Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup

...

" ac:schema-version="1" ac:macro-id="db17daf8-7b24-4eb5-8ff1-dd607c70f2c6"><ac:plain-text-body><![CDATA[

[[API

...

2006

...

AA.

...

Bibliography#API

...

06]

...

]

...

Class

...

Object

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="02023571-f343-4c3f-8628-cfd9f0013869"><ac:plain-text-body><![CDATA[

[[Grosso 2001

AA. Bibliography#Grosso 01]]

[Chapter 10: Serialization

http://oreilly.com/catalog/javarmi/chapter/ch10.html]

...

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e467a526-96b5-4258-96eb-1b0525682ff8"><ac:plain-text-body><![CDATA[

[[JLS

...

2005

...

AA.

...

Bibliography#JLS

...

05]

...

]

...

[Chapter

...

17,

...

Threads

...

and

...

Locks

...

http://java.sun.com/docs/books/jls/third_edition/html/memory.html]

...

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="12e0ddaa-dbbe-440d-a706-1b2b794cc687"><ac:plain-text-body><![CDATA[

[[Rotem

...

2008

...

AA.

...

Bibliography#Rotem

...

08]

...

]

...

[Falacies

...

of

...

Distributed

...

Computing

...

Explained

...

http://www.rgoarchitects.com/Files/fallacies.pdf]

]]></ac:plain-text-body></ac:structured-macro>

...

      08. Locking (LCK)      LCK10-J. Do not use incorrect forms of the double-checked locking idiom