X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_24.res;h=64ca61c5f67d578ea79d2af826a90b91cf1f93d6;hb=bebdf398975dfa4fcede406f74e10bb4f2d62f44;hp=5a1147beb008b4f49ea0af25e42641a5dd37cbc7;hpb=bfe528b216abd25cab78d8764a771f1abcc997ec;p=pazpar2-moved-to-github.git diff --git a/test/test_limit_limitmap_24.res b/test/test_limit_limitmap_24.res index 5a1147b..64ca61c 100644 --- a/test/test_limit_limitmap_24.res +++ b/test/test_limit_limitmap_24.res @@ -1,8 +1,261 @@ OK 0 -0 -0 +109 +2025 0 -0 +20 + + +Adobe Illustrator for the Mac +fast & easy +2001 +Woodward, C. Michael +Adobe Illustrator for the Mac +fast & easy +2001 +Woodward, C. Michael +45304 +content: title adobe illustrator for the mac author woodward c michael + + + +Advanced computer performance modeling and simulation +1998 +Advanced computer performance modeling and simulation +1998 +45304 +content: title advanced computer performance modeling and simulation + + + +Cyberterrorism and computer crimes +issues surrounding the establishment of an international regime +2000 +Aldrich, Richard W +"April 2000." +Cyberterrorism and computer crimes +issues surrounding the establishment of an international regime +2000 +Aldrich, Richard W +"April 2000." +45304 +content: title cyberterrorism and computer crimes author aldrich richard w + + + +Software design and usability +talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum +2000 +Kaasgaard, Klaus +Software design and usability +talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum +2000 +Kaasgaard, Klaus +41529 +content: title software design and usability author kaasgaard klaus + + + +Everything you need to know about the dangers of computer hacking +2000 +Knittel, John +Explains what computer hacking is, who does it, and how dangerous it can be +Everything you need to know about the dangers of computer hacking +2000 +Knittel, John +Explains what computer hacking is, who does it, and how dangerous it can be +39715 +content: title everything you need to know about the dangers of computer hacking author knittel john + + + +Computer peripherals +1995 +Cook, Barry M +Computer peripherals +1995 +Cook, Barry M +39641 +content: title computer peripherals author cook barry m + + + +Kids' computer book +1994 +Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children +Kids' computer book +1994 +"For kids and their parents"--Cover +Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children +34817 +content: title kids computer book + + + +Computer friendly +1999 +Steinbacher, Raymond +Computer friendly +1999 +Steinbacher, Raymond +33978 +content: title computer friendly author steinbacher raymond + + + +Computer misuse +1999 +"Also published as Parliamentary Paper E 31AO"--T.p. verso +Computer misuse +1999 +"May 1999." +"NZLC R54"--T.p. verso +"Also published as Parliamentary Paper E 31AO"--T.p. verso +33978 +content: title computer misuse + + + +Computer networking +a top-down approach featuring the Internet +2001 +Ross, Keith W +Computer networking +a top-down approach featuring the Internet +2001 +Ross, Keith W +33978 +content: title computer networking author ross keith w + + + +CorelDRAW 8 for Windows +1998 +Davis, Phyllis +Includes index +CorelDRAW 8 for Windows +1998 +Davis, Phyllis +Includes index +33978 +content: title coreldraw for windows author davis phyllis + + + +Quicken 2000 for the Mac +the official guide +2000 +Langer, Maria +"Covers Quicken deluxe 2000 for the Mac"--Cover +Quicken 2000 for the Mac +the official guide +2000 +Langer, Maria +Includes index +"Covers Quicken deluxe 2000 for the Mac"--Cover +33978 +content: title quicken for the mac author langer maria + + + +Sicherheit und Schutz im Netz +1998 +Sicherheit und Schutz im Netz +1998 +33978 +content: title sicherheit und schutz im netz + + + +Unix Secure Shell +1999 +Carasik, Anne H +Includes index +Unix Secure Shell +1999 +Carasik, Anne H +Includes index +33978 +content: title unix secure shell author carasik anne h + + + +Eight International Conference on Computer Communications and Networks +proceedings, 11-13 October 1999, Boston, Massachusetts +1999 +"IEEE catalog number 99EX370"--T.p. verso +Eight International Conference on Computer Communications and Networks +proceedings, 11-13 October 1999, Boston, Massachusetts +1999 +"IEEE catalog number 99EX370"--T.p. verso +32090 +content: title eight international conference on computer communications and networks + + + +Building storage networks +2000 +Farley, Marc +Includes index +Building storage networks +2000 +Farley, Marc +Includes index +30203 +content: title building storage networks author farley marc + + + +Complete CL +the definitive control language programming guide +1999 +Malaga, Ernie +Includes index +Complete CL +the definitive control language programming guide +1999 +Malaga, Ernie +Includes index +30203 +content: title complete cl author malaga ernie + + + +3D games +real-time rendering and software technology +2001 +Watt, Alan H +3D games +real-time rendering and software technology +2001 +Watt, Alan H +30203 +content: title d games author watt alan h + + + +Java applications strategies for the AS/400 +1999 +Denoncourt, Don +Java applications strategies for the AS/400 +1999 +Denoncourt, Don +30203 +content: title java applications strategies for the as author denoncourt don + + + +Mastering algorithms with C +1999 +Loudon, Kyle +"Useful techniques from sorting to encryption"--Cover +Mastering algorithms with C +1999 +Loudon, Kyle +"Useful techniques from sorting to encryption"--Cover +Includes index +30203 +content: title mastering algorithms with c author loudon kyle + \ No newline at end of file