Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Anchor
Abrahams 10
Abrahams 10
[Abrahams 2010] Abrahams, David. Error and Exception Handling, #7. Boost Library. 2010. http://www.boost.org/community/error_handling.html

Anchor
Banahan 03
Banahan 03
[Banahan 2003] Banahan, Mike. The C Book. 2003.

Anchor
Barney 10
Barney 10
[Barney 2010] Barney, Blaise. POSIX Threads Programming, . Lawrence Livermore National Security, LLC, . 2010.

Anchor
Becker 08
Becker 08
[Becker 2008] Becker, Pete. Working Draft, Standard for Programming Language C++, . April 2008.

Anchor
Becker 09
Becker 09
[Becker 2009] Becker, Pete Working Draft, Standard for Programming Language C++, September 2009.

Anchor
Black 07
Black 07
[Black 2007] Paul E. Black, Michael Kass, Michael Koo. Source Code Security Analysis Tool Functional Specification Version 1.0. Special Publication 500-268. Information Technology Laboratory (ITL), Software Diagnostics and Conformance Testing Division, May 2007. http://samate.nist.gov/docs/source_code_security_analysis_spec_SP500-268.pdf

Anchor
Cline 09
Cline 09
[Cline 2009] Cline, Marshall. C++ FAQ Lite - Frequently Asked Questions, 1991-2009.

Anchor
codesourcery 2016a
codesourcery 2016a
[CodeSourcery 2016a] CodeSourcery, Compaq, EDG, HP, IBM, Intel, Red Hat, SGI, et al. Itanium C++ ABI. [Accessed 2016] https://mentorembedded.github.io/cxx-abi/abi.html

Anchor
codesourcery2016b
codesourcery2016b
[CodeSourcery 2016b] CodeSourcery, Compaq, EDG, HP, IBM, Intel, Red Hat, SGI, et al. Itanium C++ ABI ($Revision: 1,86 $). [Accessed 2016] https://refspecs.linuxbase.org/cxxabi-1.86.html#array-cookies

Anchor
Coverity 07
Coverity 07
[Coverity 2007] Coverity Prevent User's Manual (3.3.0). 2007.

...

Anchor
rohlf 2009
rohlf 2009
[Rohlf 2009] Rohlf, Chris. Fun with erase (). 2009. http://em386.blogspot.com/2009/06/fun-with-erase.html. 2009.

Anchor
Saks 99
Saks 99
[Saks 1999] Dan Saks. const T vs.T const. Embedded Systems Programming. Pg. 13-16. February 1999. http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf

Anchor
Saks 07
Saks 07
[Saks 2007] Saks, Dan. "Sequence Points" Embedded Systems Design, 07/01/02.

...

Anchor
VU623332
VU623332
[VU#623332] Mead, Robert. Vulnerability Note VU#623332. MIT Kerberos 5 contains double free vulner-ability in "krb5_recvauth()" function. July 2005. http://www.kb.cert.org/vuls/id/623332

Anchor
VU925211
VU925211
[VU#925211] Weimer, Florian. Vulnerability Note VU#925211. Debian and Ubuntu OpenSSL packages contain a predictable random number generator. May 2008. http://www.kb.cert.org/vuls/id/925211

Anchor
Warren 02
Warren 02
[Warren 2002] Warren, Henry S. Hacker's Delight. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654).

...

Anchor
xorl 2009
xorl 2009
[xorl 2009] xorl. xorl %eax, %eax. December 2016 [accessed].

 

...