0 | -- | 0 | William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor. Better Passwords through Science (and Neural Networks) |
0 | -- | 0 | Dave Josephsen. iVoyeur: Tcpdump at Scale |
0 | -- | 0 | Wilfried Mayer, Katharina Krombholz, Martin Schmiedecker, Edgar R. Weippl. Securing the Internet, One HTTP 200 OK at a Time |
0 | -- | 0 | Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson. Global-Scale Measurement of DNS Manipulation |
0 | -- | 0 | Dan Geer. For Good Measure: Letting Go of the Steering Wheel |
0 | -- | 0 | David M. Beazley. raise SystemExit(0) |
0 | -- | 0 | Mark Lamourine, Michele Nelson. Book Reviews |
0 | -- | 0 | Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran 0002, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson. An End-to-End View of DNSSEC Ecosystem Management |
0 | -- | 0 | Shehar Bano, Mustafa Al-Bassam, George Danezis. The Road to Scalable Blockchain Designs |
0 | -- | 0 | Juncheng Gu, Youngmoon Lee, Yiwen Zhang, Mosharaf Chowdhury, Kang G. Shin. Decentralized Memory Disaggregation Over Low-Latency Networks |
0 | -- | 0 | Chris McEniry. Go: HashiCorp's Vault |
0 | -- | 0 | Vladimir Legeza. From Sysadmin to SRE in 2587 Words |
0 | -- | 0 | Kurt J. Lidl. Understanding Docker |
0 | -- | 0 | Rik Farrow. Musings |
0 | -- | 0 | Robert G. Ferrell. /dev/random: Cloudbursting, or Risk Mismanagement |
0 | -- | 0 | David N. Blank-Edelman. Practical Perl Tools: Perl without Perl |
0 | -- | 0 | John P. Looney. Psychological Safety in Operation Teams |
0 | -- | 0 | Rik Farrow. An Interview with Peter G. Neumann |