...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Bibliography
Wiki Markup |
---|
\[[SCG 2007|AA. Bibliography#SCG 07]\] Guideline 2-1 Create a copy of mutable inputs and outputs \[[Bloch 2008|AA. Bibliography#Bloch 08]\] Item 39: Make defensive copies when needed \[[Pugh 2009|AA. Bibliography#Pugh 09]\] Returning references to internal mutable state |
...