[Abrahams 2010] Abrahams, David. Error and Exception Handling, #7. Boost Library. 2010. [Banahan 2003] Banahan, Mike. The C Book . 2003.[Barney 2010] Barney, Blaise. POSIX Threads Programming. Lawrence Livermore National Security, LLC. 2010.[Becker 2008] Becker, Pete. Working Draft, Standard for Programming Language C++. April 2008.[Becker 2009] Becker, Pete Working Draft, Standard for Programming Language C++. September 2009.[Black 2007] Black, Paul E.; Kass, Michael; & Koo, Michael. Source Code Security Analysis Tool Functional Specification Version 1.0. Special Publication 500-268. Information Technology Laboratory (ITL). May 2007.[Cline 2009] Cline, Marshall. C++ FAQ Lite—Frequently Asked Questions. 1991-2009. Anchor |
---|
| codesourcery 2016a |
---|
| codesourcery 2016a |
---|
|
[CodeSourcery 2016a] CodeSourcery, Compaq, EDG, HP, IBM, Intel, Red Hat, SGI, et al. Itanium C++ ABI. December 2016 [accessed]. Anchor |
---|
| codesourcery2016b |
---|
| codesourcery2016b |
---|
|
[CodeSourcery 2016b] CodeSourcery, Compaq, EDG, HP, IBM, Intel, Red Hat, SGI, et al. Itanium C++ ABI (Revision: 1,86). December 2016 [accessed].[Coverity 2007] Coverity. Coverity Prevent User's Manual (3.3.0). 2007. [CWE] MITRE. Common Weakness Enumeration – A Community-Developed Dictionary of Software Weakness Types.[Dewhurst 2002] Dewhurst, Stephen C. C++ Gotchas: Avoiding Common Problems in Coding and Design. Addison-Wesley Professional. 2002.[Dewhurst 2005] Dewhurst, Stephen C. C++ Common Knowledge: Essential Intermediate Programming. Addison-Wesley Professional. 2005.[DISA 2015] DISA. Application Security and Development Security Technical Implementation Guide, Version 3, Release 10. Accessed April 2015.[DISA 2016] DISA. Application Security and Development Security Technical Implementation Guide, Version 4, Release 1. Accessed January 2017.[DISA 2018] DISA. Application Security and Development Security Technical Implementation Guide, Version 4, Release 8. Accessed January 2019.[Dowd 2006] Dowd, Mark; McDonald, John; & Schuh, Justin. Attacking delete and delete[] in C++. In The Art of Software Security Assessment. Addison-Wesley Professional. 2006.[Fortify 2006] Fortify Software Inc. Fortify Taxonomy: Software Security Errors. 2006.[FSF 2005] Free Software Foundation. GCC Online Documentation. 2005.[Gamma 1994] Gamma, Erich; Helm, Richard; Johnson, Ralph, & Vlissides, John. Design Patterns Elements of Reusable Object Oriented Software. Addison-Wesley Professional. 1994.[GNU 2016] gnu.org. GCC, the GNU Compiler Collection: Declaring Attributes of Functions. December 2016 [accessed].[Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems. March 1991.[Graff 2003] Graff, Mark G. & Van Wyk, Kenneth R. Secure Coding: Principles and Practices. O'Reilly. 2003. ISBN 0596002424.[Henricson 1997] Henricson, Mats & Nyquist, Erik. Industrial Strength C++. Prentice Hall PTR. 1997. ISBN 0-13-120965-5.[Hinnant 2005] Hinnant, Howard. RValue Reference Recommendations for Chapter 20. N1856=05-0116. August 2005.[Hinnant 2015] Hinnant, Howard. Reply to "std::exception Why what() is returning a const char* and not a string?" ISO C++ Standard—Discussion. June 2015. Anchor |
---|
| IEC 60812 2006 |
---|
| IEC 60812 2006 |
---|
|
[IEC 60812 2006] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. IEC 60812. IEC. January 2006. Anchor |
---|
| IEEE Std 610.12 1990 |
---|
| IEEE Std 610.12 1990 |
---|
|
[IEEE Std 610.12 1990] IEEE. IEEE Standard Glossary of Software Engineering Terminology. 1990. Anchor |
---|
| IEEE Std 1003.1-2013 |
---|
| IEEE Std 1003.1-2013 |
---|
|
[IEEE Std 1003.1:2013] IEEE & The Open Group. Standard for Information Technology—Portable Operating System Interface (POSIX). Base Specifications. Issue 7. 2013.[INCITS 2012] INCITS Document number N3396= 12-0096. Dynamic memory allocation for over-aligned data. 2012. [INCITS 2014] INCITS PL22.16 & ISO WG21 C++ Standards Committee, Library Working Group (LWG). C++ Standard Library Active Issues List (Revision R88). N3967. 2014.
