


Остановите войну!
for scientists:


default search action
16th LISA 2002: Philadelphia, PA, USA
- Alva L. Couch:
Proceedings of the 16th Conference on Systems Administration (LISA 2002), Philadelphia, PA, USA, November 3-8, 2002. USENIX 2002, ISBN 1-931971-03-X
Opening Remarks, Awards, and Keynote
- Jim Reese:
Keynote: Scaling the Web: An Overview of Google (A Linux Cluster for Fun and Profit).
Working Smarter
- Thomas S. Stepleton:
Work-Augmented Laziness with the Los Task Request System. 1-12 - Deeann M. M. Mikula, Chris Tracy, Mike Holling:
Spam Blocking with a Dynamically Updated Firewall Ruleset. 13-20 - Michael Gilfix:
Holistic Quota Management: The Natural Path to a Better, More Efficient Quota System. 21-32
Service, Risk, and Scale
- Alain J. Mayer:
Application Aware Management of Internet Data Center Software. 33-46 - Kevin Adams:
Geographically Distributed System for Catastrophic Recovery. 47-64 - Jon Finke:
Embracing and Extending Windows 2000. 65-74
Practical Theory
- Uri Guttman:
Stem: The System Administration Enabler. 75-82 - Lionel Cons, Piotr Poznanski:
Pan: A High-Level Configuration Language. 83-98 - Steve Traugott:
Why Order Matters: Turing Equivalence in Automated Systems Administration. 99-120
Short Subjects
- John Hart, Jeffrey D'Amelia:
An Analysis of RPM Validation Drift. 155-166 - Robert Beverly:
RTG: A Scalable SNMP Statistics Architecture for Service Providers. 167-174 - Mark Logan, Matthias Felleisen, David N. Blank-Edelman:
Environmental Acquisition in Network Management. 175-184 - David A. Patterson:
A Simple Way to Estimate the Cost of Downtime. 185-188
Security
- V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang:
An Approach for Secure Software Installation. 219-226 - Atsushi Totsuka, Hidenari Ohwada, Nobuhisa Fujita, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori:
Network-based Intrusion Detection - Modeling for a Larger Picture. 227-232 - Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris Wright, Adam Shostack:
Timing the Application of Security Patches for Optimal Uptime. 233-242
General Track
Logging and Monitoring
- Adam Sah:
A New Architecture for Managing Enterprise Log Data. 121-132 - Tetsuji Takada, Hideki Koike:
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis. 133-144 - Jon Finke:
Process Monitor: Detecting Events That Didn't Happen. 145-154
Service and Network Upgrades
- Alexander Keller, Heiko Ludwig:
Defining and Monitoring Service-Level Agreements for Dynamic e-Business. 189-204 - Noel Burton-Krahn:
HotSwap-Transparent Server Failover for Linux. 205-212 - Richard van den Berg, Phil Dibowitz:
Over-Zealous Security Administrators Are Breaking the Internet. 213-218
Invited Talks
- Paul Vixie:
"Who ARE These People?" Internet Governance, Peering, and Legislation. - David N. Blank-Edelman:
SysAdmin, Stories, and Signing: Learning from Communication Experts. LISA 2002 - Tim Nagle:
My Years with the NSA Red Team. LISA 2002 - Panel: Nobody Notices Until It's Broken: Self-Marketing for Sysadmins.
- Larry Wall:
Perl 6. LISA 2002 - Thomas A. Limoncelli, Christine Hogan:
How to Write a Book with Someone You Don't Know: Internet Collaboration for the Truly Geeky. LISA 2002 - John Hurley:
Security on Macintosh OS X. LISA 2002 - Lee Damon, Rob Kolstad:
The Evolving Ethics of System Administration. LISA 2002 - Daniel V. Klein:
The Constitutional & Financial Argument Against Spam. LISA 2002 - Paul Evans:
Risk-Taking vs. Management. LISA 2002 - Eric Allman:
So You Want to Do a Startup? LISA 2002 - W. Curtis Preston:
Making Backups Easier with Disk. LISA 2002
Work-in-Progress Reports (WiPs)
Networking
- Brad Knowles:
Domain Name Server Comparison: BIND 8 vs. BIND 9 vs. djbdns vs. ??? - Tony Bourke:
Load Balancers. LISA 2002 - Tim Pozar:
Large-Scale 802.11 Deployment. LISA 2002
Security
- Peter H. Salus:
Internet Security: Beyond Firewalls, Passwords, and Crypto. LISA 2002 - Len Sassaman:
The Promise of Privacy. LISA 2002 - Paul Proctor:
The Intrusion Detection Timeline. LISA 2002
Guru Sessions
- Jeff R. Allen:
Performance Tuning Guru. LISA 2002 - Douglas Hughes:
System Monitoring Guru. LISA 2002 - Steve Traugott:
Infrastructures Guru. LISA 2002 - Gerald Carter:
SAMBA Guru. LISA 2002 - Esther Filderman, Garry Zacheiss:
AFS Gurus. LISA 2002 - Nick Stoughton:
Consulting Guru. LISA 2002 - W. Curtis Preston:
Backups Guru. LISA 2002 - Daniel V. Klein, Mark-Jason Dominus:
Perl/Scripting Gurus. LISA 2002 - Eric Allman:
Email/MTAs Guru. LISA 2002 - Strata Rose Chalup:
Project Management Guru. LISA 2002

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.