Conferences in DBLP
Edward W. Felten Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Barb Dijker SAGE Update. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Leif Hedstrom Integrating LDAP in a Heterogeneous Environment. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Alexander Kent , James Clifford Network Information Management and Distribution in a Heterogeneous and Decentralized Enterprise Environment. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Brad Knowles The Design and Implementation of Highly Scalable Email Systems. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Steven Levine Why the Documentation Sucks and What You Can Do About It. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Jon Rochlis How Not to Get Fleeced with Employee Stock Options. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] W. Curtis Preston SANs--From A To Reality. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Bill Cheswick Mapping Corporate Intranets and Internets. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Lorette Cheswick The Digital House. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Michael W. Shaffer A Linux Appliance Construction Setv. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Steve Romig Experiences with Incident Response at The Ohio State University. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:- [Conf ] Mark Burgess Theoretical System Administration. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:1-13 [Conf ] Alva L. Couch An Expectant Chat About Script Maturity. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:15-28 [Conf ] Jon Finke An Improved Approach for Generating Configuration Files from a Database. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:29-38 [Conf ] Robert Beck , Steve Holstead FOKSTRAUT and Samba--Dealing with Authentication and Performance Issues on a Large-scale Samba Service. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:39-42 [Conf ] Robert Drzyzgula Designing a Data Center Instrumentation System. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:43-58 [Conf ] Karl Larson , Todd Stansell Improving Availability in VERITAS Environments. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:59-66 [Conf ] Douglas Hughes User-Centric Account Management with Heterogeneous Password Changing. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:67-76 [Conf ] Matt Curtin , Sandy Farrar , Tami King Pelendur: Steward of the Sysadmin. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:77-83 [Conf ] Rocky Bernstein xps--Dynamic Process Tree Watching Under X. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:95-100 [Conf ] Matthew Bing , Carl Erickson Extending UNIX System Logging with SHARP. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:101-107 [Conf ] Michael Gilfix , Alva L. Couch Peep (The Network Auralizer): Monitoring Your Network with Sound. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:109-117 [Conf ] John Sellens Thresh--A Data-Directed SNMP Threshold Poller. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:119-130 [Conf ] Jarra Voleynik eEMU: A Practical Tool and Language for System Monitoring and Event Management. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:131-137 [Conf ] Jake D. Brutlag Aberrant Behavior Detection in Time Series for Network Monitoring. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:139-146 [Conf ] Robert Osterlund PIKT: Problem Informant/Killer Tool. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:147-165 [Conf ] Allan Miller , Alex Donnini Relieving the Burden of System Administration Through Support Automation. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:167-180 [Conf ] Alexei Novikov , Martin Hamilton FTP Mirror Tracker: A Few Steps Towards URN. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:181-186 [Conf ] Kyle Oppenheim , Patrick McCormick Deployme: Tellme's Package Management and Deployment System. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:187-196 [Conf ] Christopher Hemmerich Automating Request-based Software Distribution. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:197-205 [Conf ] David Ressman , John Valdés Use of Cfengine for Automated, Multi-Platform Software and Patch Distribution. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:207-218 [Conf ] Lee "Leonardo" Amatangelo Unleashing the Power of JumpStart: A New Technique for Disaster Recovery, Cloning, or Snapshotting a Solaris System. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:219-228 [Conf ] Rajeev Agrawala , Rob Fulmer , Shaun Erickson Automating Dual Boot (Linux and NT) Installations. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:245-254 [Conf ] Jon T. Meek Wide Area Network Packet Capture and Analysis. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:255-264 [Conf ] P. Krishnan , Tejas Naik , Ganesan Ramu , Roshan Sequeira Sequencing of Configuration Operations for IP Networks. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:265-274 [Conf ] Ellen L. Mitchell , Eric Nelson , David Hess ND: A Comprehensive Network Administration and Analysis Tool. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:275-283 [Conf ] Bill Nickless , John-Paul Navarro , Linda Winkler Combining Cisco NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:285-290 [Conf ] Steve Romig , Mark Fullmer , Ron Luman The OSU Flow-tools Package and CISCO NetFlow Logs. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:291-303 [Conf ] David Plonka FlowScan: A Network Traffic Flow Reporting and Visualization Tool. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:305-317 [Conf ] Hal Burch , Bill Cheswick Tracing Anonymous Packets to Their Approximate Source. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:319-327 [Conf ] Sven Dietrich , Neil Long , David Dittrich Analyzing Distributed Denial of Service Tools: The Shaft Case. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:329-339 [Conf ] Jean Chouanard YASSP! A Tool for Improving Solaris Security. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:341-354 [Conf ] Crispin Cowan , Steve Beattie , Greg Kroah-Hartman , Calton Pu , Perry Wagle , Virgil D. Gligor SubDomain: Parsimonious Server Security. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:355-368 [Conf ] Bruce Barnett NOOSE - Networked Object-Oriented Security Examiner. [Citation Graph (0, 0)][DBLP ] LISA, 2000, pp:369-378 [Conf ]