X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_limit_limitmap_9.res;h=b8489642287e0b97afbd82bc7543769ae7204106;hb=8f5314e5df398db5477d23cb1ed4b5f5745f6ada;hp=3521921ce872f91a5a2e28d080d5047b5c96503f;hpb=bfe528b216abd25cab78d8764a771f1abcc997ec;p=pazpar2-moved-to-github.git diff --git a/test/test_limit_limitmap_9.res b/test/test_limit_limitmap_9.res index 3521921..b848964 100644 --- a/test/test_limit_limitmap_9.res +++ b/test/test_limit_limitmap_9.res @@ -6,257 +6,316 @@ 0 20 - -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -39450 -content: title adobe illustrator for the mac author woodward c michael + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + 1 + 50734 + content: title adobe illustrator for the mac author woodward c michael - -Advanced computer performance modeling and simulation -1998 -Advanced computer performance modeling and simulation -1998 -39450 -content: title advanced computer performance modeling and simulation + Advanced computer performance modeling and simulation + 1998 + + Advanced computer performance modeling and simulation + 1998 + + 1 + 50734 + content: title advanced computer performance modeling and simulation - -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -39450 -content: title cyberterrorism and computer crimes author aldrich richard w + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + 1 + 50734 + content: title cyberterrorism and computer crimes author aldrich richard w - -Computer interfacing -2000 -Smith, George A -Computer interfacing -2000 -Smith, George A -36163 -content: title computer interfacing author smith george a + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + 1 + 46506 + content: title software design and usability author kaasgaard klaus - -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -36163 -content: title software design and usability author kaasgaard klaus + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + 1 + 44474 + content: title everything you need to know about the dangers of computer hacking author knittel john - -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -34583 -content: title everything you need to know about the dangers of computer hacking author knittel john + Computer peripherals + 1995 + Cook, Barry M + + Computer peripherals + 1995 + Cook, Barry M + + 1 + 44392 + content: title computer peripherals author cook barry m - -Computer peripherals -1995 -Cook, Barry M -Computer peripherals -1995 -Cook, Barry M -34519 -content: title computer peripherals author cook barry m + Kids' computer book + 1994 + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + Kids' computer book + 1994 + "For kids and their parents"--Cover + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + 1 + 38990 + content: title kids computer book - -Kids' computer book -1994 -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -Kids' computer book -1994 -"For kids and their parents"--Cover -Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children -30318 -content: title kids computer book + Computer friendly + 1999 + Steinbacher, Raymond + + Computer friendly + 1999 + Steinbacher, Raymond + + 1 + 38050 + content: title computer friendly author steinbacher raymond - -Computer friendly -1999 -Steinbacher, Raymond -Computer friendly -1999 -Steinbacher, Raymond -29588 -content: title computer friendly author steinbacher raymond + Computer misuse + 1999 + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + Computer misuse + 1999 + "May 1999." + "NZLC R54"--T.p. verso + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + 1 + 38050 + content: title computer misuse - -Computer misuse -1999 -"Also published as Parliamentary Paper E 31AO"--T.p. verso -Computer misuse -1999 -"May 1999." -"NZLC R54"--T.p. verso -"Also published as Parliamentary Paper E 31AO"--T.p. verso -29588 -content: title computer misuse + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + 1 + 38050 + content: title computer networking author ross keith w - -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -Computer networking -a top-down approach featuring the Internet -2001 -Ross, Keith W -29588 -content: title computer networking author ross keith w + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + 1 + 38050 + content: title coreldraw for windows author davis phyllis - -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -29588 -content: title coreldraw for windows author davis phyllis + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + "Covers Quicken deluxe 2000 for the Mac"--Cover + + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + Includes index + "Covers Quicken deluxe 2000 for the Mac"--Cover + + 1 + 38050 + content: title quicken for the mac author langer maria - -Quicken 2001 Deluxe for Macintosh -the official guide -2001 -Langer, Maria -Includes index -Quicken 2001 Deluxe for Macintosh -the official guide -2001 -Langer, Maria -Includes index -29588 -content: title quicken deluxe for macintosh author langer maria + Sicherheit und Schutz im Netz + 1998 + + Sicherheit und Schutz im Netz + 1998 + + 1 + 38050 + content: title sicherheit und schutz im netz - -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -"Covers Quicken deluxe 2000 for the Mac"--Cover -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -Includes index -"Covers Quicken deluxe 2000 for the Mac"--Cover -29588 -content: title quicken for the mac author langer maria + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + 1 + 38050 + content: title unix secure shell author carasik anne h - -Sicherheit und Schutz im Netz -1998 -Sicherheit und Schutz im Netz -1998 -29588 -content: title sicherheit und schutz im netz + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + 1 + 35936 + content: title eight international conference on computer communications and networks - -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -29588 -content: title unix secure shell author carasik anne h + Building storage networks + 2000 + Farley, Marc + Includes index + + Building storage networks + 2000 + Farley, Marc + Includes index + + 1 + 33822 + content: title building storage networks author farley marc - -www.StopThief.net -protecting your identity on the Web -1999 -Marcella, Albert J -www.StopThief.net -protecting your identity on the Web -1999 -Marcella, Albert J -29588 -content: title www stopthief net author marcella albert j + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + 1 + 33822 + content: title complete cl author malaga ernie - -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -27944 -content: title eight international conference on computer communications and networks + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 1 + 33822 + content: title d games author watt alan h - -Building storage networks -2000 -Farley, Marc -Includes index -Building storage networks -2000 -Farley, Marc -Includes index -26300 -content: title building storage networks author farley marc + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + 1 + 33822 + content: title java applications strategies for the as author denoncourt don - -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -Complete CL -the definitive control language programming guide -1999 -Malaga, Ernie -Includes index -26300 -content: title complete cl author malaga ernie + Mastering algorithms with C + 1999 + Loudon, Kyle + "Useful techniques from sorting to encryption"--Cover + + Mastering algorithms with C + 1999 + Loudon, Kyle + "Useful techniques from sorting to encryption"--Cover + Includes index + + 1 + 33822 + content: title mastering algorithms with c author loudon kyle \ No newline at end of file