Abstract is missing.
- Introduction to the Shadow Password SuiteJohn F. Haugh II. [doi]
- Giving Customers the Tools to Protect ThemselvesShabbir J. Safdar. [doi]
- InterNetNews: Usenet Transport for Internet SitesRich Salz. [doi]
- Beyond Multiprocessing: Multithreading the SunOS KernelJoseph R. Eykholt, Steve R. Kleiman, Steve Barton, Roger Faulkner, Anil Shivalingiah, Mark Smith, Jim Voll, Mary Weeks, Dock Williams. [doi]
- The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International CrackersJörgen Bo Madsen. [doi]
- Mainframe Services from Gigabit-Networked WorkstationsJean-Philippe Baud, Christian Boissat, Fabrizio Cane, Frederic Hemmer, Erik Jagel, Ashok Kumar, Gordon Lee, Bernd Panzer-Steindel, Les Robertson, Ben Segal, Antoine Trannoy, Igor Zacharov. [doi]
- File System Multithreading in System V Release 4 MPJ. Kent Peacock. [doi]
- An Internet GatekeeperHerve Schauer, Christophe Wolfhugel. [doi]
- The DIDS (Distributed Intrusion Detection System) PrototypeSteven R. Snapp, Stephen E. Smaha, Daniel M. Teal, Tim Grance. [doi]
- The Continuous Media File SystemDavid P. Anderson, Yoshitomo Osawa, Ramesh Govindan. [doi]
- TDBM: A DBM Library with Atomic TransactionsBarry J. Brachman, Gerald W. Neufeld. [doi]
- A Discipline of Error HandlingDoug Moen. [doi]
- Implementing Lightweight ThreadsDan Stein, Devang Shah. [doi]
- Security Aspects of a UNIX PEM ImplementationJames M. Galvin, David M. Balenson. [doi]
- Cheap Mutual ExclusionWilliam L. Moran Jr., Farnam Jahanian. [doi]
- A Scalable Implementation of Virtual Memory HAT Layer for Shared Memory Multiprocessor MachinesRamesh Balan, Kurt Gollhardt. [doi]
- Virtual Window Systems: A New Approach to Supporting Concurrent Heterogeneous Windowing SystemsRita Pascale, Jeremy Epstein. [doi]
- TCP Wrapper: Network Monitoring, Access Control, and Booby TrapsWietse Venema. [doi]
- On Migrating a Distributed Application to a Multi-Threaded EnvironmentThuan Q. Pham, Pankaj K. Garg. [doi]
- There Be DragonsSteve Bellovin. [doi]
- Centralized System Monitoring with SwatchStephen E. Hansen, E. Todd Atkins. [doi]
- Performance of a Parallel Network Backup ManagerJames da Silva, Ólafur Guömundsson, Daniel Mossé. [doi]
- NeD: The Network Extensible DebuggerPaul Maybee. [doi]
- The Recovery Box: Using Fast Recovery to Provide High Availability in the UNIX EnvironmentMary Baker, Mark Sullivan. [doi]
- SOCKSDavid Koblas, Michelle R. Koblas. [doi]
- Large Scale Porting through ParameterizationDavid M. Tilbrook, Russell Crook. [doi]
- Tiled Virtual Memory for UNIXJames Franklin. [doi]
- A Privilege Mechanism for UNIX System V Release 4 Operating SystemsCharles Salemi, Suryakanta Shah, Eric Lund. [doi]
- Experiences of Internet Security in ItalyAlessandro Berni, Paolo Franchi, Joy Marino. [doi]
- Regression Testing and Conformance Testing Interactive ProgramsDon Libes. [doi]
- A Highly Available Lock Manager for HA-NFSAnupam Bhide, Spencer Shepler. [doi]
- #ifdef Considered Harmful, or Portability Experience with C NewsHenry Spencer, Geoff Collyer. [doi]
- Network (In)Security Through IP Packet FilteringD. Brent Chapman. [doi]
- Covers and FrontmatterStuart I. Feldman. [doi]
- Incl: A Tool to Analyze Include FilesKiem-Phong Vo, Yih-Farn Chen. [doi]
- VNS Retriever: Querying MEDLINE over the InternetKevin Brook Long, Jerry Fowler, Stan Barber. [doi]