...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="7311337aaeefac57-4a1c1396-45794852-88449ffd-f4611d67b8628e833cdaa8e5"><ac:plain-text-body><![CDATA[ | [[Bloch 2008 | AA. Bibliography#Bloch 08]] | Item 39: Make defensive copies when needed | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="af62d6bf033749b3-241dd9a1-4ecb4b39-99b1af84-7d069c26f759d728a528edcd"><ac:plain-text-body><![CDATA[ | [[Pugh 2009 | AA. Bibliography#Pugh 09]] | Returning references to internal mutable state | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="fcd7e77a9762c963-467633ac-4c30456a-b497b9d5-a5dc779aa0e9137611cf15ce"><ac:plain-text-body><![CDATA[ | [[SCG 2007 | AA. Bibliography#SCG 07]] | Guideline 2-1 Create a copy of mutable inputs and outputs | ]]></ac:plain-text-body></ac:structured-macro> |
...
OBJ13-J. Do not expose sensitive private members of an outer class from within a nested class 04. Object Orientation (OBJ) 05. Methods (MET)OBJ15-J. Minimize the accessibility of classes and their members