X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_termlist_block_9.res;h=1d820c72d06234c5b0de227b3a2714fc51184d9b;hb=8f18ee1ba68a1fb0efa37729ac6422d96fdd36a1;hp=53e98fc77ee7f9388c1e2eba348a088115fa342a;hpb=bdbf85498a31f6d8b3081032e638df67958ef0f7;p=pazpar2-moved-to-github.git diff --git a/test/test_termlist_block_9.res b/test/test_termlist_block_9.res index 53e98fc..1d820c7 100644 --- a/test/test_termlist_block_9.res +++ b/test/test_termlist_block_9.res @@ -1,273 +1,318 @@ OK 0 -100 -1043 +122 +2038 0 20 - -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -Adobe Illustrator for the Mac -fast & easy -2001 -Woodward, C. Michael -600000 -content: title adobe illustrator for the mac author woodward c michael + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + Adobe Illustrator for the Mac + fast & easy + 2001 + Woodward, C. Michael + + 1 + 105534 + content: title adobe illustrator for the mac author woodward c michael - -Advanced computer performance modeling and simulation -1998 -Advanced computer performance modeling and simulation -1998 -600000 -content: title advanced computer performance modeling and simulation + Advanced computer performance modeling and simulation + 1998 + + Advanced computer performance modeling and simulation + 1998 + + 1 + 105534 + content: title advanced computer performance modeling and simulation - -Computer security -FAA needs to improve controls over use of foreign nationals to remediate and review software : report to the Chairman, Committee on Science, House of Representatives -1999 -"GAO/AIMD-00-55." -Computer security -FAA needs to improve controls over use of foreign nationals to remediate and review software : report to the Chairman, Committee on Science, House of Representatives -1999 -Cover title -"December 1999." -"GAO/AIMD-00-55." -"B-284308"--P. 1 -600000 -content: title computer security + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + Cyberterrorism and computer crimes + issues surrounding the establishment of an international regime + 2000 + Aldrich, Richard W + "April 2000." + + 1 + 105534 + content: title cyberterrorism and computer crimes author aldrich richard w - -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -Cyberterrorism and computer crimes -issues surrounding the establishment of an international regime -2000 -Aldrich, Richard W -"April 2000." -600000 -content: title cyberterrorism and computer crimes author aldrich richard w + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + Software design and usability + talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum + 2000 + Kaasgaard, Klaus + + 1 + 96739 + content: title software design and usability author kaasgaard klaus - -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -Software design and usability -talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum -2000 -Kaasgaard, Klaus -550000 -content: title software design and usability author kaasgaard klaus + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + Everything you need to know about the dangers of computer hacking + 2000 + Knittel, John + Explains what computer hacking is, who does it, and how dangerous it can be + + 1 + 92513 + content: title everything you need to know about the dangers of computer hacking author knittel john - -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -Everything you need to know about the dangers of computer hacking -2000 -Knittel, John -Explains what computer hacking is, who does it, and how dangerous it can be -525974 -content: title everything you need to know about the dangers of computer hacking author knittel john + Computer peripherals + 1995 + Cook, Barry M + + Computer peripherals + 1995 + Cook, Barry M + + 1 + 92342 + content: title computer peripherals author cook barry m - -Computer and Internet liability -strategies, claims, and defenses -2000 -Williams, Richard D -Rev. ed. of: Law of the year 2000 problem. c1999- -Computer and Internet liability -strategies, claims, and defenses -2000 -Williams, Richard D -Rev. ed. of: Law of the year 2000 problem. c1999- -Includes index -450000 -content: title computer and internet liability author williams richard d + Kids' computer book + 1994 + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + Kids' computer book + 1994 + "For kids and their parents"--Cover + Discusses a variety of educational and game software for children with suggestions for setting up a computer system. Includes a 3 1/2 in. disk with 6 shareware programs for children + + 1 + 81105 + content: title kids computer book - -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -CorelDRAW 8 for Windows -1998 -Davis, Phyllis -Includes index -450000 -content: title coreldraw for windows author davis phyllis + Computer friendly + 1999 + Steinbacher, Raymond + + Computer friendly + 1999 + Steinbacher, Raymond + + 1 + 79150 + content: title computer friendly author steinbacher raymond - -Inside 3ds max 4 -2002 -The accompanying CD-ROM contains all the files needed to complete the exercises contained in the book and links to third-party programs -Inside 3ds max 4 -2002 -Includes index -The accompanying CD-ROM contains all the files needed to complete the exercises contained in the book and links to third-party programs -450000 -content: title inside ds max + Computer misuse + 1999 + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + Computer misuse + 1999 + "May 1999." + "NZLC R54"--T.p. verso + "Also published as Parliamentary