1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>0</activeclients>
9 <md-title>Adobe Illustrator for the Mac</md-title>
10 <md-title-remainder>fast & easy</md-title-remainder>
11 <md-date>2001</md-date>
12 <md-author>Woodward, C. Michael</md-author>
13 <location id="id_solr"
14 name="LOC (SOLR)" checksum="1471384697">
15 <md-title>Adobe Illustrator for the Mac</md-title>
16 <md-title-remainder>fast & easy</md-title-remainder>
17 <md-date>2001</md-date>
18 <md-author>Woodward, C. Michael</md-author>
21 <relevance>105534</relevance>
22 <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
25 <md-title>Advanced computer performance modeling and simulation</md-title>
26 <md-date>1998</md-date>
27 <location id="id_solr"
28 name="LOC (SOLR)" checksum="3924860916">
29 <md-title>Advanced computer performance modeling and simulation</md-title>
30 <md-date>1998</md-date>
33 <relevance>105534</relevance>
34 <recid>content: title advanced computer performance modeling and simulation</recid>
37 <md-title>Cyberterrorism and computer crimes</md-title>
38 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
39 <md-date>2000</md-date>
40 <md-author>Aldrich, Richard W</md-author>
41 <md-description>"April 2000."</md-description>
42 <location id="id_solr"
43 name="LOC (SOLR)" checksum="2501955422">
44 <md-title>Cyberterrorism and computer crimes</md-title>
45 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
46 <md-date>2000</md-date>
47 <md-author>Aldrich, Richard W</md-author>
48 <md-description>"April 2000."</md-description>
51 <relevance>105534</relevance>
52 <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
55 <md-title>Software design and usability</md-title>
56 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
57 <md-date>2000</md-date>
58 <md-author>Kaasgaard, Klaus</md-author>
59 <location id="id_solr"
60 name="LOC (SOLR)" checksum="514030763">
61 <md-title>Software design and usability</md-title>
62 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
63 <md-date>2000</md-date>
64 <md-author>Kaasgaard, Klaus</md-author>
67 <relevance>96739</relevance>
68 <recid>content: title software design and usability author kaasgaard klaus</recid>
71 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
72 <md-date>2000</md-date>
73 <md-author>Knittel, John</md-author>
74 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description>
75 <location id="id_solr"
76 name="LOC (SOLR)" checksum="440813972">
77 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
78 <md-date>2000</md-date>
79 <md-author>Knittel, John</md-author>
80 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description>
83 <relevance>92513</relevance>
84 <recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
87 <md-title>Computer peripherals</md-title>
88 <md-date>1995</md-date>
89 <md-author>Cook, Barry M</md-author>
90 <location id="id_solr"
91 name="LOC (SOLR)" checksum="3558776961">
92 <md-title>Computer peripherals</md-title>
93 <md-date>1995</md-date>
94 <md-author>Cook, Barry M</md-author>
97 <relevance>92342</relevance>
98 <recid>content: title computer peripherals author cook barry m</recid>
101 <md-title>Kids' computer book</md-title>
102 <md-date>1994</md-date>
103 <md-description>Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description>
104 <location id="id_solr"
105 name="LOC (SOLR)" checksum="2747856609">
106 <md-title>Kids' computer book</md-title>
107 <md-date>1994</md-date>
108 <md-description>"For kids and their parents"--Cover</md-description>
109 <md-description>Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children</md-description>
112 <relevance>81105</relevance>
113 <recid>content: title kids computer book</recid>
116 <md-title>Computer friendly</md-title>
117 <md-date>1999</md-date>
118 <md-author>Steinbacher, Raymond</md-author>
119 <location id="id_solr"
120 name="LOC (SOLR)" checksum="194912785">
121 <md-title>Computer friendly</md-title>
122 <md-date>1999</md-date>
123 <md-author>Steinbacher, Raymond</md-author>
126 <relevance>79150</relevance>
127 <recid>content: title computer friendly author steinbacher raymond</recid>
130 <md-title>Computer misuse</md-title>
131 <md-date>1999</md-date>
132 <md-description>"Also published as Parliamentary Paper E 31AO"--T.p. verso</md-description>
133 <location id="id_solr"
134 name="LOC (SOLR)" checksum="268129576">
135 <md-title>Computer misuse</md-title>
136 <md-date>1999</md-date>
137 <md-description>"May 1999."</md-description>
138 <md-description>"NZLC R54"--T.p. verso</md-description>
139 <md-description>"Also published as Parliamentary Paper E 31AO"--T.p. verso</md-description>
142 <relevance>79150</relevance>
143 <recid>content: title computer misuse</recid>
146 <md-title>Computer networking</md-title>
147 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
148 <md-date>2001</md-date>
149 <md-author>Ross, Keith W</md-author>
150 <location id="id_solr"
151 name="LOC (SOLR)" checksum="3485560170">
152 <md-title>Computer networking</md-title>
153 <md-title-remainder>a top-down approach featuring the Internet</md-title-remainder>
154 <md-date>2001</md-date>
155 <md-author>Ross, Keith W</md-author>
158 <relevance>79150</relevance>
159 <recid>content: title computer networking author ross keith w</recid>
162 <md-title>CorelDRAW 8 for Windows</md-title>
