...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.(h2. Ref)erences
References
Sun Secure Coding Guidelines
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.(h2. Ref)erences
Sun Secure Coding Guidelines