skip to main content
technical-note

Gem #36: safe and secure software: chapter 3, safe pointers

Published:31 March 2009Publication History
Skip Abstract Section

Abstract

This week's gem is the third chapter of John Barnes' new booklet: Safe and Secure Software: An Introduction to Ada 2005.

Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet. We hope you will enjoy the read!

Index Terms

  1. Gem #36: safe and secure software: chapter 3, safe pointers

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGAda Ada Letters
        ACM SIGAda Ada Letters  Volume 29, Issue 1
        April 2009
        79 pages
        ISSN:1094-3641
        DOI:10.1145/1541788
        Issue’s Table of Contents

        Copyright © 2009 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 March 2009

        Check for updates

        Qualifiers

        • technical-note
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader