Termlist block test
[pazpar2-moved-to-github.git] / test / test_termlist_block_9.res
1 <?xml version="1.0" encoding="UTF-8"?>
2 <show><status>OK</status>
3 <activeclients>0</activeclients>
4 <merged>100</merged>
5 <total>1043</total>
6 <start>0</start>
7 <num>20</num>
8 <hit>
9
10 <md-title>Adobe Illustrator for the Mac</md-title>
11 <md-title-remainder>fast &amp; easy</md-title-remainder>
12 <md-date>2001</md-date>
13 <md-author>Woodward, C. Michael</md-author><location id="id_solr" name="LOC (SOLR)">
14 <md-title>Adobe Illustrator for the Mac</md-title>
15 <md-title-remainder>fast &amp; easy</md-title-remainder>
16 <md-date>2001</md-date>
17 <md-author>Woodward, C. Michael</md-author></location>
18 <relevance>600000</relevance>
19 <recid>content: title adobe illustrator for the mac author woodward c michael</recid>
20 </hit>
21 <hit>
22
23 <md-title>Advanced computer performance modeling and simulation</md-title>
24 <md-date>1998</md-date><location id="id_solr" name="LOC (SOLR)">
25 <md-title>Advanced computer performance modeling and simulation</md-title>
26 <md-date>1998</md-date></location>
27 <relevance>600000</relevance>
28 <recid>content: title advanced computer performance modeling and simulation</recid>
29 </hit>
30 <hit>
31
32 <md-title>Computer security</md-title>
33 <md-title-remainder>FAA needs to improve controls over use of foreign nationals to remediate and review software : report to the Chairman, Committee on Science, House of Representatives</md-title-remainder>
34 <md-date>1999</md-date>
35 <md-description>&quot;GAO/AIMD-00-55.&quot;</md-description><location id="id_solr" name="LOC (SOLR)">
36 <md-title>Computer security</md-title>
37 <md-title-remainder>FAA needs to improve controls over use of foreign nationals to remediate and review software : report to the Chairman, Committee on Science, House of Representatives</md-title-remainder>
38 <md-date>1999</md-date>
39 <md-description>Cover title</md-description>
40 <md-description>&quot;December 1999.&quot;</md-description>
41 <md-description>&quot;GAO/AIMD-00-55.&quot;</md-description>
42 <md-description>&quot;B-284308&quot;--P. 1</md-description></location>
43 <relevance>600000</relevance>
44 <recid>content: title computer security</recid>
45 </hit>
46 <hit>
47
48 <md-title>Cyberterrorism and computer crimes</md-title>
49 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
50 <md-date>2000</md-date>
51 <md-author>Aldrich, Richard W</md-author>
52 <md-description>&quot;April 2000.&quot;</md-description><location id="id_solr" name="LOC (SOLR)">
53 <md-title>Cyberterrorism and computer crimes</md-title>
54 <md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
55 <md-date>2000</md-date>
56 <md-author>Aldrich, Richard W</md-author>
57 <md-description>&quot;April 2000.&quot;</md-description></location>
58 <relevance>600000</relevance>
59 <recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
60 </hit>
61 <hit>
62
63 <md-title>Software design and usability</md-title>
64 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
65 <md-date>2000</md-date>
66 <md-author>Kaasgaard, Klaus</md-author><location id="id_solr" name="LOC (SOLR)">
67 <md-title>Software design and usability</md-title>
68 <md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson &amp; Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
69 <md-date>2000</md-date>
70 <md-author>Kaasgaard, Klaus</md-author></location>
71 <relevance>550000</relevance>
72 <recid>content: title software design and usability author kaasgaard klaus</recid>
73 </hit>
74 <hit>
75
76 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
77 <md-date>2000</md-date>
78 <md-author>Knittel, John</md-author>
79 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="id_solr" name="LOC (SOLR)">
80 <md-title>Everything you need to know about the dangers of computer hacking</md-title>
81 <md-date>2000</md-date>
82 <md-author>Knittel, John</md-author>
83 <md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
84 <relevance>525974</relevance>
85 <recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
86 </hit>
87 <hit>
88
89 <md-title>Computer and Internet liability</md-title>
90 <md-title-remainder>strategies, claims, and defenses</md-title-remainder>
91 <md-date>2000</md-date>
92 <md-author>Williams, Richard D</md-author>
