Abstract is missing.
- bcfg2Narayan Desai.
- Everything You Know About Monitoring Is WrongMazda A. Marvasti. [doi]
- The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of PrivacyDanny O Brien. [doi]
- Perfect Data in an Imperfect WorldDaniel V. Klein.
- QA and the System AdministratorAdam Haberlach. [doi]
- LDAPHoward Chu.
- SNMPDouglas Hughes.
- System Administration: Drowning in Management ComplexityChad Verbowski.
- Bad Interview QuestionsAdam Moskowitz.
- Power-Managed Storage: Longer Data Life and Lower Energy ConsumptionAloke Guha. [doi]
- Virtualization and the Virtual InfrastructureJohn Arrasjid, John Gannon, Michael DiPetrillo.
- Zombies and Botnets: Attacks on Messaging Security by Organized Criminal EnterprisesDmitri Alperovitch.
- Command and Control: System Administration at U.S. Central CommandAndrew Seely. [doi]
- Open Source Software and Its Role in Space ExplorationD. J. Byrne. [doi]
- Site Reliability at Google/My First Year at GoogleThomas A. Limoncelli.
- SpamJohn Littell.
- BackupsW. Curtis Preston.
- Time Management for System AdministratorsThomas A. Limoncelli.
- PuppetLuke Kanies.
- Teaching Problem Solving: You Can and You ShouldElizabeth D. Zwicky. [doi]
- Build a Linux Oracle RAC ClusterChris Page.
- Corporate Security: A Hacker PerspectiveMark Loveless. [doi]
- Mac OS XThomas Limoncelli.
- Black Ops 2006: Pattern RecognitionDan Kaminsky.
- How to Get Your Paper Accepted at LISAThomas A. Limoncelli, Adam Moskowitz.
- What Do You Mean, Identity 2.0?Cat Okita.
- VoIPRobert Sparks.
- SpamDouglas Hughes.
- Identity ManagementJon Finke.
- AFSEsther Filderman.
- Leveraging the IT CommunityPatrick McGovern.
- UNIX and Microsoft InteroperabilityJoseph Radin.
- Virtualization: The Good, the Bad, the UglyMichael Baum 0002.
- NFSv4Michael Eisler.
- Seriously, Tape-Only Backup Systems Are DeadW. Curtis Preston. [doi]
- High Availability: From Luxury to Commonplace Necessity in 10 YearsEric Hennessey. [doi]
- Keynote Address: Hollywood s Secret War on Your NOCCory Doctorow. [doi]
- Is Entropy Winning? Drowning in the Data TsunamiLee Damon, Evan Marcus. [doi]
- Sysadmins, Network Managers, and Wiretap LawAlexander Muentz. [doi]
- Privilege Messaging: An Authorization Framework over Email InfrastructureBrent ByungHoon Kang, Gautam Singaraju, Sumeet Jain. 1-16 [doi]
- Securing Electronic Mail on the National Research and Academic Network of ItalyRoberto Cecchini, Fulvia Costa, Alberto D Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano. 17-29 [doi]
- A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack (Awarded Honorable Mention!)Daniel V. Klein. 31-40 [doi]
- Firewall Analysis with Policy-based Host ClassificationRobert M. Marmorstein, Phil Kearns. 41-51 [doi]
- Secure Mobile Code Execution ServiceLap-Chung Lam, Yang Yu, Tzi-cker Chiueh. 53-62 [doi]
- FLAIM: A Multi-level Anonymization Framework for Computer and Network LogsAdam J. Slagell, Kiran Lakkaraju, Katherine Luo. 63-77 [doi]
- Centralized Security Policy Support for Virtual MachineAnh-Quynh Nguyen, Ruo Ando, Yoshiyasu Takefuji. 79-87 [doi]
- A Platform for RFID Security and Privacy Administration (Awarded Best Paper!)Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum. 89-102 [doi]
- Specification-Enhanced Policies for Automated Management of Changes in IT SystemsChetan Shiva Shankar, Vanish Talwar, Subu Iyer, Yuan Chen, Dejan S. Milojicic, Roy H. Campbell. 103-118 [doi]
- Experience Implementing an IP Address ClosureNing Wu, Alva L. Couch. 119-130 [doi]
- Modeling Next Generation Configuration Management ToolsMark Burgess, Alva L. Couch. 131-147 [doi]
- Windows XP Kernel Crash AnalysisArchana Ganapathi, Viji Ganapathi, David A. Patterson. 149-159 [doi]
- SUEZ: A Distributed Safe Execution Environment for System Administration TrialsDoo San Sim, V. N. Venkatakrishnan. 161-173 [doi]
- WinResMon: A Tool for Discovering Software Dependencies, Configuration, and Requirements in Microsoft WindowsRajiv Ramnath, Sufatrio, Roland H. C. Yap, Yongzheng Wu. 175-186 [doi]
- LiveOps: Systems Management as a ServiceChad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang. 187-203 [doi]
- Managing Large Networks of Virtual MachinesKyrre M. Begnum. 205-214 [doi]
- Directing Change Using Bcfg2Narayan Desai, Rick Bradshaw, Cory Lueninghoener. 215-220 [doi]
- NAF: The NetSA Aggregated Flow Tool SuiteBrian Trammell, Carrie Gates. 221-231 [doi]
- Interactive Network Management Visualization with SVG and AJAXAthanasios Douitsis, Dimitrios Kalogeras. 233-245 [doi]
- Bridging the Host-Network Divide: Survey, Taxonomy, and SolutionGlenn A. Fink, Vyas Duggirala, Ricardo Correa, Chris North. 247-262 [doi]
- The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing SoftwareAndrew Pavlo, Peter Couvares, Rebekah Gietzel, Anatoly Karp, Ian D. Alderman, Miron Livny, Charles Bacon. 263-273 [doi]
- Unifying Unified Voice MessagingJon Finke. 275-285 [doi]
- Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking SystemDaniel S. Crosta, Matthew J. Singleton, Benjamin A. Kuperman. 287-298 [doi]