Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f1b31347dae0ec80-3b5405a5-46264691-a026ad7d-3baaef6405e56cec54884ae7"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro> \[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. Programming Languages --- C, Second Edition, 1999. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5489f98d894de95c-38388dc7-4f8c4e6c-8967b426-bc5600e5abebd2ea0f51439b"><ac:parameter ac:name="">ISO/IEC TR 24731-2006</ac:parameter></ac:structured-macro> \[ISO/IEC TR 24731-2006\] ISO/IEC TR 24731. Extensions to the C Library, --- Part I: Bounds-checking interfaces. April, 2006. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8401604c3336cbf-9e803e2b-4f0343f0-bb9ebffd-456c6bc963cc13abdb14d4b6"><ac:parameter ac:name="">Graf 03</ac:parameter></ac:structured-macro> \[Graf 03\] Secure Coding: Principles and Practices. O'Reilly, July 2003. ISBN 0596002424. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f5884645f6166e2-7950f8e0-49064e88-a8b39198-65dafc0d21783a75997e8750"><ac:parameter ac:name="">Hatton 94</ac:parameter></ac:structured-macro> \[Hatton 04\] Safer C: Developing Software for High-integrity and Safety-critical Systems. McGraw-Hill Book Company. ISBN 0-07-707640-0. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6d6b9245be14235-9cb44f86-472e4003-b9b7b56e-62f7a4ca3293f79f5c174766"><ac:parameter ac:name="">Kerrighan 88</ac:parameter></ac:structured-macro> \[Kerrighan 88\] Kerrighan B. W., and D. M. Ritchie. The C Programming Language. 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1988. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="00b70f539e2f1fe8-fa0d7101-44df40dd-87d7aaa4-e252fb7cbebfd0da75820866"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro> \[MISRA 04\] MISRA C: 2004 Guidelines for the use of the C language in critical systems. MIRA Limited. Warwickshire, UK. October 2004. ISBN 0 9524156 4 |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="796545734b9c4d8d-af384f6a-400c4d90-a0fc9378-5b71439ada95b44bbf087ce5"><ac:parameter ac:name="">NASA-GB-1740.13</ac:parameter></ac:structured-macro> \[NASA-GB-1740.13\] NASA-GB-1740.13. NASA Guidebook for Safety Critical Software Analysis and Development. [http://pbma.nasa.gov/docs/public/pbma/general/guidbook.doc] |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ffb7b34faa4e4a42-674c1aa4-48724547-9d65bd10-83d8aff5110785e60f8452ae"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro> \[NIST 06\] NIST. SAMATE Reference Dataset (SRD).See [http://samate.nist.gov/SRD/srdFiles/] |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="331b0cf7aa1c0b6c-b84f0180-488143a8-84288bb7-fdd9d4709a982680c14cbcd1"><ac:parameter ac:name="">Plum 89</ac:parameter></ac:structured-macro> \[Plum 89\] Plum, Thomas. C Programming Guidelines. Plum Hall; 2nd edition (June 1989). ISBN: 0911537074. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ce253d652fdfda8f-a2ab885f-4e1b4546-9e11b5f5-7652bd9e115ba1b0bdddbcbe"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro> \[Plum 91\] Thomas Plum, Dan Saks. C+\+ Programming Guidelines. Plum Hall (November 1991). ISBN: 0911537104 |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c39ec43182b22685-9b935989-4dfe4f8c-b109b2c0-4cd77e4597ca9ba59930cb7b"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42d68d48-727c-47ec-af3a-6a3a373907c8"><ac:parameter ac:name="">Seacord 05a</ac:parameter></ac:structured-macro> \[Seacord 0505a\] Seacord, R. Secure Coding in C and C++. Addison-Wesley, 2005. See [http://www.cert.org/books/secure-coding] for news and errata. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb4cd7f1-2d0f-49c5-980d-c658df521b5a"><ac:parameter ac:name="">Seacord 05b</ac:parameter></ac:structured-macro>
\[Seacord 05b\] Seacord, R. Managed String Library for C. C/C++ Users Journal. Vol. 23, No. 10. Pages 30-34. October 2005. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9cfc00d2-3f18-4f04-a6a4-c8a8b76b79af="734702d0-947e-4a74-8690-1a7784a2eab9"><ac:parameter ac:name="">Summit 95</ac:parameter></ac:structured-macro> \[Summit 95\] Steve Summit. C Programming FAQs: Frequently Asked Questions. Addison-Wesley, 1995. ISBN: 0201845199. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a8ceb4d47967cac8-8c010151-47154271-b38f95df-279f06b0baccf7aa1d3ecd24"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro> \[Warren 02\] Henry S. Warren. Hacker's Delight. Addison Wesley Professional. July, 2002. ISBN: 0201914654. |