GSO ISO/IEC TR 24731-2:2021

Gulf Standard   Current Edition
· Approved on 01 July 2021 ·

Information technology — Programming languages, their environments and system software interfaces — Extensions to the C library — Part 2: Dynamic Allocation Functions

GSO ISO/IEC TR 24731-2:2021 Files

GSO ISO/IEC TR 24731-2:2021 Scope

ISO/IEC TR 24731 provides alternative functions for the C library that promote safer, more secure programming. ISO/IEC TR 24731-1 provides simple replacement functions for the library functions of ISO/IEC 9899:1999 that provide bounds checking. Those functions can be used as simple replacements for the original library functions in legacy code. ISO/IEC TR 24731-2:2010 presents replacements for many of these functions that use dynamically allocated memory to ensure that buffer overflow does not occur.

Best Sellers From Information Sector

OS GSO ISO/TR 18492:2017
GSO ISO/TR 18492:2017 
Omani Standard
Long-term preservation of electronic document-based information
GSO ISO/TR 18492:2017
ISO/TR 18492:2005 
Gulf Standard
Long-term preservation of electronic document-based information
GSO ISO/TR 13028:2013
ISO/TR 13028:2010 
Gulf Standard
Information and documentation - Implementation guidelines for digitization of records
GSO ISO 16175-2:2013
ISO 16175-2:2011 
Gulf Standard
Information and documentation -- Principles and functional requirements for records in electronic office environments -- Part 2: Guidelines and functional requirements for digital records management systems

Recently Published from Information Sector

GSO ISO/IEC 23053:2024
ISO/IEC 23053:2022 
Gulf Standard
Framework for Artificial Intelligence (AI) Systems Using Machine Learning (ML)
GSO ISO/IEC TR 3445:2024
ISO/IEC TR 3445:2022 
Gulf Standard
Information technology — Cloud computing — Audit of cloud services
GSO ISO/IEC 30162:2024
ISO/IEC 30162:2022 
Gulf Standard
Internet of Things (IoT) — Compatibility requirements and model for devices within industrial IoT systems
GSO ISO/IEC 30107-3:2024
ISO/IEC 30107-3:2023 
Gulf Standard
Information technology — Biometric presentation attack detection — Part 3: Testing and reporting