2.1 | Testing Extreme Conditions | 28 |
2.2 | Example Values for Testing an End-Exclusive Asymmetric Range | 28 |
2.3 | Ranges of Integer Quantities | 49 |
2.4 | Argument Type Checking at Different Stages of a Program's Lifetime | 58 |
2.5 | Enforcing a Class's Usage in C++ | 68 |
|
3.1 | A List of Open Network Ports on a Unix Server | 105 |
3.2 | A List of Open Network Ports on a Windows Workstation | 106 |
3.3 | The Stack During the ftpd} Buffer Exploitation Attack | 109 |
3.4 | Unwinding the Stack (default case) | 110 |
3.5 | Unwinding the Stack During the Exploit | 111 |
3.6 | Unsafe C Functions and their Safer Alternatives | 116 |
3.7 | The Java 2 Platform SE 5.0 Permissions | 142 |
|
4.1 | Timing Profile Characterization, Diagnostic Tools, and Resolution Options | 158 |
4.2 | Overhead Introduced by Context Switching and Interprocess Communication | 183 |
4.3 | Overhead Introduced by Slower Peripherals | 191 |
|
5.1 | Representation of Primitive Types Under Different Architectures | 210 |
5.2 | Structure Element Alignment on the AMD64 Architecture | 216 |
5.3 | Memory Layout of a Small Program under Different Architectures and Operating Systems | 230 |
5.4 | Successive Address Space Limitations and their Interim Solutions | 237 |
5.5 | Effects of Build Options on Program Size | 280 |
|
6.1 | Portability Issues Under Different Development Platforms | 290 |
6.2 | Java Platform Standard Character Encodings | 312 |
6.3 | Locale-Specific Fields | 314 |
|
7.1 | Maintenance Index Parameters | 327 |
7.2 | WebServerConnection Methods and the Fields they Use | 340 |
7.3 | Similar (Cohesive) and Dissimilar Methods in the WebServerConnection Class | 341 |
7.4 | Methods that Can Access a Class Member for Different Types of Access Control | 421 |
|
8.1 | Examples of the Different Rounding Modes | 470 |
8.2 | Key Properties of the Different Floating-Point Formats | 473 |
8.3 | Operations and Operands that Can Result in Exceptions | 496 |