Abstract is missing.
- Experiences with Incident Response at The Ohio State UniversitySteve Romig. [doi]
- The Design and Implementation of Highly Scalable Email SystemsBrad Knowles. [doi]
- Network Information Management and Distribution in a Heterogeneous and Decentralized Enterprise EnvironmentAlexander Kent, James Clifford. [doi]
- A Linux Appliance Construction SetvMichael W. Shaffer. [doi]
- Why the Documentation Sucks and What You Can Do About ItSteven Levine. [doi]
- Mapping Corporate Intranets and InternetsBill Cheswick.
- SAGE UpdateBarb Dijker.
- SANs--From A To RealityW. Curtis Preston.
- Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust CaseEdward W. Felten.
- How Not to Get Fleeced with Employee Stock OptionsJon Rochlis. [doi]
- The Digital HouseLorette Cheswick. [doi]
- Theoretical System AdministrationMark Burgess. 1-13 [doi]
- An Expectant Chat About Script MaturityAlva L. Couch. 15-28 [doi]
- An Improved Approach for Generating Configuration Files from a DatabaseJon Finke. 29-38 [doi]
- FOKSTRAUT and Samba--Dealing with Authentication and Performance Issues on a Large-scale Samba ServiceRobert Beck, Steve Holstead. 39-42 [doi]
- Designing a Data Center Instrumentation SystemRobert Drzyzgula. 43-58 [doi]
- Improving Availability in VERITAS EnvironmentsKarl Larson, Todd Stansell. 59-66 [doi]
- User-Centric Account Management with Heterogeneous Password ChangingDouglas Hughes. 67-76 [doi]
- Pelendur: Steward of the SysadminMatt Curtin, Sandy Farrar, Tami King. 77-83 [doi]
- xps--Dynamic Process Tree Watching Under XRocky Bernstein. 95-100 [doi]
- Extending UNIX System Logging with SHARPMatthew Bing, Carl Erickson. 101-107 [doi]
- Peep (The Network Auralizer): Monitoring Your Network with SoundMichael Gilfix, Alva L. Couch. 109-117 [doi]
- Thresh--A Data-Directed SNMP Threshold PollerJohn Sellens. 119-130 [doi]
- eEMU: A Practical Tool and Language for System Monitoring and Event ManagementJarra Voleynik. 131-137 [doi]
- Aberrant Behavior Detection in Time Series for Network MonitoringJake D. Brutlag. 139-146 [doi]
- PIKT: Problem Informant/Killer ToolRobert Osterlund. 147-165 [doi]
- Relieving the Burden of System Administration Through Support AutomationAllan Miller, Alex Donnini. 167-180 [doi]
- FTP Mirror Tracker: A Few Steps Towards URNAlexei Novikov, Martin Hamilton. 181-186 [doi]
- Deployme: Tellme s Package Management and Deployment SystemKyle Oppenheim, Patrick McCormick. 187-196 [doi]
- Use of Cfengine for Automated, Multi-Platform Software and Patch DistributionDavid Ressman, John Valdés. 207-218 [doi]
- Unleashing the Power of JumpStart: A New Technique for Disaster Recovery, Cloning, or Snapshotting a Solaris SystemLee Leonardo Amatangelo. 219-228 [doi]
- Automating Dual Boot (Linux and NT) InstallationsRajeev Agrawala, Rob Fulmer, Shaun Erickson. 245-254 [doi]
- Wide Area Network Packet Capture and AnalysisJon T. Meek. 255-264 [doi]
- Sequencing of Configuration Operations for IP NetworksP. Krishnan, Tejas Naik, Ganesan Ramu, Roshan Sequeira. 265-274 [doi]
- ND: A Comprehensive Network Administration and Analysis ToolEllen L. Mitchell, Eric Nelson, David Hess. 275-283 [doi]
- Combining Cisco NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network ForensicsBill Nickless, John-Paul Navarro, Linda Winkler. 285-290 [doi]
- The OSU Flow-tools Package and CISCO NetFlow LogsSteve Romig, Mark Fullmer, Ron Luman. 291-303 [doi]
- FlowScan: A Network Traffic Flow Reporting and Visualization ToolDavid Plonka. 305-317 [doi]
- Tracing Anonymous Packets to Their Approximate SourceHal Burch, Bill Cheswick. 319-327 [doi]
- Analyzing Distributed Denial of Service Tools: The Shaft CaseSven Dietrich, Neil Long, David Dittrich. 329-339 [doi]
- SubDomain: Parsimonious Server SecurityCrispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, Virgil D. Gligor. 355-368 [doi]
- NOOSE - Networked Object-Oriented Security ExaminerBruce Barnett. 369-378 [doi]