Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/usenix-login/usenix-login25.bht:"
@article{DBLP:journals/usenix-login/Annis00, author = {William S. Annis}, title = {Pithy Sayings for the {UNIX} Sysadmin}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/pithy-sayings-unix-sysadmin}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Annis00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Bahadur00, author = {Gary Bahadur}, title = {Why Should You Enforce a Network Security Policy?}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/why-should-you-enforce-network-security-policy}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Bahadur00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Brumley00, author = {David Brumley}, title = {Repeatable Security}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/repeatable-security}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Brumley00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Burgess00, author = {Mark Burgess}, title = {System Administration Research, Part 3}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/system-administration-research-part-3}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Burgess00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Burgess00a, author = {Mark Burgess}, title = {Letters to the Editor}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/letters-editor}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Burgess00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chalup00, author = {Strata Rose Chalup}, title = {Vendor Contract Services}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/vendor-contract-services}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chalup00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chalup00a, author = {Strata Rose Chalup}, title = {Technical Interviews}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/technical-interviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chalup00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Darmohray00, author = {Tina Darmohray}, title = {apropos}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/apropos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Darmohray00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Darmohray00a, author = {Tina Darmohray}, title = {Apropos}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/apropos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Darmohray00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Darmohray00b, author = {Tina Darmohray}, title = {{APROPOS}}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/apropos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Darmohray00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/DeraisonH00, author = {Renaud Deraison and Jordan Hrycaj}, title = {Nessus: The Free Network Security Scanner}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/nessus-free-network-security-scanner}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/DeraisonH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Dietrich00, author = {Sven Dietrich}, title = {Scalpel, Gauze, and Decompilers}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/scalpel-gauze-and-decompilers}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Dietrich00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Dijker00, author = {Barbara Dijker}, title = {Use Your Local Tools}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/use-your-local-tools}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Dijker00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow00, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow00a, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow00b, author = {Rik Farrow}, title = {In This Issue}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/issue}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow00c, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow00c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Fennely00, author = {Carole Fennely}, title = {An Interview with Blaine Burnham}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/interview-blaine-burnham}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Fennely00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Flynt00, author = {Clif Flynt}, title = {The Tclsh Spot}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/tclsh-spot}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Flynt00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Flynt00a, author = {Clif Flynt}, title = {The Tclsh Spot}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/tclsh-spot}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Flynt00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Forte00, author = {Dario V. Forte}, title = {Using Trinux for Security Testing}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/using-trinux-security-testing}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Forte00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer00, author = {Daniel E. Geer Jr.}, title = {From the President}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/president}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Gwinn00, author = {Joe Gwinn}, title = {{POSIX} System Services Working Group - Realtime {(SSWG-RT)}}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/posix-system-services-working-group-\%E2\%80\%94-realtime}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Gwinn00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Halprin00, author = {Geoff Halprin}, title = {An Ode to Risk Management}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/ode-risk-management}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Halprin00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/HarrisS00, author = {David K. Z. Harris and Bryan Stansell}, title = {Finding Time To Do It All}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/finding-time-do-it-all}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/HarrisS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins00, author = {Robert Haskins}, title = {Mail Message Metering}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/mail-message-metering}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JohnsonW00, author = {Steve Johnson and Dusty White}, title = {To the Limit}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/limit}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JohnsonW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JohnsonW00a, author = {Steve Johnson and Dusty White}, title = {Just Presuppose..}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/just-presuppose}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JohnsonW00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JohnsonW00b, author = {Steve Johnson and Dusty White}, title = {The First Miracle of Management}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/first-miracle-management}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JohnsonW00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josey00, author = {Andrew Josey}, title = {Austin Group Status Update}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/austin-group-status-update}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josey00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad00, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad00a, author = {Rob Kolstad}, title = {The 1999 - 2000 {USACO} Report}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/1999\%E2\%80\%942000-usaco-report}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad00b, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad00c, author = {Rob Kolstad}, title = {An Interview With Geoff Halprin}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/interview-geoff-halprin}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad00c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad00d, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad00d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Long00, author = {Jane{-}Ellen Long}, title = {Sun Comes Through for {USENIX}}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/sun-comes-through-usenix}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Long00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Martin00, author = {Brian Martin}, title = {A Note on Security Disclosures}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/note-security-disclosures}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Martin00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey00, author = {Glen McCluskey}, title = {Java Performance}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/java-performance}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey00a, author = {Glen McCluskey}, title = {Letters to the Editor}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/letters-editor}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey00b, author = {Glen McCluskey}, title = {Java Performance}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/java-performance}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Mudge00, author = {Mudge}, title = {Security Devices that Might Not Be}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/security-devices-might-not-be}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Mudge00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Nemeth00, author = {Evi Nemeth}, title = {Securing the {DNS}}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/securing-dns}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Nemeth00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Nicholson00, author = {John Nicholson}, title = {Taming the Wild West}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/taming-wild-west}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Nicholson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Nicholson00a, author = {John Nicholson}, title = {National Laws and the Net}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/national-laws-and-net}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Nicholson00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Parter00, author = {David W. Parter}, title = {Sysadmin Ethics}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/sysadmin-ethics}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Parter00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ranum00, author = {Marcus J. Ranum}, title = {The Network Police Blotter}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/network-police-blotter}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ranum00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ranum00a, author = {Marcus J. Ranum}, title = {The Network Police Blotter}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/network-police-blotter}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ranum00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ranum00b, author = {Marcus J. Ranum}, title = {The Network Police Blotter}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/network-police-blotter}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ranum00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Rao00, author = {Prithvi Rao}, title = {Using Java}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/using-java}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Rao00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Rao00a, author = {Prithvi Rao}, title = {Using Java}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/using-java}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Rao00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Rao00b, author = {Prithvi Rao}, title = {Using Java}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/using-java}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Rao00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/RezmierskiCH00, author = {Virginia E. Rezmierski and Adriana Carroll and Jamie Hine}, title = {A Study on Incident Costs and Frequencies}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/study-incident-costs-and-frequencies}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/RezmierskiCH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Romig00, author = {Steve Romig}, title = {Correlating Log File Entries}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/correlating-log-file-entries}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Romig00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Russo00, author = {Christopher M. Russo}, title = {Keeping Employees by Keeping Them Happy}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/keeping-employees-keeping-them-happy}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Russo00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus00, author = {Peter H. Salus}, title = {The Bookworm}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus00a, author = {Peter H. Salus}, title = {N Years Ago: Anniversaries}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/n-years-ago-anniversaries}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus00b, author = {Peter H. Salus}, title = {The Bookworm}, journal = {login Usenix Mag.}, volume = {25}, number = {6}, year = {2000}, url = {https://www.usenix.org/publications/login/october-2000-volume-25-number-6/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus00c, author = {Peter H. Salus}, title = {The Bookworm}, journal = {login Usenix Mag.}, volume = {25}, number = {7}, year = {2000}, url = {https://www.usenix.org/publications/login/november-2000-volume-25-number-7/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus00c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus00d, author = {Peter H. Salus}, title = {The Bookworm}, journal = {login Usenix Mag.}, volume = {25}, number = {8}, year = {2000}, url = {https://www.usenix.org/publications/login/december-2000-volume-25-number-8/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus00d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sellens00, author = {John Sellens}, title = {System and Network Monitoring}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/system-and-network-monitoring}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sellens00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Singer00, author = {Daniel Singer}, title = {Toolman}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/toolman}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Singer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.