You are looking at the HTML representation of the XML format.
HTML is good for debugging, but is unsuitable for application use.
Specify the format parameter to change the output format.
To see the non HTML representation of the XML format, set format=xml.
See the complete documentation, or API help for more information.
<?xml version="1.0"?>
    <querypage qpoffset="10" />
    <querypage name="Ancientpages">
        <page value="20100520164037" timestamp="2010-05-20T16:40:37Z" ns="0" title="Glossary" />
        <page value="20100602154726" timestamp="2010-06-02T15:47:26Z" ns="0" title="Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software" />
        <page value="20100602213029" timestamp="2010-06-02T21:30:29Z" ns="0" title="Private Versus Social Incentives in Cybersecurity: Law and Economics" />
        <page value="20100603192908" timestamp="2010-06-03T19:29:08Z" ns="0" title="A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems" />
        <page value="20100604145946" timestamp="2010-06-04T14:59:46Z" ns="0" title="A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security" />
        <page value="20100604150557" timestamp="2010-06-04T15:05:57Z" ns="0" title="Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers" />
        <page value="20100608142258" timestamp="2010-06-08T14:22:58Z" ns="0" title="Economics of Malware: Security Decisions, Incentives and Externalities" />
        <page value="20100608144256" timestamp="2010-06-08T14:42:56Z" ns="0" title="The Law and Economics of Cybersecurity: An Introduction" />
        <page value="20100609154640" timestamp="2010-06-09T15:46:40Z" ns="0" title="Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games" />
        <page value="20100610152817" timestamp="2010-06-10T15:28:17Z" ns="0" title="Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace" />