93 <md-description>Rev. ed. of: Law of the year 2000 problem. c1999-</md-description><location id="id_solr" name="LOC (SOLR)">
94 <md-title>Computer and Internet liability</md-title>
95 <md-title-remainder>strategies, claims, and defenses</md-title-remainder>
96 <md-date>2000</md-date>
97 <md-author>Williams, Richard D</md-author>
98 <md-description>Rev. ed. of: Law of the year 2000 problem. c1999-</md-description>
99 <md-description>Includes index</md-description></location>
100 <relevance>450000</relevance>
101 <recid>content: title computer and internet liability author williams richard d</recid>
102 </hit>
103 <hit>
104
105 <md-title>CorelDRAW 8 for Windows</md-title>
106 <md-date>1998</md-date>
107 <md-author>Davis, Phyllis</md-author>
108 <md-description>Includes index</md-description><location id="id_solr" name="LOC (SOLR)">
109 <md-title>CorelDRAW 8 for Windows</md-title>
110 <md-date>1998</md-date>
111 <md-author>Davis, Phyllis</md-author>
112 <md-description>Includes index</md-description></location>
113 <relevance>450000</relevance>
114 <recid>content: title coreldraw for windows author davis phyllis</recid>
115 </hit>
116 <hit>
117
118 <md-title>Inside 3ds max 4</md-title>
119 <md-date>2002</md-date>
120 <md-description>The accompanying CD-ROM contains all the files needed to complete the exercises contained in the book and links to third-party programs</md-description><location id="id_solr" name="LOC (SOLR)">
121 <md-title>Inside 3ds max 4</md-title>
122 <md-date>2002</md-date>
123 <md-description>Includes index</md-description>
124 <md-description>The accompanying CD-ROM contains all the files needed to complete the exercises contained in the book and links to third-party programs</md-description></location>
125 <relevance>450000</relevance>
126 <recid>content: title inside ds max</recid>
127 </hit>
128 <hit>
129
130 <md-title>Quicken 2000 for the Mac</md-title>
131 <md-title-remainder>the official guide</md-title-remainder>
132 <md-date>2000</md-date>
133 <md-author>Langer, Maria</md-author>
134 <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description><location id="id_solr" name="LOC (SOLR)">
135 <md-title>Quicken 2000 for the Mac</md-title>
136 <md-title-remainder>the official guide</md-title-remainder>
137 <md-date>2000</md-date>
138 <md-author>Langer, Maria</md-author>
139 <md-description>Includes index</md-description>
140 <md-description>&quot;Covers Quicken deluxe 2000 for the Mac&quot;--Cover</md-description></location>
141 <relevance>450000</relevance>
142 <recid>content: title quicken for the mac author langer maria</recid>
143 </hit>
144 <hit>
145
146 <md-title>Sicherheit und Schutz im Netz</md-title>
147 <md-date>1998</md-date><location id="id_solr" name="LOC (SOLR)">
148 <md-title>Sicherheit und Schutz im Netz</md-title>
149 <md-date>1998</md-date></location>
150 <relevance>450000</relevance>
151 <recid>content: title sicherheit und schutz im netz</recid>
152 </hit>
153 <hit>
154
155 <md-title>Unix Secure Shell</md-title>
156 <md-date>1999</md-date>
157 <md-author>Carasik, Anne H</md-author>
158 <md-description>Includes index</md-description><location id="id_solr" name="LOC (SOLR)">
159 <md-title>Unix Secure Shell</md-title>
160 <md-date>1999</md-date>
161 <md-author>Carasik, Anne H</md-author>
162 <md-description>Includes index</md-description></location>
163 <relevance>450000</relevance>
164 <recid>content: title unix secure shell author carasik anne h</recid>
165 </hit>
166 <hit>
167
168 <md-title>www.StopThief.net</md-title>
169 <md-title-remainder>protecting your identity on the Web</md-title-remainder>
170 <md-date>1999</md-date>
171 <md-author>Marcella, Albert J</md-author><location id="id_solr" name="LOC (SOLR)">
172 <md-title>www.StopThief.net</md-title>
173 <md-title-remainder>protecting your identity on the Web</md-title-remainder>
174 <md-date>1999</md-date>
175 <md-author>Marcella, Albert J</md-author></location>
176 <relevance>450000</relevance>
177 <recid>content: title www stopthief net author marcella albert j</recid>
178 </hit>
179 <hit>
180
181 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
182 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
183 <md-date>1999</md-date>
184 <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description><location id="id_solr" name="LOC (SOLR)">
185 <md-title>Eight International Conference on Computer Communications and Networks</md-title>
