...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="bdbf4827-2d70-486c-acad-1a1f769a6b26"><ac:plain-text-body><![CDATA[ | [[Dormann |
...
2008 |
...
AA. |
...
Bibliography#Dormann |
...
08] |
...
] |
| ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1234acfc-956f-4943-89b4-0161e0bfc784"><ac:plain-text-body><![CDATA[ | [[McGraw 1999 | AA. Bibliography#McGraw 99]] | Appendix C: Sign Only Privileged Code | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="827a37c4-8eb7-46f8-8f1f-593df2bacecb"><ac:plain-text-body><![CDATA[ | [[Schneier 2000 | AA. Bibliography#Schneier 00]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
...