Abstract is missing.
- ssmail: Opportunistic Encryption in sendmailDamian Bentley, Gregory G. Rose, Tara Whalen. 1-8 [doi]
- MJDLM: Majordomo based Distribution List ManagementVincent D. Skahan Jr., Robert Katz. 9-20 [doi]
- RedAlert: A Scalable System for Application MonitoringEric Sorenson, Strata Rose Chalup. 21-34 [doi]
- Deconstructing User Requests and the Nine Step ModelThomas A. Limoncelli. 35-44 [doi]
- Adverse Termination Procedures -or- How To Fire A System Administrator Matthew F. Ringel, Thomas A. Limoncelli. 45-52 [doi]
- Organizing the Chaos: Managing Request Tickets in a Large EnvironmentSteve Willoughby. 53-68 [doi]
- GTrace: A Graphical Traceroute ToolRam Periakaruppan, Evi Nemeth. 69-78 [doi]
- rat: A Secure Archiving Program With Fast RetrievalWillem A. SchreĆ¼der, Maria Murillo. 79-86 [doi]
- Cro-Magnon: A Patch Hunter-GathererJeremy Bargen, Seth Taplin. 87-94 [doi]
- A Retrospective on Twelve Years of LISA ProceedingsEric Anderson, David A. Patterson. 95-108 [doi]
- Managing Security in Dynamic NetworksAlexander V. Konstantinou, Yechiam Yemini, Sandeep N. Bhatt, Sivaramakrishnan Rajagopalan. 109-122 [doi]
- It s Elementary, Dear Watson: Applying Logic Programming To Convergent System Management ProcessesAlva L. Couch, Michael Gilfix. 123-138 [doi]
- NetReg: An Automated DHCP Registration SystemPeter Valian, Todd K. Watson. 139-148 [doi]
- Dealing with Public Ethernet Jacks: Switches, Gateways, and AuthenticationRobert Beck. 149-154 [doi]
- NetMapper: Hostname Resolution Based on Client Network LocationJosh Goldenhar. 155-164 [doi]
- Enhancements to the Autofs AutomounterRicardo Labiaga. 165-174 [doi]
- The Advancement of NFS Benchmarking: SFS 2.0David Robinson. 175-186 [doi]
- Moving Large Filesystems On-Line, Including Exiting HSM FilesystemsVincent Cordrey, Doug Freyburger, Jordan Schwartz, Liza Weissler. 187-196 [doi]
- ServiceTrak Meets NLOG/NMAPJon Finke. 197-206 [doi]
- Burt: The Backup and Recovery ToolEric Melski. 207-218 [doi]
- Design and Implementation of a Failsafe Print SystemGiray Pultar. 219-228 [doi]
- Snort: Lightweight Intrusion Detection for NetworksMartin Roesch. 229-238 [doi]
- Internet Routing and DNS Voodoo in the EnterprisesD. Brian Larkins. 239-250 [doi]
- Moat: a Virtual Private Network Appliance and Services PlatformJohn S. Denker, Steven M. Bellovin, Hugh Daniel, Nancy L. Mintz, Tom Killian, Mark Plotnick. 251-260 [doi]
- Automated Installation of Linux Systems Using YaSTDirk H. Hohndel, Fabian Herschel. 261-266 [doi]
- Enterprise Rollouts with JumpStartJason Heiss. 267-274 [doi]
- Automated Client-side Integration of Distributed Application ServersConrad E. Kimball, Vincent D. Skahan Jr., David J. Kasik, Roger L. Droz. 275-282 [doi]