186 <md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
187 <md-date>1999</md-date>
188 <md-description>&quot;IEEE catalog number 99EX370&quot;--T.p. verso</md-description></location>
189 <relevance>425000</relevance>
190 <recid>content: title eight international conference on computer communications and networks</recid>
191 </hit>
192 <hit>
193
194 <md-title>Building storage networks</md-title>
195 <md-date>2000</md-date>
196 <md-author>Farley, Marc</md-author>
197 <md-description>Includes index</md-description><location id="id_solr" name="LOC (SOLR)">
198 <md-title>Building storage networks</md-title>
199 <md-date>2000</md-date>
200 <md-author>Farley, Marc</md-author>
201 <md-description>Includes index</md-description></location>
202 <relevance>400000</relevance>
203 <recid>content: title building storage networks author farley marc</recid>
204 </hit>
205 <hit>
206
207 <md-title>3D games</md-title>
208 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
209 <md-date>2001</md-date>
210 <md-author>Watt, Alan H</md-author><location id="id_solr" name="LOC (SOLR)">
211 <md-title>3D games</md-title>
212 <md-title-remainder>real-time rendering and software technology</md-title-remainder>
213 <md-date>2001</md-date>
214 <md-author>Watt, Alan H</md-author></location>
215 <relevance>400000</relevance>
216 <recid>content: title d games author watt alan h</recid>
217 </hit>
218 <hit>
219
220 <md-title>Mastering algorithms with C</md-title>
221 <md-date>1999</md-date>
222 <md-author>Loudon, Kyle</md-author>
223 <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description><location id="id_solr" name="LOC (SOLR)">
224 <md-title>Mastering algorithms with C</md-title>
225 <md-date>1999</md-date>
226 <md-author>Loudon, Kyle</md-author>
227 <md-description>&quot;Useful techniques from sorting to encryption&quot;--Cover</md-description>
228 <md-description>Includes index</md-description></location>
229 <relevance>400000</relevance>
230 <recid>content: title mastering algorithms with c author loudon kyle</recid>
231 </hit>
232 <hit>
233
234 <md-title>Oracle8i Java component programming with EJB, CORBA, and JSP</md-title>
235 <md-date>2000</md-date>
236 <md-author>Morisseau-Leroy, Nirva</md-author>
237 <md-description>CD-ROM includes resources mentioned in the book, electronic versions of the appendices, plus sample JSP &amp; servlet programs</md-description><location id="id_solr" name="LOC (SOLR)">
238 <md-title>Oracle8i Java component programming with EJB, CORBA, and JSP</md-title>
239 <md-date>2000</md-date>
240 <md-author>Morisseau-Leroy, Nirva</md-author>
241 <md-description>&quot;Covers Oracle database releases 8.1.5, 8.1.6, and 8.1.7.&quot;</md-description>
242 <md-description>CD-ROM includes resources mentioned in the book, electronic versions of the appendices, plus sample JSP &amp; servlet programs</md-description></location>
243 <relevance>400000</relevance>
244 <recid>content: title oracle i java component programming with ejb corba and jsp author morisseau leroy nirva</recid>
245 </hit>
246 <hit>
247
248 <md-title>Oracle SQL*Plus</md-title>
249 <md-title-remainder>pocket reference</md-title-remainder>
250 <md-date>2000</md-date>
251 <md-author>Gennick, Jonathan</md-author>
252 <md-description>&quot;Guide to SQL*Plus syntax&quot;--cover</md-description><location id="id_solr" name="LOC (SOLR)">
253 <md-title>Oracle SQL*Plus</md-title>
254 <md-title-remainder>pocket reference</md-title-remainder>
255 <md-date>2000</md-date>
256 <md-author>Gennick, Jonathan</md-author>
257 <md-description>&quot;Covers Oracle8i&quot;--cover</md-description>
258 <md-description>&quot;Guide to SQL*Plus syntax&quot;--cover</md-description></location>
259 <relevance>400000</relevance>
260 <recid>content: title oracle sql plus author gennick jonathan</recid>
261 </hit>
262 <hit>
263
264 <md-title>Programming Web graphics with PERL and GNU software</md-title>
265 <md-date>1999</md-date>
266 <md-author>Wallace, Shawn P</md-author><location id="id_solr" name="LOC (SOLR)">
267 <md-title>Programming Web graphics with PERL and GNU software</md-title>
268 <md-date>1999</md-date>
269 <md-author>Wallace, Shawn P</md-author></location>
270 <relevance>400000</relevance>
271 <recid>content: title programming web graphics with perl and gnu software author wallace shawn p</recid>
272 </hit>
273 </show>