...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="eefa46c8-9636-4a4e-ab83-46f39c98b94b"><ac:plain-text-body><![CDATA[ | [[Bloch |
...
2008 |
...
AA. |
...
Bibliography#Bloch |
...
08] |
...
] |
...
Item |
...
39: |
...
Make |
...
defensive |
...
copies |
...
when |
...
needed | ]]></ac:plain-text-body></ac:structured-macro> | |||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c6f87e54-62d8-4ee1-b558-67dfcdbd6a5c"><ac:plain-text-body><![CDATA[ | [[Pugh 2009 | AA. Bibliography#Pugh 09]] | Returning references to internal mutable state | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="922519d1-735e-4bc9-8cd6-f17dc0bc0a9c"><ac:plain-text-body><![CDATA[ | [[SCG 2007 | AA. Bibliography#SCG 07]] | Guideline 2-1 Create a copy of mutable inputs and outputs | ]]></ac:plain-text-body></ac:structured-macro> |
...
OBJ13-J. Do not expose sensitive private members of an outer class from within a nested class 04. Object Orientation (OBJ) 05. Methods (MET)