+<md-title>The use of passwords for controlled access to computer resources</md-title>
+<md-date>1977</md-date>
+<md-author>Wood, Helen M</md-author><location id="localhost:9999/db2" name="db2">
+<md-title>The use of passwords for controlled access to computer resources</md-title>
+<md-date>1977</md-date>
+<md-author>Wood, Helen M</md-author></location>
+<relevance>24327</relevance>
+<recid>title the use of passwords for controlled access to computer resources author wood helen m</recid>
+</hit>
+<hit>
+
+<md-title>Deuteronomy</md-title>
+<md-date>1968</md-date>
+<md-author>Oberst, Bruce</md-author><location id="localhost:9999/db2" name="db2">
+<md-title>Deuteronomy</md-title>
+<md-date>1968</md-date>
+<md-author>Oberst, Bruce</md-author></location>
+<relevance>0</relevance>
+<recid>title deuteronomy author oberst bruce</recid>
+</hit>
+<hit>
+
+<md-title>Four psalms</md-title>
+<md-title-remainder>XXIII, XXXVI, LII, CXXI</md-title-remainder>
+<md-date>1980</md-date>
+<md-author>Smith, George Adam</md-author><location id="localhost:9999/db2" name="db2">
+<md-title>Four psalms</md-title>
+<md-title-remainder>XXIII, XXXVI, LII, CXXI</md-title-remainder>
+<md-date>1980</md-date>
+<md-author>Smith, George Adam</md-author></location>
+<relevance>0</relevance>
+<recid>title four psalms author smith george adam</recid>
+</hit>
+<hit>
+
+<md-title>Info Canada</md-title>
+<md-date>1991</md-date>
+<md-description>Title from caption</md-description><location id="localhost:9999/db2" name="db2">
+<md-title>Info Canada</md-title>
+<md-date>1991</md-date>
+<md-description>Title from caption</md-description></location>
+<relevance>0</relevance>
+<recid>title info canada</recid>
+</hit>
+<hit>
+