 
                            ...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
| <ac:structured-macro ac:name="unmigrated-wiki-markup | 
...
| " ac:schema-version="1" ac:macro-id="62578b07-e5d1-4f26-beb5-4b64199f4e7a"><ac:plain-text-body><![CDATA[ | [[Dormann | 
...
| 2008 | 
...
| AA. | 
...
| Bibliography#Dormann | 
...
| 08] | 
...
| ] | 
 | ]]></ac:plain-text-body></ac:structured-macro> | ||
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="7942d039-6062-46cb-8fd5-a4209db4e58b"><ac:plain-text-body><![CDATA[ | [[McGraw 1999 | AA. Bibliography#McGraw 99]] | Appendix C: Sign Only Privileged Code | ]]></ac:plain-text-body></ac:structured-macro> | 
| <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="79e93d50-da72-4c75-888c-f63999a8d101"><ac:plain-text-body><![CDATA[ | [[Schneier 2000 | AA. Bibliography#Schneier 00]] | 
 | ]]></ac:plain-text-body></ac:structured-macro> | 
...