Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup

...

" ac:schema-version="1" ac:macro-id="eefa46c8-9636-4a4e-ab83-46f39c98b94b"><ac:plain-text-body><![CDATA[

[[Bloch

...

2008

...

AA.

...

Bibliography#Bloch

...

08]

...

]

...

Item

...

39:

...

Make

...

defensive

...

copies

...

when

...

needed

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c6f87e54-62d8-4ee1-b558-67dfcdbd6a5c"><ac:plain-text-body><![CDATA[

[[Pugh 2009

AA. Bibliography#Pugh 09]]

Returning references to internal mutable state

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="922519d1-735e-4bc9-8cd6-f17dc0bc0a9c"><ac:plain-text-body><![CDATA[

[[SCG 2007

AA. Bibliography#SCG 07]]

Guideline 2-1 Create a copy of mutable inputs and outputs

]]></ac:plain-text-body></ac:structured-macro>

...

OBJ13-J. Do not expose sensitive private members of an outer class from within a nested class      04. Object Orientation (OBJ)      05. Methods (MET)