Abstract is missing.
- Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)Paul Vixie. [doi]
- Silly Network Management TricksTerry Slattery. [doi]
- BackupsW. Curtis Preston.
- How Sysadmins Can Protect Free Speech and Privacy on the Electronic FrontierKevin Bankston. [doi]
- Modern Trends in UNIX and Linux Infrastructure ManagementAndrew Cowie. [doi]
- Building MIT s Stata Center: An IT PerspectiveGarrett Wollman. [doi]
- Incident Command for IT: What We Can Learn from the Fire DepartmentBrent Chapman. [doi]
- What s the Worst That Could Happen?Peyton Engel. [doi]
- Project ManagementStrata Rose Chalup.
- Using Your Body for Authentication: A Biometrics Guide for System AdministratorsMichael R. Crusoe. [doi]
- Picking Locks with CryptologyMatt Blaze. [doi]
- SambaGerald Carter.
- Time ManagementThomas Limoncelli.
- Change ManagementGene Kim.
- Weblogs, Wikis, and RSS for System AdministratorsJonas Luster. [doi]
- Network Black Ops: Extracting Unexpected Functionality from Existing NetworksDan Kaminsky. [doi]
- AFSEsther Filderman.
- Solaris 10: System/DTrace/Zones/SMFBryan Cantrill, Daniel Price, Liane Praza.
- What Big Sites Can Learn from Little SitesThomas A. Limoncelli. [doi]
- What s a PKI, Why Would I Want One, and How Should it Be Designed?Radia J. Perlman. [doi]
- Computing on Amateur SatellitesBdale Garbee. [doi]
- VirtualizationJohn Arrasjid, John Gannon.
- Security/CryptographyGregory G. Rose.
- Apache/OpenSSL/DNSSECBen Laurie.
- LDAPHoward Chu.
- Internet Counter-Intelligence: Offense and DefenseLance Cottrell. [doi]
- VoIPRobert Sparks.
- Mac OS XJordan Hubbard.
- Automatic PC Desktop Management with Virtualization TechnologyMonica Lam. [doi]
- Wireless SecurityMichael H. Warfield. [doi]
- Under 200: Applying IS Best Practices to Small CompaniesStrata Rose Chalup. [doi]
- Keynote Address: Scaling Search Beyond the Public WebQi Lu. [doi]
- SpamDouglas Hughes.
- GULP: A Unified Logging Architecture for Authentication DataMatt Selsky, Daniel Medina. 1-5 [doi]
- Toward an Automated Vulnerability Comparison of Open Source IMAP Servers (Awarded Best Student Paper!)Chaos Golubitsky. 9-22 [doi]
- Fast User-Mode Rootkit Scanner for the EnterpriseYi-Min Wang, Doug Beck. 23-30 [doi]
- Configuration Tools: Working TogetherPaul Anderson, Edmund Smith. 31-37 [doi]
- A Case Study in Configuration Management Tool DeploymentNarayan Desai, Rick Bradshaw, Scott Matott, Sandra Bittner, Susan Coghlan, Rémy Evard, Cory Lueninghoener, Ti Leggett, John-Paul Navarro, Gene Rackow, Craig Stacey, Tisha Stacey. 39-46 [doi]
- Reducing Downtime Due to System Maintenance and Upgrades (Awarded Best Student Paper!)Shaya Potter, Jason Nieh. 47-62 [doi]
- About the Integration of Mac OS X Devices into a Centrally Managed UNIX EnvironmentAnton Schultschik. 63-71 [doi]
- RegColl: Centralized Registry Framework for Infrastructure System ManagementBrent ByungHoon Kang, Vikram Sharma, Pratik Thanki. 73-82 [doi]
- Herding Cats: Managing a Mobile UNIX PlatformMaarten Thibaut, Wout Mertens. 83-88 [doi]
- Open Network Administrator (ONA) - A Web-based Network Management ToolBruce Campbell, Robyn Landers. 89-101 [doi]
- An Open Source Solution for Testing NAT d and Nested iptables FirewallsRobert M. Marmorstein, Phil Kearns. 103-112 [doi]
- Towards Network AwarenessEvan Hughes, Anil Somayaji. 113-124 [doi]
- Toward a Cost Model for System Administration (Awarded Best Paper!)Alva L. Couch, Ning Wu, Hengky Susanto. 125-141 [doi]
- Voluntary Cooperation in Pervasive Computing ServicesMark Burgess, Kyrre M. Begnum. 143-154 [doi]
- Network Configuration Management via Model FindingSanjai Narain. 155-168 [doi]
- Visualizing NetFlows for Security at Line Speed: The SIFT Tool SuiteWilliam Yurcik. 169-176 [doi]
- Interactive Traffic Analysis and Visualization with Wisconsin NetpyCristian Estan, Garret Magin. 177-184 [doi]
- NetViewer: A Network Traffic Visualization and Analysis ToolSeong Soo Kim, A. L. Narasimha Reddy. 185-196 [doi]
- A1: Spreadsheet-based Scripting for Developing Web ToolsEben M. Haber, Eser Kandogan, Allen Cypher, Paul P. Maglio, Rob Barrett. 197-208 [doi]
- Hostdb: The Best Damn host2DNS/DHCP Script Ever WrittenThomas A. Limoncelli. 209-223 [doi]
- Solaris Service Management Facility: Modern System Startup and AdministrationJonathan Adams, David Bustos, Stephen Hahn, David Powell, Liane Praza. 225-236 [doi]
- Towards a Deep-Packet-Filter Toolkit for Securing Legacy ResourcesJames Deverick, Phil Kearns. 237-248 [doi]
- Administering Access Control in Dynamic CoalitionsRakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva. 249-261 [doi]
- Manage People, Not UseridsJon Finke. 263-277 [doi]