...
[Goetz 2005b] Goetz, Brian.
Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships. IBM developerWorks (2005).
[Goetz
2006a2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea.
Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional
(2006). Anchor |
---|
Goetz 06b | Goetz 06b | [Goetz 2006b] Goetz, Brian. Java Theory and Practice: Good Housekeeping Practices. IBM developerWorks (2006).
[Goetz 2007] Goetz, Brian.
Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2006).
...
[MISRA 2004] MISRA Limited.
MISRA C: 2004 Guidelines for the Use of the C Language in Critical Systems. Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X
). Anchor |
---|
MITRE CVE | MITRE CVE | [MITRE CVE] MITRE Corporation. Common Vulnerabilities and Exposures (2008/2013).
[MITRE CWE] MITRE Corporation.
Common Weakness Enumeration (2013).
...