1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>0</activeclients>
10 <md-title>Adobe Illustrator for the Mac</md-title>
11 <md-title-remainder>fast & easy</md-title-remainder>
12 <md-date>2001</md-date>
13 <md-author>Woodward, C. Michael</md-author><location id="Target-2" name="LOC-SOLR">
14 <md-title>Adobe Illustrator for the Mac</md-title>
15 <md-title-remainder>fast & easy</md-title-remainder>
16 <md-date>2001</md-date>
17 <md-author>Woodward, C. Michael</md-author></location>
18 <relevance>45304</relevance>
19 <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
23 <md-title>Advanced computer performance modeling and simulation</md-title>
24 <md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
25 <md-title>Advanced computer performance modeling and simulation</md-title>
26 <md-date>1998</md-date></location>
27 <relevance>45304</relevance>
28 <recid>content: title advanced computer performance modeling and simulation</recid>
32 <md-title>Cyberterrorism and computer crimes</md-title>
33 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
34 <md-date>2000</md-date>
35 <md-author>Aldrich, Richard W</md-author>
36 <md-description>"April 2000."</md-description><location id="Target-2" name="LOC-SOLR">
37 <md-title>Cyberterrorism and computer crimes</md-title>
38 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
39 <md-date>2000</md-date>
40 <md-author>Aldrich, Richard W</md-author>
41 <md-description>"April 2000."</md-description></location>
42 <relevance>45304</relevance>
43 <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
47 <md-title>Software design and usability</md-title>
48 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
49 <md-date>2000</md-date>
50 <md-author>Kaasgaard, Klaus</md-author><location id="Target-2" name="LOC-SOLR">
51 <md-title>Software design and usability</md-title>
52 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
53 <md-date>2000</md-date>
54 <md-author>Kaasgaard, Klaus</md-author></location>
55 <relevance>41529</relevance>
56 <recid>content: title software design and usability author kaasgaard klaus</recid>
60 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
61 <md-date>2000</md-date>
62 <md-author>Knittel, John</md-author>
63 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="Target-2" name="LOC-SOLR">
64 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
65 <md-date>2000</md-date>
66 <md-author>Knittel, John</md-author>
67 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
68 <relevance>39715</relevance>
69 <recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
73 <md-title>Computer peripherals</md-title>
74 <md-date>1995</md-date>
75 <md-author>Cook, Barry M</md-author><location id="Target-2" name="LOC-SOLR">
76 <md-title>Computer peripherals</md-title>
77 <md-date>1995</md-date>
78 <md-author>Cook, Barry M</md-author></location>
79 <relevance>39641</relevance>
80 <recid>content: title computer peripherals author cook barry m</recid>
84 <md-title>Kids' computer book</md-title>
85 <md-date>1994</md-date>
86 <md-description>Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description><location id="Target-2" name="LOC-SOLR">
87 <md-title>Kids' computer book</md-title>
88 <md-date>1994</md-date>
89 <md-description>"For kids and their parents"--Cover</md-description>
90 <md-description>Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description></location>
91 <relevance>34817</relevance>
92 <recid>content: title kids computer book</recid>
96 <md-title>Computer friendly</md-title>
97 <md-date>1999</md-date>
98 <md-author>Steinbacher, Raymond</md-author><location id="Target-2" name="LOC-SOLR">
99 <md-title>Computer friendly</md-title>
100 <md-date>1999</md-date>
101 <md-author>Steinbacher, Raymond</md-author></location>
102 <relevance>33978</relevance>
103 <recid>content: title computer friendly author steinbacher raymond</recid>
107 <md-title>Computer misuse</md-title>
108 <md-date>1999</md-date>
109 <md-description>"Also published as Parliamentary Paper E 31AO"--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
110 <md-title>Computer misuse</md-title>
111 <md-date>1999</md-date>
112 <md-description>"May 1999."</md-description>
113 <md-description>"NZLC R54"--T.p. verso</md-description>
114 <md-description>"Also published as Parliamentary Paper E 31AO"--T.p. verso</md-description></location>
115 <relevance>33978</relevance>
116 <recid>content: title computer misuse</recid>
120 <md-title>Computer networking</md-title>
121 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
122 <md-date>2001</md-date>
123 <md-author>Ross, Keith W</md-author><location id="Target-2" name="LOC-SOLR">
124 <md-title>Computer networking</md-title>
125 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
126 <md-date>2001</md-date>
127 <md-author>Ross, Keith W</md-author></location>
128 <relevance>33978</relevance>
129 <recid>content: title computer networking author ross keith w</recid>
133 <md-title>CorelDRAW 8 for Windows</md-title>
134 <md-date>1998</md-date>
135 <md-author>Davis, Phyllis</md-author>
