![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
16th LISA 2002: Philadelphia, PA, USA
- Alva L. Couch:
Proceedings of the 16th Conference on Systems Administration (LISA 2002), Philadelphia, PA, USA, November 3-8, 2002. USENIX 2002, ISBN 1-931971-03-X
Opening Remarks, Awards, and Keynote
- Jim Reese:
Keynote: Scaling the Web: An Overview of Google (A Linux Cluster for Fun and Profit).
Working Smarter
- Thomas S. Stepleton:
Work-Augmented Laziness with the Los Task Request System. 1-12 - Deeann M. M. Mikula, Chris Tracy, Mike Holling:
Spam Blocking with a Dynamically Updated Firewall Ruleset. 13-20 - Michael Gilfix:
Holistic Quota Management: The Natural Path to a Better, More Efficient Quota System. 21-32
Service, Risk, and Scale
- Alain J. Mayer:
Application Aware Management of Internet Data Center Software. 33-46 - Kevin Adams:
Geographically Distributed System for Catastrophic Recovery. 47-64 - Jon Finke:
Embracing and Extending Windows 2000. 65-74
Practical Theory
- Uri Guttman:
Stem: The System Administration Enabler. 75-82 - Lionel Cons, Piotr Poznanski:
Pan: A High-Level Configuration Language. 83-98 - Steve Traugott:
Why Order Matters: Turing Equivalence in Automated Systems Administration. 99-120
Short Subjects
- John Hart, Jeffrey D'Amelia:
An Analysis of RPM Validation Drift. 155-166 - Robert Beverly:
RTG: A Scalable SNMP Statistics Architecture for Service Providers. 167-174 - Mark Logan, Matthias Felleisen, David N. Blank-Edelman:
Environmental Acquisition in Network Management. 175-184 - David A. Patterson:
A Simple Way to Estimate the Cost of Downtime. 185-188
Security
- V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, Zhenkai Liang:
An Approach for Secure Software Installation. 219-226 - Atsushi Totsuka, Hidenari Ohwada, Nobuhisa Fujita, Debasish Chakraborty, Glenn Mansfield Keeni, Norio Shiratori:
Network-based Intrusion Detection - Modeling for a Larger Picture. 227-232 - Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, Chris Wright, Adam Shostack:
Timing the Application of Security Patches for Optimal Uptime. 233-242
General Track
Logging and Monitoring
- Adam Sah:
A New Architecture for Managing Enterprise Log Data. 121-132 - Tetsuji Takada, Hideki Koike:
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis. 133-144 - Jon Finke:
Process Monitor: Detecting Events That Didn't Happen. 145-154
Service and Network Upgrades
- Alexander Keller, Heiko Ludwig:
Defining and Monitoring Service-Level Agreements for Dynamic e-Business. 189-204 - Noel Burton-Krahn:
HotSwap-Transparent Server Failover for Linux. 205-212 - Richard van den Berg, Phil Dibowitz:
Over-Zealous Security Administrators Are Breaking the Internet. 213-218
Invited Talks
- Paul Vixie:
"Who ARE These People?" Internet Governance, Peering, and Legislation. - David N. Blank-Edelman:
SysAdmin, Stories, and Signing: Learning from Communication Experts. LISA 2002 - Tim Nagle:
My Years with the NSA Red Team. LISA 2002 - Panel: Nobody Notices Until It's Broken: Self-Marketing for Sysadmins.
- Larry Wall:
Perl 6. LISA 2002 - Thomas A. Limoncelli, Christine Hogan:
How to Write a Book with Someone You Don't Know: Internet Collaboration for the Truly Geeky. LISA 2002 - John Hurley:
Security on Macintosh OS X. LISA 2002 - Lee Damon, Rob Kolstad:
The Evolving Ethics of System Administration. LISA 2002 - Daniel V. Klein:
The Constitutional & Financial Argument Against Spam. LISA 2002 - Paul Evans:
Risk-Taking vs. Management. LISA 2002 - Eric Allman:
So You Want to Do a Startup? LISA 2002 - W. Curtis Preston:
Making Backups Easier with Disk. LISA 2002
Work-in-Progress Reports (WiPs)
Networking
- Brad Knowles:
Domain Name Server Comparison: BIND 8 vs. BIND 9 vs. djbdns vs. ??? - Tony Bourke:
Load Balancers. LISA 2002 - Tim Pozar:
Large-Scale 802.11 Deployment. LISA 2002
Security
- Peter H. Salus:
Internet Security: Beyond Firewalls, Passwords, and Crypto. LISA 2002 - Len Sassaman:
The Promise of Privacy. LISA 2002 - Paul Proctor:
The Intrusion Detection Timeline. LISA 2002
Guru Sessions
- Jeff R. Allen:
Performance Tuning Guru. LISA 2002 - Douglas Hughes:
System Monitoring Guru. LISA 2002 - Steve Traugott:
Infrastructures Guru. LISA 2002 - Gerald Carter:
SAMBA Guru. LISA 2002 - Esther Filderman, Garry Zacheiss:
AFS Gurus. LISA 2002 - Nick Stoughton:
Consulting Guru. LISA 2002 - W. Curtis Preston:
Backups Guru. LISA 2002 - Daniel V. Klein, Mark-Jason Dominus:
Perl/Scripting Gurus. LISA 2002 - Eric Allman:
Email/MTAs Guru. LISA 2002 - Strata Rose Chalup:
Project Management Guru. LISA 2002
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.