...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="fd8af722ce165894-811a762e-45044615-98059218-dca86dda71c9d68508d5ac11"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-486 | http://cwe.mitre.org/data/definitions/486.html] "Comparison of Classes by Name" | ]]></ac:plain-text-body></ac:structured-macro> |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="32aa6423e5b9500a-d1e24a95-49804255-8dbc90d0-d49667b0a1db50db4b5693ce"><ac:plain-text-body><![CDATA[ | [[Christudas 2005 | AA. Bibliography#Christudas 05]] | Internals of Java Class Loading | ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="17ff24dbbc402270-be2e478b-4a684a34-8da3a167-1ab22a93985d30c08acffb27"><ac:plain-text-body><![CDATA[ | [[JVMSpec 1999 | AA. Bibliography#JVMSpec 99]] | [§2.8.1 Class Names | http://java.sun.com/docs/books/jvms/second_edition/html/Concepts.doc.html] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="be4b65510631c80b-4868063a-4bb446cf-a7bdbca8-fab21b447c0a99c3c7fdedbd"><ac:plain-text-body><![CDATA[ | [[McGraw 1998 | AA. Bibliography#Mcgraw 98]] | Twelve rules for developing more secure Java code | ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9c10abd8dfa7f9cf-87a77eaf-44ea4db4-81ecb1ec-8ec552e1a9c93056583dd52e"><ac:plain-text-body><![CDATA[ | [[Wheeler 2003 | AA. Bibliography#Wheeler 03]] | [Java | http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/java.html] Secure programming for Linux and Unix HOWTO | ]]></ac:plain-text-body></ac:structured-macro> |
...
OBJ11-J. Prevent access to partially initialized objects 04. Object Orientation (OBJ) OBJ07OBJ13-J. Preserve dependencies in subclasses when changing superclasses