...
[Goodliffe 2006] Pete Goodliffe. Code Craft: The Practice of Writing Excellent Code. San Francisco: No Starch Press; 1st Ed. edition. December 15, 2006 [Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde.
Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003).
...
[Grubb 2013] Penny Grubb,
and Armstrong A
. Takang.
Software Maintenance Concepts and Practice, 2nd
Editioned.
River Edge, NJ: World Scientific
. April, (2013
).
. Anchor |
---|
| Guillardoy 12 |
---|
| Guillardoy 12 |
---|
|
[Guillardoy 2012] Guillardoy, Esteban (Immunity Products).
Java 0-day analysis (CVE-2012-4681) (August 28, 2012).
...
[Hatton 1995] Hatton, Les.
Safer C: Developing Software for High-Integrity and Safety-Critical Systems. New York: McGraw-Hill, 1995 (ISBN 0-07-707640-0
).[Hawtin 2006] Hawtin, Thomas. [drlvm][kernel_classes] ThreadLocal vulnerability. MarkMail (2006).
[Hawtin 2008] Hawtin, Thomas.
Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities. Sun Microsystems, Make It Fly, London (2008).
...
[Seacord 2013] Seacord, Robert C.
Secure Coding in C and C++, 2nd ed. Boston: Addison-Wesley (2013). See
http://www.cert.org/books/secure-coding for news and errata.
[SecArch 2006]
Java 2 Platform Security Architecture. Oracle (2006).
...