordpress.com/].