...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="20ac067ddcb33023-1e1ab9f7-47594bb2-85d9bbd4-0c7c6fd2d819324f4414a0c1"><ac:plain-text-body><![CDATA[ | [[JLS 2005 | AA. Bibliography#JLS 05]] | [Section 14.11 The switch Statement | http://java.sun.com/docs/books/jls/third_edition/html/statements.html#14.11] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c6162e5eebda6fd9-e92f5123-44ed40e1-a5869705-9a37b136ccf692cbe9d89c3b"><ac:plain-text-body><![CDATA[ | [[Rogue 2000 | AA. Bibliography#Rogue 00]] | [The Elements of Java Style | http://www.ambysoft.com/books/elementsJavaStyle.html], Rule 78. | ]]></ac:plain-text-body></ac:structured-macro> |
...