 
                            ...
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="cd50b8b8db087f0a-16662c24-4fd94dcb-b549bfcb-6939dadf92e6568899d6a44f"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] |  [Method  | http://java.sun.com/javase/6/docs/api/java/lang/Object.html#clone()] | ]]></ac:plain-text-body></ac:structured-macro> | 
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c8bb501986db9529-9b5097a4-47e74d1c-b04baf24-768fae169078df30bf982132"><ac:plain-text-body><![CDATA[ | [[Bloch 2008 | AA. Bibliography#Bloch 08]] | Item 39. Make defensive copies when needed | ]]></ac:plain-text-body></ac:structured-macro> | |
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c50b5602370129a7-0387851d-41dd442b-87178dd6-072ac8dec57cce44aab5ea9d"><ac:plain-text-body><![CDATA[ | [[Goetz 2006 | AA. Bibliography#Goetz 06]] | 3.2, Publication and Escape: Allowing Internal Mutable State to Escape | ]]></ac:plain-text-body></ac:structured-macro> | |
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6c7f4876da891de9-c80a58ae-441a4fe6-bf319f1a-793c95796b50b8cc54466667"><ac:plain-text-body><![CDATA[ | [[Gong 2003 | AA. Bibliography#Gong 03]] | 9.4, Private Object State and Object Immutability | ]]></ac:plain-text-body></ac:structured-macro> | |
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="30ab7b50643a6f3a-00f45ebc-453d41de-975a8517-cae31f2af4f232a6857a231e"><ac:plain-text-body><![CDATA[ | [[Haggar 2000 | AA. Bibliography#Haggar 00]] | [Practical Java Praxis 64. Use clone for immutable objects when passing or receiving object references to mutable objects | http://www.informit.com/articles/article.aspx?p=20530] | ]]></ac:plain-text-body></ac:structured-macro> | 
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d0cad84f5c8a1ad6-68219831-405d451f-bf8a9b8d-a92b8c570a268fd87b735bd8"><ac:plain-text-body><![CDATA[ | [[Security 2006 | AA. Bibliography#Security 06]] | 
 | ]]></ac:plain-text-body></ac:structured-macro> | 
...