You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 34 Next »


[Beattie] Beattie, Malcolm. B::Lint. Comprehensive Perl Archive Network, http://search.cpan.org/~nwclark/perl-5.8.8/ext/B/B/Lint.pm, Perl.org (2011).

[Christey 2005] Christey, Steven M. Format String Vulnerabilities in Perl Programs (Full Disclosure mailing list archives), 2005 .


[Conway 2005] Conway, Damian. Perl Best Practices, O'Reilly Media, 2005, ISBN: 978-0596001735.


[IMS 2010] Imaginative Software Systems. Perl::Critic, v. 1.116. Comprehensive Perl Archive Networkhttp://www.cpan.org, Perl.org (2011).

[Garfinkel 1996] Garfinkel, Simson, & Spafford, Gene. Practical UNIX & Internet Security, 2nd Edition. Sebastopol, CA: O'Reilly Media, April 1996 (ISBN 1-56592-148-8).

[Howard 2002] Howard, Michael, & LeBlanc, David C. Writing Secure Code, 2nd ed. Redmond, WA: Microsoft Press, 2002.


[Open Group 08] IEEE. The Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2008 edition.

[Seacord 2005] Robert C. Seacord, Secure Coding in C and C++, Addison-Wesley Professional, Boston, 2005.

[VU#948385] Perl contains an integer sign error in format string processing, US CERT Vulnerability Note, 2005.


[Wall 2011] Wall, Larry. Perl 5 version 14.1 Manual Pages, http://perldoc.perl.org/ (1995–2011).


  • No labels