136 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
137 <md-title>CorelDRAW 8 for Windows</md-title>
138 <md-date>1998</md-date>
139 <md-author>Davis, Phyllis</md-author>
140 <md-description>Includes index</md-description></location>
141 <relevance>33978</relevance>
142 <recid>content: title coreldraw for windows author davis phyllis</recid>
146 <md-title>Quicken 2000 for the Mac</md-title>
147 <md-title-remainder>the official guide</md-title-remainder>
148 <md-date>2000</md-date>
149 <md-author>Langer, Maria</md-author>
150 <md-description>"Covers Quicken deluxe 2000 for the Mac"--Cover</md-description><location id="Target-2" name="LOC-SOLR">
151 <md-title>Quicken 2000 for the Mac</md-title>
152 <md-title-remainder>the official guide</md-title-remainder>
153 <md-date>2000</md-date>
154 <md-author>Langer, Maria</md-author>
155 <md-description>Includes index</md-description>
156 <md-description>"Covers Quicken deluxe 2000 for the Mac"--Cover</md-description></location>
157 <relevance>33978</relevance>
158 <recid>content: title quicken for the mac author langer maria</recid>
162 <md-title>Sicherheit und Schutz im Netz</md-title>
163 <md-date>1998</md-date><location id="Target-2" name="LOC-SOLR">
164 <md-title>Sicherheit und Schutz im Netz</md-title>
165 <md-date>1998</md-date></location>
166 <relevance>33978</relevance>
167 <recid>content: title sicherheit und schutz im netz</recid>
171 <md-title>Unix Secure Shell</md-title>
172 <md-date>1999</md-date>
173 <md-author>Carasik, Anne H</md-author>
174 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
175 <md-title>Unix Secure Shell</md-title>
176 <md-date>1999</md-date>
177 <md-author>Carasik, Anne H</md-author>
178 <md-description>Includes index</md-description></location>
179 <relevance>33978</relevance>
180 <recid>content: title unix secure shell author carasik anne h</recid>
184 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
185 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
186 <md-date>1999</md-date>
187 <md-description>"IEEE catalog number 99EX370"--T.p. verso</md-description><location id="Target-2" name="LOC-SOLR">
188 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
189 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
190 <md-date>1999</md-date>
191 <md-description>"IEEE catalog number 99EX370"--T.p. verso</md-description></location>
192 <relevance>32090</relevance>
193 <recid>content: title eight international conference on computer communications and networks</recid>
197 <md-title>Building storage networks</md-title>
198 <md-date>2000</md-date>
199 <md-author>Farley, Marc</md-author>
200 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
201 <md-title>Building storage networks</md-title>
202 <md-date>2000</md-date>
203 <md-author>Farley, Marc</md-author>
204 <md-description>Includes index</md-description></location>
205 <relevance>30203</relevance>
206 <recid>content: title building storage networks author farley marc</recid>
210 <md-title>Complete CL</md-title>
211 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
212 <md-date>1999</md-date>
213 <md-author>Malaga, Ernie</md-author>
214 <md-description>Includes index</md-description><location id="Target-2" name="LOC-SOLR">
215 <md-title>Complete CL</md-title>
216 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
217 <md-date>1999</md-date>
218 <md-author>Malaga, Ernie</md-author>
219 <md-description>Includes index</md-description></location>
220 <relevance>30203</relevance>
221 <recid>content: title complete cl author malaga ernie</recid>
225 <md-title>3D games</md-title>
226 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
227 <md-date>2001</md-date>
228 <md-author>Watt, Alan H</md-author><location id="Target-2" name="LOC-SOLR">
229 <md-title>3D games</md-title>
230 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
231 <md-date>2001</md-date>
232 <md-author>Watt, Alan H</md-author></location>
233 <relevance>30203</relevance>
234 <recid>content: title d games author watt alan h</recid>
238 <md-title>Java applications strategies for the AS/400</md-title>
239 <md-date>1999</md-date>
240 <md-author>Denoncourt, Don</md-author><location id="Target-2" name="LOC-SOLR">
241 <md-title>Java applications strategies for the AS/400</md-title>
242 <md-date>1999</md-date>
243 <md-author>Denoncourt, Don</md-author></location>
244 <relevance>30203</relevance>
245 <recid>content: title java applications strategies for the as author denoncourt don</recid>
249 <md-title>Mastering algorithms with C</md-title>
250 <md-date>1999</md-date>
251 <md-author>Loudon, Kyle</md-author>
252 <md-description>"Useful techniques from sorting to encryption"--Cover</md-description><location id="Target-2" name="LOC-SOLR">
253 <md-title>Mastering algorithms with C</md-title>
254 <md-date>1999</md-date>
255 <md-author>Loudon, Kyle</md-author>
256 <md-description>"Useful techniques from sorting to encryption"--Cover</md-description>
257 <md-description>Includes index</md-description></location>
258 <relevance>30203</relevance>
259 <recid>content: title mastering algorithms with c author loudon kyle</recid>