...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="35b1ece874156fad-bd86d237-42c84ed1-8ccfbbb4-643e42022ce47bf339d0c9fd"><ac:plain-text-body><![CDATA[ | [[Bloch 2005 | AA. Bibliography#Bloch References#Bloch 05]] | Puzzle 41. Field and Stream | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9948b162a58fa4fe-3df77ef0-4d794ab8-ae25bcfc-7e5d6cb785cbf49c6cd81e8e"><ac:plain-text-body><![CDATA[ | [[Chess 2007 | AA. Bibliography#Chess References#Chess 07]] | 8.3, Preventing Resource Leaks (Java) | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="3e6d456e33ae65f7-b91a6a29-441d4e16-9bb0b6c2-f19fe0303118cf5a143ead59"><ac:plain-text-body><![CDATA[ | [[Harold 1999 | AA. Bibliography#Harold References#Harold 99]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0fa7f484e520be99-97f1da6d-47bb4553-8d519995-3b17f0b71460d9260882e186"><ac:plain-text-body><![CDATA[ | [[J2SE 2011 | AA. Bibliography#J2SE References#J2SE 11]] | The try-with-resources Statement | ]]></ac:plain-text-body></ac:structured-macro> |
...