[INCITS 2020] INCITS PL22.16 & ISO WG21 C++ Standards Committee, Library Working Group (LWG). C++ Standard Library Active Issues List (Revision R88). N4860. 2020.
Anchor |
---|
| Internet Society 00 |
---|
| Internet Society 00 |
---|
|
[Internet Society 2000] The Internet Society. Internet Security Glossary (RFC 2828). 2000.
Anchor |
---|
| ISO/IEC 9899-1999 |
---|
| ISO/IEC 9899-1999 |
---|
|
Anchor |
---|
| ISO-IEC 9899-1999 |
---|
| ISO-IEC 9899-1999 |
---|
|
[ISO/IEC 9899-1999] ISO/IEC 9899-1999. Programming Languages — C, Second Edition. 1999. Anchor |
---|
| ISO/IEC 9899-2011 |
---|
| ISO/IEC 9899-2011 |
---|
|
Anchor |
---|
| ISO-IEC 9899-2011 |
---|
| ISO-IEC 9899-2011 |
---|
|
[ISO/IEC 9899:2011] ISO/IEC. Programming Languages—C, 3rd ed. ISO/IEC 9899:2011. 2011. Anchor |
---|
| ISO/IEC14882-1998 |
---|
| ISO/IEC14882-1998 |
---|
|
[ISO/IEC 14882-1998] ISO/IEC 14882-1998. Programming Languages — C++, First Edition. 1998. Anchor |
---|
| ISO/IEC14882-2003 |
---|
| ISO/IEC14882-2003 |
---|
|
[ISO/IEC 14882-2003] ISO/IEC 14882-2003. Programming Languages — C++, Second Edition. 2003. Anchor |
---|
| ISO/IEC14882-2011 |
---|
| ISO/IEC14882-2011 |
---|
|
[ISO/IEC 14882-2011] ISO/IEC 14882-2011. Programming Languages — C++, Third Edition. 2011. Anchor |
---|
| ISO/IEC14882-2014 |
---|
| ISO/IEC14882-2014 |
---|
|
[ISO/IEC 14882-2014] ISO/IEC 14882-2014. Programming Languages — C++, Fourth Edition. 2014. Anchor |
---|
| ISO/IEC N3000 |
---|
| ISO/IEC N3000 |
---|
|
[ISO/IEC N3000 2009] Working Draft, Standard for Programming Language C++. November 2009. Anchor |
---|
| ISO/IEC TR 24772-2013 |
---|
| ISO/IEC TR 24772-2013 |
---|
|
[ISO/IEC TR 24772:2013] ISO/IEC. Information Technology—Programming Languages—Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use. TR 24772-2013. ISO. March 2013. Anchor |
---|
| ISO/IEC TS 17961 |
---|
| ISO/IEC TS 17961 |
---|
|
Anchor |
---|
| ISO-IEC TS 17961 |
---|
| ISO-IEC TS 17961 |
---|
|
Anchor |
---|
| ISO/IEC TS 17961-2013 |
---|
| ISO/IEC TS 17961-2013 |
---|
|
[ISO/IEC TS 17961:2012] ISO/IEC TS 17961. Information Technology—Programming Languages, Their Environments and System Software Interfaces—C Secure Coding Rules. ISO. 2012.