163 <md-date>1998</md-date>
164 <md-author>Davis, Phyllis</md-author>
165 <md-description>Includes index</md-description>
166 <location id="id_solr"
167 name="LOC (SOLR)" checksum="1570852302">
168 <md-title>CorelDRAW 8 for Windows</md-title>
169 <md-date>1998</md-date>
170 <md-author>Davis, Phyllis</md-author>
171 <md-description>Includes index</md-description>
174 <relevance>79150</relevance>
175 <recid>content: title coreldraw for windows author davis phyllis</recid>
178 <md-title>Quicken 2000 for the Mac</md-title>
179 <md-title-remainder>the official guide</md-title-remainder>
180 <md-date>2000</md-date>
181 <md-author>Langer, Maria</md-author>
182 <md-description>"Covers Quicken deluxe 2000 for the Mac"--Cover</md-description>
183 <location id="id_solr"
184 name="LOC (SOLR)" checksum="3705210543">
185 <md-title>Quicken 2000 for the Mac</md-title>
186 <md-title-remainder>the official guide</md-title-remainder>
187 <md-date>2000</md-date>
188 <md-author>Langer, Maria</md-author>
189 <md-description>Includes index</md-description>
190 <md-description>"Covers Quicken deluxe 2000 for the Mac"--Cover</md-description>
193 <relevance>79150</relevance>
194 <recid>content: title quicken for the mac author langer maria</recid>
197 <md-title>Sicherheit und Schutz im Netz</md-title>
198 <md-date>1998</md-date>
199 <location id="id_solr"
200 name="LOC (SOLR)" checksum="932616346">
201 <md-title>Sicherheit und Schutz im Netz</md-title>
202 <md-date>1998</md-date>
205 <relevance>79150</relevance>
206 <recid>content: title sicherheit und schutz im netz</recid>
209 <md-title>Unix Secure Shell</md-title>
210 <md-date>1999</md-date>
211 <md-author>Carasik, Anne H</md-author>
212 <md-description>Includes index</md-description>
213 <location id="id_solr"
214 name="LOC (SOLR)" checksum="2109620653">
215 <md-title>Unix Secure Shell</md-title>
216 <md-date>1999</md-date>
217 <md-author>Carasik, Anne H</md-author>
218 <md-description>Includes index</md-description>
221 <relevance>79150</relevance>
222 <recid>content: title unix secure shell author carasik anne h</recid>
225 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
226 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
227 <md-date>1999</md-date>
228 <md-description>"IEEE catalog number 99EX370"--T.p. verso</md-description>
229 <location id="id_solr"
230 name="LOC (SOLR)" checksum="759931950">
231 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
232 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
233 <md-date>1999</md-date>
234 <md-description>"IEEE catalog number 99EX370"--T.p. verso</md-description>
237 <relevance>74753</relevance>
238 <recid>content: title eight international conference on computer communications and networks</recid>
241 <md-title>Building storage networks</md-title>
242 <md-date>2000</md-date>
243 <md-author>Farley, Marc</md-author>
244 <md-description>Includes index</md-description>
245 <location id="id_solr"
246 name="LOC (SOLR)" checksum="2282305049">
247 <md-title>Building storage networks</md-title>
248 <md-date>2000</md-date>
249 <md-author>Farley, Marc</md-author>
250 <md-description>Includes index</md-description>
253 <relevance>70356</relevance>
254 <recid>content: title building storage networks author farley marc</recid>
257 <md-title>Complete CL</md-title>
258 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
259 <md-date>1999</md-date>
260 <md-author>Malaga, Ernie</md-author>
261 <md-description>Includes index</md-description>
262 <location id="id_solr"
263 name="LOC (SOLR)" checksum="2036403862">
264 <md-title>Complete CL</md-title>
265 <md-title-remainder>the definitive control language programming guide</md-title-remainder>
266 <md-date>1999</md-date>
267 <md-author>Malaga, Ernie</md-author>
268 <md-description>Includes index</md-description>
271 <relevance>70356</relevance>
272 <recid>content: title complete cl author malaga ernie</recid>
275 <md-title>3D games</md-title>
276 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
277 <md-date>2001</md-date>
278 <md-author>Watt, Alan H</md-author>
279 <location id="id_solr"
280 name="LOC (SOLR)" checksum="3459309356">
281 <md-title>3D games</md-title>
282 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
283 <md-date>2001</md-date>
284 <md-author>Watt, Alan H</md-author>
287 <relevance>70356</relevance>
288 <recid>content: title d games author watt alan h</recid>
291 <md-title>Internet world</md-title>
292 <md-date>1992</md-date>
293 <md-description>Title from caption</md-description>
294 <location id="localhost:9999/db1"
295 name="db1" checksum="2093092631">
296 <md-title>Internet world</md-title>
297 <md-date>1992</md-date>
298 <md-description>Title from caption</md-description>
301 <relevance>70356</relevance>
302 <recid>content: title internet world</recid>
305 <md-title>Java applications strategies for the AS/400</md-title>
306 <md-date>1999</md-date>
307 <md-author>Denoncourt, Don</md-author>
308 <location id="id_solr"
309 name="LOC (SOLR)" checksum="3239658983">
310 <md-title>Java applications strategies for the AS/400</md-title>
311 <md-date>1999</md-date>
312 <md-author>Denoncourt, Don</md-author>
315 <relevance>70356</relevance>
316 <recid>content: title java applications strategies for the as author denoncourt don</recid>