Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Anchor
Goetz 05b
Goetz 05b

[Goetz 2005b] Goetz, Brian. Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships. IBM developerWorks (2005).

Anchor
Goetz 06a06
Goetz 06a06

[Goetz 2006a2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional (2006). AnchorGoetz 06bGoetz 06b [Goetz 2006b] Goetz, Brian. Java Theory and Practice: Good Housekeeping Practices. IBM developerWorks (2006).

Anchor
Goetz 07
Goetz 07

[Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2006).

...

Anchor
MISRA 04
MISRA 04

[MISRA 2004] MISRA Limited. MISRA C: 2004 Guidelines for the Use of the C Language in Critical Systems. Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X). AnchorMITRE CVEMITRE CVE [MITRE CVE] MITRE Corporation. Common Vulnerabilities and Exposures (2008/2013).

Anchor
MITRE CWE
MITRE CWE

[MITRE CWE] MITRE Corporation. Common Weakness Enumeration (2013).

...