...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="ab031900b6a8994a-6008273d-489a4e31-a4468b48-441b02bf36c34faa50ee8bfc"><ac:plain-text-body><![CDATA[ | [[Bloch 2008 | AA. Bibliography#Bloch 08]] | Item 39: Make defensive copies when needed | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="412870219b82a9e4-33e59cac-4ef34e33-b72f97bf-8f5a94fab8b5056c884ee3f6"><ac:plain-text-body><![CDATA[ | [[Pugh 2009 | AA. Bibliography#Pugh 09]] | Returning references to internal mutable state | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="09fdbadaad49ca19-1c2bb7dd-467a4c03-820c8022-ab341f0cacb1299a4ad9ce00"><ac:plain-text-body><![CDATA[ | [[SCG 2007 | AA. Bibliography#SCG 07]] | Guideline 2-1 Create a copy of mutable inputs and outputs | ]]></ac:plain-text-body></ac:structured-macro> |
...
OBJ13-J. Do not expose sensitive private members of an outer class from within a nested class 04. Object Orientation (OBJ) 05. Methods (MET)OBJ15-J. Minimize the accessibility of classes and their members