[Jack 2007] Jack, Barnaby. Vector Rewrite Attack. Juniper Networks. May 2007.[Kalev 1999] Kalev, Danny. ANSI/ISO C++ Professional Programmer's Handbook. Que. Corporation. 1999[Lea 2000] Lea, Doug. Concurrent Programming in Java, 2nd Edition. Addison-Wesley Professional. 2000.[Lions 1996] Lions, J. L. ARIANE 5 Flight 501 Failure Report. European Space Agency (ESA) & National Center for Space Study (CNES). July 1996.
[Lions 1996] Lions, J. L. ARIANE 5 Flight 501 Failure Report. European Space Agency (ESA) & National Center for Space Study (CNES). July 1996. Anchor |
---|
| Lockheed Martin 05 |
---|
| Lockheed Martin 05 |
---|
|
[Lockheed Martin 2005] Lockheed Martin. Joint Strike Fighter Air Vehicle C++ Coding Standards for the System Development and Demonstration Program. Document Number 2RDU00001, Rev C. December 2005.[Meyers 1996] Meyers, Scott. More Effective C++: 35 New Ways to Improve Your Programs and Designs. Addison-Wesley. 1996.[Meyers 2001] Meyers, Scott. Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library. Addison-Wesley Professional. 2001.[Meyers 2005] Meyers, Scott. Effective C++: 55 Specific Ways to Improve Your Programs and Designs (3rd Edition). Addison-Wesley Professional. 2005.[Meyers 2014] Meyers, Scott. Reply to The Drawbacks of Implementing Move Assignment in Terms of Swap [blog post]. The View from Aristeia: Scott Meyers' Professional Activities and Interests. 2014.[Microsoft 2010] STL std::string class causes crashes and memory corruption on multi-processor machines. 2010.[MISRA 2004] MIRA Limited. MISRA C: 2004 Guidelines for the Use of the C Language in Critical Systems. MIRA Limited. ISBN 095241564X. October 2004.[MISRA 2008] MISRA Limited. MISRA C++ 2008 Guidelines for the Use of the C++ Language in Critical Systems. ISBN 978-906400-03-3 (paperback); ISBN 978-906400-04-0 (PDF). June 2008.[MITRE 2007] MITRE. Common Weakness Enumeration, Draft 9. April 2008.[MITRE 2008a] MITRE. CWE ID 327. Use of a Broken or Risky Cryptographic Algorithm. 2008.[MITRE 2008b] MITRE. CWE ID 330. Use of Insufficiently Random Values. 2008.[MITRE] MITRE. Common Weakness Enumeration, Version 1.8. February 2010.[MSDN 2010] Microsoft Developer Network. CryptGenRandom Function. December 2016 [accessed].[MDSN 2016] Microsoft Developer Network. nothrow (C++). December 2016 [accessed].[NIST 2006] NIST. SAMATE Reference Dataset. 2006. Anchor |
---|
| IEEE Std 1003.1-2013 |
---|
| IEEE Std 1003.1-2013 |
---|
|
Anchor |
---|
| ISO/IEC 9945:2013 |
---|
| ISO/IEC 9945:2013 |
---|
|
Anchor |
---|
| Open Group 13 |
---|
| Open Group 13 |
---|
|
[Open Group 2013] The Open Group. The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2013 Edition. 2013. Anchor |
---|
| IEEE Std 1003.1-2008 |
---|
| IEEE Std 1003.1-2008 |
---|
|
Anchor |
---|
| ISO/IEC 9945:2008 |
---|
| ISO/IEC 9945:2008 |
---|
|
Anchor |
---|
| Open Group 08 |
---|
| Open Group 08 |
---|
|
[Open Group 2008] The Open Group. The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2008 Edition. 2008. Anchor |
---|
| IEEE Std 1003.1-2004 |
---|
| IEEE Std 1003.1-2004 |
---|
|
Anchor |
---|
| ISO/IEC 9945:2003 |
---|
| ISO/IEC 9945:2003 |
---|
|
Anchor |
---|
| Open Group 04 |
---|
| Open Group 04 |
---|
|
