X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_9.res;h=b8489642287e0b97afbd82bc7543769ae7204106;hb=00a47d6d41a68776c4b7199c0c8d67c697875d64;hp=05c0ac8ee0ba3bc1f6e0ba1ef82a78fea691bfeb;hpb=f1200fd1cab4fa57feacd43046997ce2d23edbd5;p=pazpar2-moved-to-github.git diff --git a/test/test_limit_limitmap_9.res b/test/test_limit_limitmap_9.res index 05c0ac8..b848964 100644 --- a/test/test_limit_limitmap_9.res +++ b/test/test_limit_limitmap_9.res @@ -6,276 +6,316 @@ 0 20 - -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -50734 -content: title adobe illustrator for the mac author woodward c michael + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + 1 + 50734 + content: title adobe illustrator for the mac author woodward c michael - -Advanced computer performance modeling and simulation -1998 -Advanced computer performance modeling and simulation -1998 -50734 -content: title advanced computer performance modeling and simulation + Advanced computer performance modeling and simulation + 1998 + + Advanced computer performance modeling and simulation + 1998 + + 1 + 50734 + content: title advanced computer performance modeling and simulation - -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -50734 -content: title cyberterrorism and computer crimes author aldrich richard w + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + 1 + 50734 + content: title cyberterrorism and computer crimes author aldrich richard w - -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -46506 -content: title software design and usability author kaasgaard klaus + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + 1 + 46506 + content: title software design and usability author kaasgaard klaus - -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -44474 -content: title everything you need to know about the dangers of computer hacking author knittel john + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + 1 + 44474 + content: title everything you need to know about the dangers of computer hacking author knittel john - -Computer peripherals -1995 -Cook, Barry M -Computer peripherals -1995 -Cook, Barry M -44392 -content: title computer peripherals author cook barry m + Computer peripherals + 1995 + Cook, Barry M + + Computer peripherals + 1995 + Cook, Barry M + + 1 + 44392 + content: title computer peripherals author cook barry m - -Kids' computer book -1994 -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -Kids' computer book -1994 -"For kids and their parents"--Cover -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -38990 -content: title kids computer book + Kids' computer book + 1994 + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + Kids' computer book + 1994 + "For kids and their parents"--Cover + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + 1 + 38990 + content: title kids computer book - -Computer friendly -1999 -Steinbacher, Raymond -Computer friendly -1999 -Steinbacher, Raymond -38050 -content: title computer friendly author steinbacher raymond + Computer friendly + 1999 + Steinbacher, Raymond + + Computer friendly + 1999 + Steinbacher, Raymond + + 1 + 38050 + content: title computer friendly author steinbacher raymond - -Computer misuse -1999 -"Also published as Parliamentary Paper E 31AO"--T.p. verso -Computer misuse -1999 -"May 1999." -"NZLC R54"--T.p. verso -"Also published as Parliamentary Paper E 31AO"--T.p. verso -38050 -content: title computer misuse + Computer misuse + 1999 + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + Computer misuse + 1999 + "May 1999." + "NZLC R54"--T.p. verso + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + 1 + 38050 + content: title computer misuse - -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -38050 -content: title computer networking author ross keith w + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + 1 + 38050 + content: title computer networking author ross keith w - -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -38050 -content: title coreldraw for windows author davis phyllis + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + 1 + 38050 + content: title coreldraw for windows author davis phyllis - -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -"Covers Quicken deluxe 2000 for the Mac"--Cover -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -Includes index -"Covers Quicken deluxe 2000 for the Mac"--Cover -38050 -content: title quicken for the mac author langer maria + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + "Covers Quicken deluxe 2000 for the Mac"--Cover + + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + Includes index + "Covers Quicken deluxe 2000 for the Mac"--Cover + + 1 + 38050 + content: title quicken for the mac author langer maria - -Sicherheit und Schutz im Netz -1998 -Sicherheit und Schutz im Netz -1998 -38050 -content: title sicherheit und schutz im netz + Sicherheit und Schutz im Netz + 1998 + + Sicherheit und Schutz im Netz + 1998 + + 1 + 38050 + content: title sicherheit und schutz im netz - -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -38050 -content: title unix secure shell author carasik anne h + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + 1 + 38050 + content: title unix secure shell author carasik anne h - -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -35936 -content: title eight international conference on computer communications and networks + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + 1 + 35936 + content: title eight international conference on computer communications and networks - -Building storage networks -2000 -Farley, Marc -Includes index -Building storage networks -2000 -Farley, Marc -Includes index -33822 -content: title building storage networks author farley marc + Building storage networks + 2000 + Farley, Marc + Includes index + + Building storage networks + 2000 + Farley, Marc + Includes index + + 1 + 33822 + content: title building storage networks author farley marc - -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -33822 -content: title complete cl author malaga ernie + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + 1 + 33822 + content: title complete cl author malaga ernie - -3D games -real-time rendering and software technology -2001 -Watt, Alan H -3D games -real-time rendering and software technology -2001 -Watt, Alan H -33822 -content: title d games author watt alan h + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 1 + 33822 + content: title d games author watt alan h - -Java applications strategies for the AS/400 -1999 -Denoncourt, Don -Java applications strategies for the AS/400 -1999 -Denoncourt, Don -33822 -content: title java applications strategies for the as author denoncourt don + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + 1 + 33822 + content: title java applications strategies for the as author denoncourt don - -Mastering algorithms with C -1999 -Loudon, Kyle -"Useful techniques from sorting to encryption"--Cover -Mastering algorithms with C -1999 -Loudon, Kyle -"Useful techniques from sorting to encryption"--Cover -Includes index -33822 -content: title mastering algorithms with c author loudon kyle + Mastering algorithms with C + 1999 + Loudon, Kyle + "Useful techniques from sorting to encryption"--Cover + + Mastering algorithms with C + 1999 + Loudon, Kyle + "Useful techniques from sorting to encryption"--Cover + Includes index + + 1 + 33822 + content: title mastering algorithms with c author loudon kyle \ No newline at end of file