Paper E 31AO"--T.p. verso + + 1 + 79150 + content: title computer misuse - -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -"Covers Quicken deluxe 2000 for the Mac"--Cover -Quicken 2000 for the Mac -the official guide -2000 -Langer, Maria -Includes index -"Covers Quicken deluxe 2000 for the Mac"--Cover -450000 -content: title quicken for the mac author langer maria + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + Computer networking + a top-down approach featuring the Internet + 2001 + Ross, Keith W + + 1 + 79150 + content: title computer networking author ross keith w - -Sicherheit und Schutz im Netz -1998 -Sicherheit und Schutz im Netz -1998 -450000 -content: title sicherheit und schutz im netz + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + CorelDRAW 8 for Windows + 1998 + Davis, Phyllis + Includes index + + 1 + 79150 + content: title coreldraw for windows author davis phyllis - -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -Unix Secure Shell -1999 -Carasik, Anne H -Includes index -450000 -content: title unix secure shell author carasik anne h + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + "Covers Quicken deluxe 2000 for the Mac"--Cover + + Quicken 2000 for the Mac + the official guide + 2000 + Langer, Maria + Includes index + "Covers Quicken deluxe 2000 for the Mac"--Cover + + 1 + 79150 + content: title quicken for the mac author langer maria - -www.StopThief.net -protecting your identity on the Web -1999 -Marcella, Albert J -www.StopThief.net -protecting your identity on the Web -1999 -Marcella, Albert J -450000 -content: title www stopthief net author marcella albert j + Sicherheit und Schutz im Netz + 1998 + + Sicherheit und Schutz im Netz + 1998 + + 1 + 79150 + content: title sicherheit und schutz im netz - -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -Eight International Conference on Computer Communications and Networks -proceedings, 11-13 October 1999, Boston, Massachusetts -1999 -"IEEE catalog number 99EX370"--T.p. verso -425000 -content: title eight international conference on computer communications and networks + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + Unix Secure Shell + 1999 + Carasik, Anne H + Includes index + + 1 + 79150 + content: title unix secure shell author carasik anne h - -Building storage networks -2000 -Farley, Marc -Includes index -Building storage networks -2000 -Farley, Marc -Includes index -400000 -content: title building storage networks author farley marc + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + Eight International Conference on Computer Communications and Networks + proceedings, 11-13 October 1999, Boston, Massachusetts + 1999 + "IEEE catalog number 99EX370"--T.p. verso + + 1 + 74753 + content: title eight international conference on computer communications and networks - -3D games -real-time rendering and software technology -2001 -Watt, Alan H -3D games -real-time rendering and software technology -2001 -Watt, Alan H -400000 -content: title d games author watt alan h + Building storage networks + 2000 + Farley, Marc + Includes index + + Building storage networks + 2000 + Farley, Marc + Includes index + + 1 + 70356 + content: title building storage networks author farley marc - -Mastering algorithms with C -1999 -Loudon, Kyle -"Useful techniques from sorting to encryption"--Cover -Mastering algorithms with C -1999 -Loudon, Kyle -"Useful techniques from sorting to encryption"--Cover -Includes index -400000 -content: title mastering algorithms with c author loudon kyle + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + Complete CL + the definitive control language programming guide + 1999 + Malaga, Ernie + Includes index + + 1 + 70356 + content: title complete cl author malaga ernie - -Oracle8i Java component programming with EJB, CORBA, and JSP -2000 -Morisseau-Leroy, Nirva -CD-ROM includes resources mentioned in the book, electronic versions of the appendices, plus sample JSP & servlet programs -Oracle8i Java component programming with EJB, CORBA, and JSP -2000 -Morisseau-Leroy, Nirva -"Covers Oracle database releases 8.1.5, 8.1.6, and 8.1.7." -CD-ROM includes resources mentioned in the book, electronic versions of the appendices, plus sample JSP & servlet programs -400000 -content: title oracle i java component programming with ejb corba and jsp author morisseau leroy nirva + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 3D games + real-time rendering and software technology + 2001 + Watt, Alan H + + 1 + 70356 + content: title d games author watt alan h - -Oracle SQL*Plus -pocket reference -2000 -Gennick, Jonathan -"Guide to SQL*Plus syntax"--cover -Oracle SQL*Plus -pocket reference -2000 -Gennick, Jonathan -"Covers Oracle8i"--cover -"Guide to SQL*Plus syntax"--cover -400000 -content: title oracle sql plus author gennick jonathan + Internet world + 1992 + Title from caption + + Internet world + 1992 + Title from caption + + 1 + 70356 + content: title internet world - -Programming Web graphics with PERL and GNU software -1999 -Wallace, Shawn P -Programming Web graphics with PERL and GNU software -1999 -Wallace, Shawn P -400000 -content: title programming web graphics with perl and gnu software author wallace shawn p + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + Java applications strategies for the AS/400 + 1999 + Denoncourt, Don + + 1 + 70356 + content: title java applications strategies for the as author denoncourt don \ No newline at end of file