...
[DISA 2016] DISA.
Application Security and Development Security Technical Implementation Guide, Version 4, Release 1.
Accessed October 2016
[accessed].
[Dowd 2006] Dowd, McDonald, & Schuh, Justin. Attacking delete and elete[] in C++. In
The Art of Software Security Assessment. Addison-Wesley Professional. 2006.
...
[Gamma 1994] Gamma, Erich; Helm, Richard; Johnson, Ralph, & Vlissides, John.
Design Patterns Elements of Reusable Object Oriented Software. Addison-Wesley Professional
, . 1994.
[GNU 2016] gnu.org. GCC, the GNU Compiler Collection: Declaring Attributes of Functions. December 2016 [accessed].
https://gcc.gnu.org/onlinedocs/gcc/Function-Attributes.html...
[Graff 2003] Graff, Mark G. & Van Wyk, Kenneth R.
Secure Coding: Principles and Practices. O'Reilly. 2003. ISBN 0596002424.
[Henricson 1997] Henricson, Mats & Nyquist, Erik.
Industrial Strength C++. Prentice Hall PTR. 1997. ISBN 0-13-120965-5.
[Hinnant 2005] Hinnant, Howard.
RValue Reference Recommendations for Chapter 20. August . N1856=05-011. August 2005.
[Hinnant 2015] Hinnant, Howard. Reply to "
std::exception Why what() is returning a const char* and not a string?"
ISO C++ Standard—Discussion.
June 2015.
...
Anchor |
---|
| IEEE Std 1003.1-2013 |
---|
| IEEE Std 1003.1-2013 |
---|
|
[IEEE Std 1003.1:2013] IEEE & The Open Group. Standard for Information Technology—Portable Operating System Interface (POSIX).
Base Specifications, . Issue 7. 2013.
http://ieeexplore.ieee.org/servlet/opac?punumber=6506089.
...
Anchor |
---|
| ISO/IEC N3000 |
---|
| ISO/IEC N3000 |
---|
|
[ISO/IEC N3000
2009] Working Draft, Standard for Programming Language C++. November 2009.
...
[Jack 2007] Jack, Barnaby.
Vector Rewrite Attack. Juniper Networks. May 2007.
[Lea 2000] Lea, Doug.
Concurrent Programming in Java, 2nd Edition. Addison-Wesley Professional. 2000.
http://www.informit.com/store/concurrent-programming-in-java-design-principles-and-9780201310092...