


default search action
19th LISA 2005: San Diego, California, USA
- David N. Blank-Edelman:

Proceedings of the 19th Conference on Systems Administration (LISA 2005), December 4-9, 2005, San Diego, California, USA. USENIX 2005
Opening Remarks, Awards, Keynote
- Qi Lu:

Keynote Address: Scaling Search Beyond the Public Web.
Vulnerabilities
- Matt Selsky, Daniel Medina:

GULP: A Unified Logging Architecture for Authentication Data. 1-5 - Chaos Golubitsky:

Toward an Automated Vulnerability Comparison of Open Source IMAP Servers (Awarded Best Student Paper!). 9-22 - Yi-Min Wang, Doug Beck:

Fast User-Mode Rootkit Scanner for the Enterprise. 23-30
Configuration Management Theory
- Paul Anderson, Edmund Smith:

Configuration Tools: Working Together. 31-37 - Narayan Desai, Rick Bradshaw, Scott Matott, Sandra Bittner, Susan Coghlan, Rémy Evard, Cory Lueninghoener, Ti Leggett, John-Paul Navarro, Gene Rackow, Craig Stacey, Tisha Stacey:

A Case Study in Configuration Management Tool Deployment. 39-46 - Shaya Potter, Jason Nieh:

Reducing Downtime Due to System Maintenance and Upgrades (Awarded Best Student Paper!). 47-62
Configuration Management Practice
- Anton Schultschik:

About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment. 63-71 - Brent ByungHoon Kang, Vikram Sharma, Pratik Thanki:

RegColl: Centralized Registry Framework for Infrastructure System Management. 73-82 - Maarten Thibaut, Wout Mertens:

Herding Cats: Managing a Mobile UNIX Platform. 83-88
Networking
- Bruce Campbell, Robyn Landers:

Open Network Administrator (ONA) - A Web-based Network Management Tool. 89-101 - Robert M. Marmorstein, Phil Kearns:

An Open Source Solution for Testing NAT'd and Nested iptables Firewalls. 103-112 - Evan Hughes, Anil Somayaji:

Towards Network Awareness. 113-124
Theory
- Alva L. Couch, Ning Wu, Hengky Susanto:

Toward a Cost Model for System Administration (Awarded Best Paper!). 125-141 - Mark Burgess, Kyrre M. Begnum:

Voluntary Cooperation in Pervasive Computing Services. 143-154 - Sanjai Narain:

Network Configuration Management via Model Finding. 155-168
Network Visualization
- William Yurcik:

Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite. 169-176 - Cristian Estan, Garret Magin:

Interactive Traffic Analysis and Visualization with Wisconsin Netpy. 177-184 - Seong Soo Kim, A. L. Narasimha Reddy:

NetViewer: A Network Traffic Visualization and Analysis Tool. 185-196
Tools
- Eben M. Haber, Eser Kandogan, Allen Cypher, Paul P. Maglio, Rob Barrett:

A1: Spreadsheet-based Scripting for Developing Web Tools. 197-208 - Thomas A. Limoncelli:

Hostdb: The Best Damn host2DNS/DHCP Script Ever Written. 209-223 - Jonathan Adams, David Bustos, Stephen Hahn, David Powell, Liane Praza:

Solaris Service Management Facility: Modern System Startup and Administration. 225-236
Access Control
- James Deverick, Phil Kearns:

Towards a Deep-Packet-Filter Toolkit for Securing Legacy Resources. 237-248 - Rakeshbabu Bobba

, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva:
Administering Access Control in Dynamic Coalitions. 249-261 - Jon Finke:

Manage People, Not Userids. 263-277
Work-in-Progress Reports (WiPS)
Invited Talks
- Bdale Garbee:

Computing on Amateur Satellites. - Dan Kaminsky:

Network Black Ops: Extracting Unexpected Functionality from Existing Networks. - Thomas A. Limoncelli:

What Big Sites Can Learn from Little Sites. - Garrett Wollman:

Building MIT's Stata Center: An IT Perspective. - Strata Rose Chalup:

Under 200: Applying IS Best Practices to Small Companies. - Radia J. Perlman:

What's a PKI, Why Would I Want One, and How Should it Be Designed? - Andrew Cowie:

Modern Trends in UNIX and Linux Infrastructure Management. - Brent Chapman:

Incident Command for IT: What We Can Learn from the Fire Department. - Monica Lam:

Automatic PC Desktop Management with Virtualization Technology. - Peyton Engel:

What's the Worst That Could Happen? - Lance Cottrell:

Internet Counter-Intelligence: Offense and Defense. - Paul Vixie:

Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV). - Kevin Bankston:

How Sysadmins Can Protect Free Speech and Privacy on the Electronic Frontier. - Michael H. Warfield:

Wireless Security. - Jonas Luster:

Weblogs, Wikis, and RSS for System Administrators. - Michael R. Crusoe:

Using Your Body for Authentication: A Biometrics Guide for System Administrators. - Terry Slattery:

Silly Network Management Tricks.
Plenary Session
- Matt Blaze:

Picking Locks with Cryptology.
Guru Sessions
- W. Curtis Preston:

Backups. LISA 2005 - Howard Chu:

LDAP. LISA 2005 - Douglas Hughes:

Spam. LISA 2005 - Esther Filderman:

AFS. LISA 2005 - Gerald Carter:

Samba. LISA 2005 - Robert Sparks:

VoIP. LISA 2005 - Strata Rose Chalup:

Project Management. LISA 2005 - Thomas A. Limoncelli:

Time Management. LISA 2005 - Gene Kim:

Change Management. LISA 2005 - Gregory G. Rose:

Security/Cryptography. LISA 2005 - Ben Laurie:

Apache/OpenSSL/DNSSEC. LISA 2005 - Jordan Hubbard:

Mac OS X. LISA 2005 - Bryan Cantrill, Daniel Price, Liane Praza:

Solaris 10: System/DTrace/Zones/SMF. LISA 2005 - John Arrasjid, John Gannon:

Virtualization. LISA 2005

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














