...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="3c6c94f4-6ef5-44c4-96c0-fe16229f71e7"><ac:plain-text-body><![CDATA[ | [[API |
...
2006 |
...
AA. |
...
Bibliography#API |
...
06] |
...
] |
...
Class |
...
Vector, |
...
Class |
...
WeakReference, |
...
Class |
...
ConcurrentHashMap<K,V> |
...
]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d0c292d1-0cf5-455e-9056-9f492f3fa4f6"><ac:plain-text-body><![CDATA[ | [[JavaThreads |
...
2004 |
...
AA. |
...
Bibliography#JavaThreads |
...
04] |
...
] |
...
8.2 |
...
"Synchronization |
...
and |
...
Collection |
...
Classes" | ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="760e10ed-c7b2-40fd-b971-f7640387ed56"><ac:plain-text-body><![CDATA[ | [[Goetz 2006 | AA. Bibliography#Goetz 06]] | 4.4.1. |
...
Client-side |
...
Locking, |
...
4.4.2. |
...
Composition |
...
and |
...
5.2.1. |
...
ConcurrentHashMap | ]]></ac:plain-text-body></ac:structured-macro> | |||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="eef3a539-d1a2-416c-a6fd-1d2db3aac5e5"><ac:plain-text-body><![CDATA[ | [[Lee 2009 | AA. Bibliography#Lee 09]] | "Map & Compound Operation" | ]]></ac:plain-text-body></ac:structured-macro> |
...
LCK10-J. Do not use incorrect forms of the double-checked locking idiom 08. Locking (LCK) 09. Thread APIs (THI)