...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a71a5ecc3a82cadc-488cc282-45244202-82ec8213-33dc02d6b29a127c6dab1cb8"><ac:plain-text-body><![CDATA[ | [[Bloch 2005 | AA. Bibliography#Bloch References#Bloch 05]] | Puzzle 41. Field and Stream | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9a493fa8022247cc-b9932bc8-465e42b9-88ec8c2e-fdc97121a12676538d3f9583"><ac:plain-text-body><![CDATA[ | [[Chess 2007 | AA. Bibliography#Chess References#Chess 07]] | 8.3, Preventing Resource Leaks (Java) | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="89d1333ce58959d3-493372da-49ba4c31-825e9b48-6f4df1f3a572e265e2e863d3"><ac:plain-text-body><![CDATA[ | [[Harold 1999 | AA. Bibliography#Harold References#Harold 99]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="dc38102b95914fc6-b6b50024-47a44c52-ac75adfc-1f5726d4ba6b83556d852345"><ac:plain-text-body><![CDATA[ | [[J2SE 2011 | AA. Bibliography#J2SE References#J2SE 11]] | The try-with-resources Statement | ]]></ac:plain-text-body></ac:structured-macro> |
...