Abstract is missing.
- MBAs for Sys AdminsBrent Chapman.
- Automated System Administration/InfrastructurePaul Anderson, Steve Traugott.
- Network Telescopes: Tracking Denial-of-Service Attacks and Internet Worms Around the GlobeDavid Moore.
- How to Get Your Papers Accepted at LISAThomas A. Limoncelli, Adam Moskowitz. [doi]
- Emerging Spam-Fighting TechniquesRobert Haskins.
- The Realities of Deploying Desktop LinuxBevis King, Roger Webb, Graeme Wilford. [doi]
- Security Lessons from Best in Class OrganizationsGene Kim.
- Three Practical Ways to Improve Your NetworkKevin Miller. [doi]
- Adaptive Filtering: One Year OnJohn Graham-Cumming.
- Professional Growth and DevelopmentDavid W. Parter.
- Through the Lens Geekly: How Sysadmins Are Portrayed in Pop CultureDavid N. Blank-Edelman.
- What Washington Still Doesn t GetDeclan McCullagh.
- PKI/CryptographyGregory G. Rose.
- LinuxBdale Garbee.
- AFSEsther Filderman, Garry Zacheiss.
- Security Without FirewallsAbe Singer.
- Outsourcing: Common Problems and Current Trends in the Outsourcing IndustryJohn Nicholson. [doi]
- Internet Governance ReloadedPaul Vixie.
- Inside eBay.com: The System Administrator s PerspectivePaul Kilmartin.
- High Risk Information: Safe Handling for System AdministratorsLance Hayden. [doi]
- Security vs. Science: Changing the Security Culture of a National LabRémy Evard.
- Tossing Packets Over the Wall Using Transmit-Only Ethernet CablesJon T. Meek, Frank Colosimo. [doi]
- Coping with the Disappearance of Network BoundariesPeyton Engel. [doi]
- IPsecHugh Daniel.
- Stick, Rudder, and Keyboard: How Flying My Airplane Makes Me a Better SysadminRoss Oliver.
- Panel Discussion: Current Best Practices and Forthcoming Advances
- Talking to the Walls (Again)Mark Burgess.
- A Case Study in Internet Pathology: Flawed Routers Flood University s NetworkDavid Plonka. [doi]
- Organizational Maturity Models: Achieving Success and Happiness in Modern IT EnvironmentsGeoff Halprin.
- Radmind: The Integration of Filesystem Integrity Checking with Filesystem ManagementWesley D. Craig, Patrick M. McNeal. 1-6 [doi]
- Further Torture: More Testing of Backup and Archive ProgramsElizabeth D. Zwicky. 7-14 [doi]
- An Analysis of Database-Driven Mail ServersNick Elprin, Bryan Parno. 15-22 [doi]
- A Secure and Transparent Firewall Web ProxyRoger Crandell, James Clifford, Alexander Kent. 23-30 [doi]
- Designing, Developing, and Implementing a Document RepositoryJoshua S. Simon, Liza Weissler. 31-40 [doi]
- DryDock: A Document FirewallDeepak Giridharagopal. 41-50 [doi]
- Run-time Detection of Heap-based OverflowsWilliam K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur. 51-60 [doi]
- Designing a Configuration Monitoring and Reporting EnvironmentXev Gittler, Ken Beer. 61-72 [doi]
- New NFS Tracing Tools and Techniques for System AnalysisDaniel Ellard, Margo I. Seltzer. 73-86 [doi]
- EasyVPN: IPsec Remote Access Made EasyMark C. Benvenuto, Angelos D. Keromytis. 87-94 [doi]
- The Yearly Review, or How to Evaluate Your Sys AdminCarrie Gates, Jason Rouse. 95-104 [doi]
- Peer Certification: Techniques and Tools for Reducing System Admin Support Burdens While Improving Customer ServiceStacy Purcell, Sally Hambridge, David Armstrong, Tod Oace, Matt Baker, Jeff Sedayao. 105-114 [doi]
- ISconf: Theory, Practice, and BeyondLuke Kanies. 115-124 [doi]
- Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration ManagementAlva L. Couch, John Hart, Elizabeth G. Idhaw, Dominic Kallas. 125-148 [doi]
- Archipelago: A Network Security Analysis ToolTuva Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, Åsmund Weltzien. 149-158 [doi]
- STRIDER: A Black-box, State-based Approach to Change and Configuration Management and SupportYi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang. 159-172 [doi]
- CDSS: Secure Distribution of Software Installation Media Images in a Heterogeneous EnvironmentTed Cabeen, Job Bogan. 173-180 [doi]
- Virtual Appliances for Deploying and Maintaining SoftwareConstantine P. Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum. 181-194 [doi]
- Generating Configuration Files: The Director s CutJon Finke. 195-204 [doi]
- Preventing Wheel Reinvention: The psgconf System Configuration FrameworkMark D. Roth. 205-212 [doi]
- SmartFrog Meets LCFG: Autonomous Reconfiguration with Central Policy ControlPaul Anderson, Patrick Goldsack, Jim Paterson. 213-222 [doi]
- Distributed Tarpitting: Impeding Spam Across Multiple ServersTim Hunter, Paul Terry, Alan Judge. 223-236 [doi]
- Using Service Grammar to Diagnose BGP Configuration ErrorsXiaohu Qie, Sanjai Narain. 237-246 [doi]
- Splat: A Network Switch/Port Configuration Management ToolCary Abrahamson, Michael Blodgett, Adam Kunen, Nathan Mueller, David W. Parter. 247-256 [doi]