Abstract
This week's gem is the third chapter of John Barnes' new booklet: Safe and Secure Software: An Introduction to Ada 2005.
Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet. We hope you will enjoy the read!
Index Terms
- Gem #36: safe and secure software: chapter 3, safe pointers
Recommendations
Gem #43: safe and secure software: chapter 7, safe memory management
Welcome back the Ada Gems series! We hope you had a great summer.
Gem #43 is the seventh chapter of John Barnes' new booklet: Safe and Secure Software: An Introduction to Ada 2005.
Over the coming months, we will be publishing all thirteen chapters of ...
Gem #34: safe and secure software: chapter 2, safe typing
This week's gem is the second chapter of John Barnes' new booklet: Safe and Secure Software: An Introduction to Ada 2005.
Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you ...
Gem #38: safe and secure software: chapter 4, safe architecture
This week's gem is the fourth chapter of John Barnes' new booklet: Safe and Secure Software: An Introduction to Ada 2005.
Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you ...
Comments