[Open Group 2004] The Open Group. The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition. 2004.[Plum 1991] Plum, Thomas. C++ Programming. Plum Hall, Inc. November 1991. ISBN 0911537104.[Quinlan 2006] Quinlan, Dan; Vuduc, Richard; Panas, Thomas; Härdtlein, Jochen; & Sæbjørnsen, Andreas. Support for Whole-Program Analysis and the Verification of the One-Definition Rule in C++. 27-35. Page 500-262. In Proceedings of the Static Analysis Summit. July 2006.[Rohlf 2009] Rohlf, Chris. Fun with erase (). 2009.[Saks 1999] Saks, Dan. const T vs.T const. Embedded Systems Programming. February 1999. Pages 13-16.[Saks 2007] Saks, Dan. Sequence Points. Embedded Systems Design. 2007.[Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Addison-Wesley. 2005. ISBN 0321335724.[Seacord 2013] Seacord, Robert C. Secure Coding in C and C++, Second Edition. Addison-Wesley. 2013.[Sebor 2004] Sebor, Martin. C++ Standard Core Language Active Issues, Revision 68. 2010.[SGI 2006] Silicon Graphics, Inc. basic_string<charT, traits, Alloc>. Standard Template Library Programmer's Guide. 2006.[Steele 1977] Steele, G. L. Arithmetic shifting considered harmful. SIGPLAN Notices. Volume 12. Issue 11. November 1977. Pages 61-69. Anchor |
---|
| Stroustrup 97 |
---|
| Stroustrup 97 |
---|
|
[Stroustrup 1997] Stroustrup, Bjarne. The C++ Programming Language, Third Edition. Addison-Wesley. 1997. ISBN 978-0201700732. Anchor |
---|
| Stroustrup 06 |
---|
| Stroustrup 06 |
---|
|
[Stroustrup 2006] Stroustrup, Bjarne. C++ Style and Technique FAQ. 2006. December 2016 [accessed]. Anchor |
---|
| Stroustrup 01 |
---|
| Stroustrup 01 |
---|
|
[Stroustrup 2001] Stroustrup, Bjarne. Exception Safety: Concepts and Techniques. AT&T Labs. 2001.[Sun 1993] Sun Security Bulletin #00122. 1993.[Sutter 2000] Sutter, Herb. Exceptional C++: 47 Engineering Puzzles, Programming Problems, and Solutions. Addison-Wesley Professional. 2000. ISBN 0201615622.[Sutter 2001] Sutter, Herb. More Exceptional C++: 40 New Engineering Puzzles, Programming Problems, and Solutions. Addison-Wesley Professional. 2001. ISBN 020170434.[Sutter 2004] Sutter, Herb & Alexandrescu, Andrei. C++ Coding Standards: 101 Rules, Guidelines, and Best Practices. Addison-Wesley Professional. 2004. ISBN 0321113586. Anchor |
---|
| van Sprundel06 |
---|
| van Sprundel06 |
---|
|
[van Sprundel 2006] van Sprundel, Ilja. Unusual bugs. 2006.[Viega 2003] Viega, John & Messier, Matt. Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More. O'Reilly. 2003. ISBN 0-596-00394-3. [Viega 2005] Viega, John. CLASP Reference Guide, Volume 1.1. Secure Software. 2005.[VU#159523] Giobbi, Ryan. Vulnerability Note VU#159523. Adobe Flash Player integer overflow vulnerability. April 2008. [VU#162289] Dougherty, Chad. Vulnerability Note VU#162289. GCC Silently Discards Some Wraparound Checks. April 2008.[VU#623332] Mead, Robert. Vulnerability Note VU#623332. MIT Kerberos 5 contains double free vulnerability in "krb5_recvauth()" function. July 2005. [VU#925211] Weimer, Florian. Vulnerability Note VU#925211. Debian and Ubuntu OpenSSL packages contain a predictable random number generator. May 2008.[Warren 2002] Warren, Henry S. Hacker's Delight. Addison Wesley Professional. 2002. ISBN 0201914654.[Williams 2010a] Williams, Anthony. Thread. Boost Library. 2010.[Williams 2010b] Williams, Anthony. Simpler Multithreading in C++0x. Internet.com. 2010.[xorl 2009] xorl. xorl %eax, %eax. December 2016 [accessed Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="21d1de4a-e08f-4816-99ce-b013f53f72a0"><ac:parameter ac:name="">Becker 08</ac:parameter></ac:structured-macro>\[Becker 08\] Becker, Pete. [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2008/n2521.pdf], April 2008. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="618f5975-abca-48e5-a717-e32f6f273ce4"><ac:parameter ac:name="">Becker 09</ac:parameter></ac:structured-macro>\[Becker 09\] Becker, Pete [Working Draft, Standard for Programming Language C+\+|http://www.open-std.org/JTC1/SC22/WG21/docs/papers/2009/n3000.pdf], September 2009. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d855085-4009-4313-8e71-cc52491e522f"><ac:parameter ac:name="">Cline 09</ac:parameter></ac:structured-macro>\[Cline 09\] Cline, Marshall. [C+\+ FAQ Lite - Frequently Asked Questions|http://www.parashift.com/c++-faq-lite/index.html] 1991-2009 |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1c055445-dca3-40d2-9392-80c8321a3687"><ac:parameter ac:name="">cwe</ac:parameter></ac:structured-macro> \[CWE\] MITRE. [Common Weakness Enumeration|http://cwe.mitre.org/] -- A Community-Developed Dictionary of Software Weakness Types. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3221d4c4-5b60-466b-b3c5-014ea9009b31"><ac:parameter ac:name="">Dewhurst 03</ac:parameter></ac:structured-macro>\[Dewhurst 03\] Dewhurst, Stephen C. _C+\+ Gotchas: Avoiding Common Problems in Coding and Design_. Boston, MA: Addison-Wesley Professional, 2002. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="471338c5-d7b4-4333-955b-2651fd40e7f4"><ac:parameter ac:name="">Dewhurst 05</ac:parameter></ac:structured-macro>\[Dewhurst 05\] Dewhurst, Stephen C. _C+\+ Common Knowledge: Essential Intermediate Programming_. Boston, MA: Addison-Wesley Professional, 2005. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3b2924a-f784-4318-af3f-649d85d1cea7"><ac:parameter ac:name="">Dowd 07</ac:parameter></ac:structured-macro>\[Dowd 07\] Dowd, McDonald & Schuh. [The Art of Software Security Assessment - Attacking delete and delete\[\] in C+\+|http://taossa.com/index.php/2007/01/03/attacking-delete-and-delete-in-c]. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="19166299-c02a-46ba-8ae1-ef885f313320"><ac:parameter ac:name="">FSF 05</ac:parameter></ac:structured-macro>\[FSF 05\] Free Software Foundation. [GCC online documentation.|http://gcc.gnu.org/onlinedocs] (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dcd9a599-e067-4c93-9897-6b78447dcabd"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro>\[Gamma 95\] Gamma, Helm, Vlissides, and Johnson. Design Patterns Elements of Reusable Object Oriented Software. Addison Wesley, 1995. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b75f3e16-6c55-428c-86bb-85bbcf5b1a0b"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro>\[Goldberg 91\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic|http://docs.sun.com/source/806-3568/ncg_goldberg.html]. Sun Microsystems, March 1991. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1b9bca1e-7611-4c20-ad1f-03c29e28cbd7"><ac:parameter ac:name="">Henricson 97</ac:parameter></ac:structured-macro>\[Henricson 97\] Henricson, Mats & Nyquist, Erik. [_Industrial Strength C+\+_|http://www.sannabremo.se/nyquist/industrial/]. Upper Saddle River, NJ: Prentice Hall PTR, 1997 (ISBN 0-13-120965-5). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2590d718-326e-4a08-8ab9-f4e4b6986ec7"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro>\[IEC 60812 2006\] Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA), 2nd ed. (IEC 60812). IEC, January 2006. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="09587bca-59c2-4ac8-891c-8951a49072e1"><ac:parameter ac:name="">ISO/IEC 9899-1999</ac:parameter></ac:structured-macro>\[ISO/IEC 9899-1999\] ISO/IEC 9899-1999. _Programming Languages --- C, Second Edition_, 1999. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aefdc603-a889-4dfe-a276-e62b9c1ef4f3"><ac:parameter ac:name="">ISO/IEC 14882-1998</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-1998\] ISO/IEC 14882-1998. _Programming Languages --- C++, First Edition_, 1998. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62543269-fad7-4f46-96bf-71e621c5859e"><ac:parameter ac:name="">ISO/IEC 14882-2003</ac:parameter></ac:structured-macro>\[ISO/IEC 14882-2003\] ISO/IEC 14882-2003. _Programming Languages --- C++, Second Edition_, 2003. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2534b74-82b4-4a6a-bffe-4d3dda3c12d6"><ac:parameter ac:name="">Lions 96</ac:parameter></ac:structured-macro>\[Lions 96\] Lions, J. L. [ARIANE 5 Flight 501 Failure Report|http://en.wikisource.org/wiki/Ariane_501_Inquiry_Board_report]. Paris, France: European Space Agency (ESA) & National Center for Space Study (CNES) Inquiry Board, July 1996. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f6d76f04-4cb9-4402-b84d-e2f6d9018a69"><ac:parameter ac:name="">Lockheed Martin 05</ac:parameter></ac:structured-macro>\[Lockheed Martin 05\] Lockheed Martin. "[Joint Strike Fighter Air Vehicle C+\+ Coding Standards for the System Development and Demonstration Program.|http://www.research.att.com/~bs/JSF-AV-rules.pdf]" Document Number 2RDU00001 Rev C., December 2005. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5af8c5a-b6f5-4d4d-9980-64bcd3699a57"><ac:parameter ac:name="">Meyers 95</ac:parameter></ac:structured-macro>\[Meyers 95\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley Professional, 1995. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5ef709af-88c2-4abc-8e30-0e5852d47362"><ac:parameter ac:name="">Meyers 96</ac:parameter></ac:structured-macro>\[Meyers 96\] Meyers, Scott. _More Effective C++: 35 New Ways to Improve Your Programs and Designs_. Boston, MA: Addison-Wesley, 1996. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b6b9a8f-b901-46e5-91a8-f2d7740e1600"><ac:parameter ac:name="">Meyers 97</ac:parameter></ac:structured-macro>\[Meyers 97\] Meyers, Scott. _Effective C+\+ : 55 Specific Ways to Improve Your Programs and Designs_, 3rd ed. Boston, MA: Addison-Wesley Professional, 1997. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a7afce52-8848-40ff-ae6e-4768555ba738"><ac:parameter ac:name="">Meyers 01</ac:parameter></ac:structured-macro>\[Meyers 01\] Meyers, Scott. _Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library_. Boston, MA: Addison-Wesley Professional, 2001. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f321849c-80f2-4e03-95ec-387097947e7c"><ac:parameter ac:name="">Meyers 05</ac:parameter></ac:structured-macro>\[Meyers 05\] Meyers, Scott. _Effective C++: 55 Specific Ways to Improve Your Programs and Designs (3rd Edition)_. Boston, MA: Addison-Wesley Professional, 2005. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="de93dccd-7e88-4705-beec-75eb32587dd1"><ac:parameter ac:name="">MISRA 04</ac:parameter></ac:structured-macro>\[MISRA 04\] MIRA Limited. "[MISRA C|http://www.misra.org.uk/]: 2004 Guidelines for the Use of the C Language in Critical Systems." Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="45ac4042-a218-4917-9158-9909c030f9ad"><ac:parameter ac:name="">MISRA 08</ac:parameter></ac:structured-macro>\[MISRA 08\] MIRA Limited. "[MISRA C+\+|http://www.misra.org.uk/]: 2008 "Guidelines for the Use of the C+\+ Language in Critical Systems", ISBN 978-906400-03-3 (paperback), ISBN 978-906400-04-0 (PDF), June 2008. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aedbca2f-ac33-4e73-bbee-2656f70ede20"><ac:parameter ac:name="">NIST 06</ac:parameter></ac:structured-macro>\[NIST 06\] NIST. [_SAMATE Reference Dataset_|http://samate.nist.gov/SRD/] (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eca94847-798c-4aca-ba88-ba44add0b1ea"><ac:parameter ac:name="">POSIX.1-2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d65a2d2b-8e14-4032-90e9-74214dd085b5"><ac:parameter ac:name="">IEEE Std 1003.1-2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6d5b920-3fce-4730-9ea2-0dbfba0e996e"><ac:parameter ac:name="">ISO/IEC 9945:2008</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a2bc6a91-e227-4266-9f31-dc080bb4999f"><ac:parameter ac:name="">Open Group 08</ac:parameter></ac:structured-macro>\[Open Group 08\] The Open Group. "[_The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2008 Edition_|http://www.opengroup.org/onlinepubs/9699919799/toc.htm]." (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e34a4e03-2c24-4eb5-b47b-3c970c98bd81"><ac:parameter ac:name="">POSIX.1-2004</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1ec498c-151d-4817-a513-77271338d5c0"><ac:parameter ac:name="">IEEE Std 1003.1-2004</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="116ae76e-b7de-4527-b592-bd770eeadd35"><ac:parameter ac:name="">ISO/IEC 9945:2003</ac:parameter></ac:structured-macro> <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c15d2f04-328c-4634-800b-2ff9ac5f5424"><ac:parameter ac:name="">Open Group 04</ac:parameter></ac:structured-macro>\[Open Group 04\] The Open Group. "[_The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition_|http://www.opengroup.org/onlinepubs/009695399/toc.htm]." (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e2998cf-8a6b-4c1a-8fe3-54475616bdc3"><ac:parameter ac:name="">Plum 91</ac:parameter></ac:structured-macro>\[Plum 91\] Plum, Thomas. _C+\+ Programming_. Kamuela, HI: Plum Hall, Inc., November 1991 (ISBN 0911537104). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bc1e1eaa-11f6-47ce-b17f-c4621383f5f6"><ac:parameter ac:name="">Quinlan 06</ac:parameter></ac:structured-macro>\[Quinlan 06\] Quinlan, Dan; Vuduc, Richard; Panas, Thomas; Härdtlein, Jochen; & Sæbjørnsen, Andreas. "Support for Whole-Program Analysis and the Verification of the One-Definition Rule in C++," 27-35. [NIST Special Publication 500-262|http://samate.nist.gov/docs/NIST_Special_Publication_500-262.pdf], _Proceedings of the Static Analysis Summit_. Gaithersburg, MD, July 2006. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd55032c-65a8-406c-ac4e-6178e37f230b"><ac:parameter ac:name="">Saks 99</ac:parameter></ac:structured-macro>\[Saks 99\] Dan Saks. _const T vs.T const_. Embedded Systems Programming. Pg. 13-16. February 1999. [http://www.dansaks.com/articles/1999-02%20const%20T%20vs%20T%20const.pdf] |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b83ed7e5-0c08-4c23-b4ed-e1e128132554"><ac:parameter ac:name="">Saks 07</ac:parameter></ac:structured-macro>\[Saks 07\] Saks, Dan. "[Sequence Points|http://www.embedded.com/columns/programmingpointers/9900661?_requestid=481957]" Embedded Systems Design, 07/01/02. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6e2c6432-9ad4-4f99-852d-e13ce009ea9a"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro>\[Seacord 05\] Seacord, R. _Secure Coding in C and C+\+_. Upper Saddle River, NJ: Addison-Wesley, 2006 (ISBN 0321335724). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b28ba7c2-b059-4044-8b12-2aa6c4c03849"><ac:parameter ac:name="">SGI 06</ac:parameter></ac:structured-macro>\[SGI 06\] Silicon Graphics, Inc. "[basic_string<charT, traits, Alloc>|http://www.sgi.com/tech/stl/basic_string.html]." _Standard Template Library Programmer's Guide_, 2006. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="320c2746-cbb5-4c2a-ab52-b403e60f9f68"><ac:parameter ac:name="">Steele 77</ac:parameter></ac:structured-macro>\[Steele 77\] Steele, G. L. 1977. [Arithmetic shifting considered harmful.|http://doi.acm.org/10.1145/956641.956647] _SIGPLAN Not._ 12, 11 (Nov. 1977), 61-69. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0bdfe458-5f63-4d17-99ae-319dbbf54910"><ac:parameter ac:name="">Stroustrup 97</ac:parameter></ac:structured-macro>\[Stroustrup 97\] Stroustrup, Bjarne. _The C+\+ Programming Language, Third Edition_. Reading, MA: Addison-Wesley, 1997 (ISBN 0201889544). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05f7dad9-f99a-4720-9132-0a42f74a5f96"><ac:parameter ac:name="">Stroustrup 06</ac:parameter></ac:structured-macro>\[Stroustrup 06\] Stroustrup, Bjarne. [_C+\+ Style and Technique FAQ_|http://public.research.att.com/~bs/bs_faq2.html] (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53f8646a-9c86-48fa-8b07-3d72beaddb7f"><ac:parameter ac:name="">Stroustrup 01</ac:parameter></ac:structured-macro>\[Stroustrup 01\] Stroustrup, Bjarne. [Exception Safety: Concepts and Techniques|http://www.research.att.com/~bs/except.pdf] (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5add9dcf-be1b-4968-94ac-3fcc3bb45e81"><ac:parameter ac:name="">Sutter 00</ac:parameter></ac:structured-macro>\[Sutter 00\] Sutter, Herb. _Exceptional C++: 47 Engineering Puzzles, Programming Problems, and Solutions_. Addison-Wesley Professional, 2000 (ISBN 0201615622). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65c5f91d-f324-42b6-b28c-9bb2c2341d2a"><ac:parameter ac:name="">Sutter 04</ac:parameter></ac:structured-macro>\[Sutter 04\] Sutter, Herb & Alexandrescu, Andrei. _C+\+ Coding Standards: 101 Rules, Guidelines, and Best Practices_. Boston, MA: Addison-Wesley Professional, 2004 (ISBN 0321113586). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9c8e551e-e103-47ff-8605-fa24cfce00f1"><ac:parameter ac:name="">Viega 03</ac:parameter></ac:structured-macro>\[Viega 03\] Viega, John & Messier, Matt. _Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Networking, Input Validation & More_. Sebastopol, CA: O'Reilly, 2003 (ISBN 0-596-00394-3). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7f69ca8c-428e-4730-a849-0fc7fb15b23c"><ac:parameter ac:name="">Warren 02</ac:parameter></ac:structured-macro>\[Warren 02\] Warren, Henry S. _Hacker's Delight_. Boston, MA: Addison Wesley Professional. 2002 (ISBN 0201914654). |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b2e90dc2-5bf5-4773-94f2-e6df2f0b4e0e"><ac:parameter ac:name=""> xorl 2009</ac:parameter></ac:structured-macro>\[xorl 2009\] xorl. [xorl %eax, %eax|http://xorl.wordpress.com/].