Conferences in DBLP
Paul Vixie Internet Governance Reloaded. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] John Graham-Cumming Adaptive Filtering: One Year On. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Geoff Halprin Organizational Maturity Models: Achieving Success and Happiness in Modern IT Environments. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Robert Haskins Emerging Spam-Fighting Techniques. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Lance Hayden High Risk Information: Safe Handling for System Administrators. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Paul Kilmartin Inside eBay.com: The System Administrator's Perspective. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Bevis King , Roger Webb , Graeme Wilford The Realities of Deploying Desktop Linux. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Thomas A. Limoncelli , Adam Moskowitz How to Get Your Papers Accepted at LISA. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Declan McCullagh What Washington Still Doesn't Get. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Jon T. Meek , Frank Colosimo Tossing Packets Over the Wall Using Transmit-Only Ethernet Cables. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Kevin Miller Three Practical Ways to Improve Your Network. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] David Moore Network Telescopes: Tracking Denial-of-Service Attacks and Internet Worms Around the Globe. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] John Nicholson Outsourcing: Common Problems and Current Trends in the Outsourcing Industry. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Ross Oliver Stick, Rudder, and Keyboard: How Flying My Airplane Makes Me a Better Sysadmin. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] David W. Parter Professional Growth and Development. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] David Plonka A Case Study in Internet Pathology: Flawed Routers Flood University's Network. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Gregory G. Rose PKI/Cryptography. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Abe Singer Security Without Firewalls. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Bdale Garbee Linux. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] David N. Blank-Edelman Through the Lens Geekly: How Sysadmins Are Portrayed in Pop Culture. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Hugh Daniel IPsec. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Gene Kim Security Lessons from "Best in Class" Organizations. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Peyton Engel Coping with the Disappearance of Network Boundaries. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Panel Discussion: Current Best Practices and Forthcoming Advances. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Rémy Evard Security vs. Science: Changing the Security Culture of a National Lab. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Mark Burgess Talking to the Walls (Again). [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Paul Anderson , Steve Traugott Automated System Administration/Infrastructure. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Brent Chapman MBAs for Sys Admins. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Esther Filderman , Garry Zacheiss AFS. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:- [Conf ] Wesley D. Craig , Patrick M. McNeal Radmind: The Integration of Filesystem Integrity Checking with Filesystem Management. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:1-6 [Conf ] Elizabeth D. Zwicky Further Torture: More Testing of Backup and Archive Programs. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:7-14 [Conf ] Nick Elprin , Bryan Parno An Analysis of Database-Driven Mail Servers. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:15-22 [Conf ] Roger Crandell , James Clifford , Alexander Kent A Secure and Transparent Firewall Web Proxy. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:23-30 [Conf ] Joshua S. Simon , Liza Weissler Designing, Developing, and Implementing a Document Repository. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:31-40 [Conf ] Deepak Giridharagopal DryDock: A Document Firewall. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:41-50 [Conf ] William K. Robertson , Christopher Krügel , Darren Mutz , Fredrik Valeur Run-time Detection of Heap-based Overflows. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:51-60 [Conf ] Xev Gittler , Ken Beer Designing a Configuration Monitoring and Reporting Environment. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:61-72 [Conf ] Daniel Ellard , Margo I. Seltzer New NFS Tracing Tools and Techniques for System Analysis. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:73-86 [Conf ] Mark C. Benvenuto , Angelos D. Keromytis EasyVPN: IPsec Remote Access Made Easy. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:87-94 [Conf ] Carrie Gates , Jason Rouse The Yearly Review, or How to Evaluate Your Sys Admin. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:95-104 [Conf ] Stacy Purcell , Sally Hambridge , David Armstrong , Tod Oace , Matt Baker , Jeff Sedayao Peer Certification: Techniques and Tools for Reducing System Admin Support Burdens While Improving Customer Service. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:105-114 [Conf ] Luke Kanies ISconf: Theory, Practice, and Beyond. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:115-124 [Conf ] Alva L. Couch , John Hart , Elizabeth G. Idhaw , Dominic Kallas Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:125-148 [Conf ] Tuva Stang , Fahimeh Pourbayat , Mark Burgess , Geoffrey Canright , Kenth Engø , Åsmund Weltzien Archipelago: A Network Security Analysis Tool. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:149-158 [Conf ] Yi-Min Wang , Chad Verbowski , John Dunagan , Yu Chen , Helen J. Wang , Chun Yuan , Zheng Zhang STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:159-172 [Conf ] Ted Cabeen , Job Bogan CDSS: Secure Distribution of Software Installation Media Images in a Heterogeneous Environment. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:173-180 [Conf ] Constantine P. Sapuntzakis , David Brumley , Ramesh Chandra , Nickolai Zeldovich , Jim Chow , Monica S. Lam , Mendel Rosenblum Virtual Appliances for Deploying and Maintaining Software. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:181-194 [Conf ] Jon Finke Generating Configuration Files: The Director's Cut. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:195-204 [Conf ] Mark D. Roth Preventing Wheel Reinvention: The psgconf System Configuration Framework. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:205-212 [Conf ] Paul Anderson , Patrick Goldsack , Jim Paterson SmartFrog Meets LCFG: Autonomous Reconfiguration with Central Policy Control. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:213-222 [Conf ] Tim Hunter , Paul Terry , Alan Judge Distributed Tarpitting: Impeding Spam Across Multiple Servers. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:223-236 [Conf ] Xiaohu Qie , Sanjai Narain Using Service Grammar to Diagnose BGP Configuration Errors. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:237-246 [Conf ] Cary Abrahamson , Michael Blodgett , Adam Kunen , Nathan Mueller , David W. Parter Splat: A Network Switch/Port Configuration Management Tool. [Citation Graph (0, 0)][DBLP ] LISA, 2003, pp:247-256 [Conf ]