-<md-title>The use of passwords for controlled access to computer resources</md-title>
-<md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author><location id="localhost:9999/db1" name="db1">
-<md-title>The use of passwords for controlled access to computer resources</md-title>
-<md-date>1977</md-date>
-<md-author>Wood, Helen M</md-author></location>
-<relevance>22769</relevance>
-<recid>title the use of passwords for controlled access to computer resources author wood helen m</recid>
-</hit>
-<hit>
-
-<md-title>Deuteronomy</md-title>
-<md-date>1968</md-date>
-<md-author>Oberst, Bruce</md-author><location id="localhost:9999/db1" name="db1">
-<md-title>Deuteronomy</md-title>
-<md-date>1968</md-date>
-<md-author>Oberst, Bruce</md-author></location>
-<relevance>0</relevance>
-<recid>title deuteronomy author oberst bruce</recid>
-</hit>
-<hit>
-
-<md-title>Four psalms</md-title>
-<md-title-remainder>XXIII, XXXVI, LII, CXXI</md-title-remainder>
-<md-date>1980</md-date>
-<md-author>Smith, George Adam</md-author><location id="localhost:9999/db1" name="db1">
-<md-title>Four psalms</md-title>
-<md-title-remainder>XXIII, XXXVI, LII, CXXI</md-title-remainder>
-<md-date>1980</md-date>
-<md-author>Smith, George Adam</md-author></location>
-<relevance>0</relevance>
-<recid>title four psalms author smith george adam</recid>
-</hit>
-<hit>
-
-<md-title>Info Canada</md-title>
-<md-date>1991</md-date>
-<md-description>Title from caption</md-description><location id="localhost:9999/db1" name="db1">
-<md-title>Info Canada</md-title>
-<md-date>1991</md-date>
-<md-description>Title from caption</md-description></location>
-<relevance>0</relevance>
-<recid>title info canada</recid>
-</hit>
-<hit>
-