...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2099a1f91d5a11f1-bffb2ad1-492e45b8-957faef3-b167fa5f8e2e8fd24475b9c6"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-486 | http://cwe.mitre.org/data/definitions/486.html] "Comparison of Classes by Name" | ]]></ac:plain-text-body></ac:structured-macro> |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="90547e1660370ad7-87558dff-42394660-9468a3e9-0f75134092fbebea9d2c1e82"><ac:plain-text-body><![CDATA[ | [[Christudas 2005 | AA. Bibliography#Christudas 05]] | Internals of Java Class Loading | ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="3fe3d410ef16389b-8ffc4fab-40264992-921b8877-7d65ea26f1ed478b2d7de943"><ac:plain-text-body><![CDATA[ | [[JVMSpec 1999 | AA. Bibliography#JVMSpec 99]] | [§2.8.1 Class Names | http://java.sun.com/docs/books/jvms/second_edition/html/Concepts.doc.html] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1114af5fbe6ae39c-0f4c09e8-470b45b0-af16af3b-32769c78e636e1ad2c9402d1"><ac:plain-text-body><![CDATA[ | [[McGraw 1998 | AA. Bibliography#Mcgraw 98]] | Twelve rules for developing more secure Java code | ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="8ad60ca1f2b8c0eb-003af9df-466d41c2-8761a7e0-8be33c61d445c43f1acabf02"><ac:plain-text-body><![CDATA[ | [[Wheeler 2003 | AA. Bibliography#Wheeler 03]] | [Java | http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/java.html] Secure programming for Linux and Unix HOWTO | ]]></ac:plain-text-body></ac:structured-macro> |
...
OBJ05OBJ11-J. Prevent access to partially initialized objects 04. Object Orientation (OBJ) OBJ07-J. Preserve dependencies in subclasses when changing superclasses