![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/usenix-login/usenix-login30.bht:"
@article{DBLP:journals/usenix-login/AdamoT05, author = {Massimiliano Adamo and Mauro Tabl{\`{o}}}, title = {Linux vs. OpenBSD: {A} Firewall Performance Test}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/linux-vs-openbsd-firewall-performance-test}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/AdamoT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Alder05, author = {Raven Alder}, title = {A Summary of Savvy Backbone Defense}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/summary-savvy-backbone-defense}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Alder05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Alexander05, author = {Steven Alexander}, title = {Why Teenagers Hack: {A} Personal Memoir}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/why-teenagers-hack-personal-memoir}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Alexander05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Alexander05a, author = {Steven Alexander}, title = {The Importance of Securing Workstations}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/importance-securing-workstations}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Alexander05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Alexander05b, author = {Steven Alexander}, title = {Letter to the Editor}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/letter-editor}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Alexander05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Alexander05c, author = {Steven Alexander}, title = {Defeating Compiler-level Buffer Overflow Protection}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/defeating-compiler-level-buffer-overflow-protection}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Alexander05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Andress05, author = {Jason G. Andress}, title = {IPv6: The Next Internet Protocol}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/ipv6-next-internet-protocol}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Andress05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Appelman05, author = {Daniel L. Appelman}, title = {Primer on Cybercrime Laws}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/primer-cybercrime-laws}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Appelman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Arkin05, author = {Ofir Arkin}, title = {Demystifying Passive Network Discovery and Monitoring Systems}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/demystifying-passive-network-discovery-and}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Arkin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Burgess05, author = {Mark Burgess}, title = {The Profession of System Administration}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/profession-system-administration}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Burgess05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chak05, author = {Heison Chak}, title = {Voice over {IP} with Asterisk}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/voice-over-ip-asterisk}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chak05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chak05a, author = {Heison Chak}, title = {More Asterisk Tricks}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/more-asterisk-tricks}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chak05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chow05, author = {Ming Chow}, title = {Teaching Computer Security, Privacy, and Politics}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/teaching-computer-security-privacy-and-politics}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chow05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/CrowcroftFH0W05, author = {Jon Crowcroft and Keir Fraser and Steven Hand and Ian Pratt and Andrew Warfield}, title = {The Inevitability of Xen}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/inevitability-xen}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/usenix-login/CrowcroftFH0W05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Darmohray05, author = {Tina Darmohray}, title = {Firewalls and Fairy Tales}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/firewalls-and-fairy-tales}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Darmohray05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/El-KadiNGDSNM05, author = {Amr El{-}Kadi and Ahmed Nashed and Kareem El Gebaly and Mahmoud Abo Daoud and Noha El Sharawy and Rania Nazmi and Mostafa Mazen}, title = {Architecture and Internal Design of the AUC-Abyss Web Server}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/architecture-and-internal-design-auc-abyss-web}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/El-KadiNGDSNM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05a, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05b, author = {Rik Farrow}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05c, author = {Rik Farrow}, title = {Short Topics Booklets}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/short-topics-booklets}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05d, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05e, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05f, author = {Rik Farrow}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05g, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow05h, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow05h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/FarrowH05, author = {Rik Farrow and Chuck Hardin}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/FarrowH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Finke05, author = {Jon Finke}, title = {Letter to the Editor}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/letter-editor}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Finke05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Fiuczynski05, author = {Marc E. Fiuczynski}, title = {Better Tools for Kernel Evolution, Please!}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/better-tools-kernel-evolution-please}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Fiuczynski05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Flynt05, author = {Clif Flynt}, title = {The Tclsh Spot}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/tclsh-spot}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Flynt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Frisch05, author = {{\AE}leen Frisch}, title = {The Bookworm}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Frisch05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Frisch05a, author = {{\AE}leen Frisch}, title = {The Bookworm}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Frisch05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Galvin05, author = {Peter Baer Galvin}, title = {Solaris 10 Containers}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/solaris-10-containers}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Galvin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer05, author = {Dan Geer}, title = {Monoculture on the Back of the Envelope}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/monoculture-back-envelope}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins05, author = {Robert Haskins}, title = {ISPadmin}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/ispadmin}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins05a, author = {Robert Haskins}, title = {ISPadmin: Interview with Vipul Ved Prakash}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/ispadmin-interview-vipul-ved-prakash}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins05b, author = {Robert Haskins}, title = {ISPadmin: Understanding and Mitigating DDoS Attacks}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/ispadmin-understanding-and-mitigating-ddos-attacks}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins05c, author = {Robert Haskins}, title = {ISPadmin: Embedded Hardware}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/ispadmin-embedded-hardware}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Heiser05, author = {Gernot Heiser}, title = {Secure Embedded Systems Need Microkernels}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/secure-embedded-systems-need-microkernels}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Heiser05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Hobbit05, author = {Hobbit}, title = {DNS-based Spam Rejection}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/dns-based-spam-rejection}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Hobbit05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Holz05, author = {Thorsten Holz}, title = {Spying with Bots}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/spying-bots}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Holz05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Howe05, author = {Anthony Howe}, title = {Shoot the Messenger: Some Techniques for Spam Control}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/shoot-messenger-some-techniques-spam-control}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Howe05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Hume05, author = {Andrew Hume}, title = {How's Your {OS} These Days?}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/hows-your-os-these-days}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Hume05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JordanRW05, author = {Christopher Jordan and Jason Royes and Jesse Whyte}, title = {Writing Detection Signatures}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/writing-detection-signatures}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JordanRW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kandula05, author = {Srikanth Kandula}, title = {Surviving DDoS Attacks}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/surviving-ddos-attacks}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kandula05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kanies05, author = {Luke Kanies}, title = {Using Version Control in System Administration}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/using-version-control-system-administration}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kanies05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad05, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad05a, author = {Rob Kolstad}, title = {SAGE-News Article on {SCO} Defacement}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/sage-news-article-sco-defacement}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad05b, author = {Rob Kolstad}, title = {{MOTD:} Leverage}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/motd-leverage}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad05c, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad05d, author = {Rob Kolstad}, title = {USACO, the {USA} Computing Olympiad}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/usaco-usa-computing-olympiad}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad05e, author = {Rob Kolstad}, title = {{USACO} Team Brings Home the Gold}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/usaco-team-brings-home-gold}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Levin05, author = {Adam Levin}, title = {{SAN} vs. {NAS} for Oracle: {A} Tale of Two Protocols}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/san-vs-nas-oracle-tale-two-protocols}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Levin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Loza05, author = {Boris Loza}, title = {Under Attack: Dealing with Missing {UNIX} Files}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/under-attack-dealing-missing-unix-files}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Loza05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Loza05a, author = {Boris Loza}, title = {Finding Trojans for Fun and Profit}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/finding-trojans-fun-and-profit}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Loza05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Lucas05, author = {Michael W. Lucas}, title = {FreeBSD 5 SMPng}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/freebsd-5-smpng}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Lucas05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/MainlandW05, author = {Geoffrey Mainland and Matt Welsh}, title = {Distributed, Adaptive Resource Allocation for Sensor Networks}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/distributed-adaptive-resource-allocation-sensor}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/MainlandW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Malone05, author = {David Malone}, title = {Security Through Obscurity: {A} Review of a Few of FreeBSD's Lesser-Known Security Capabilities}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/security-through-obscurity-review-few-freebsds}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Malone05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Manzuik05, author = {Steve Manzuik}, title = {Your Defense Is Offensive}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/your-defense-offensive}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Manzuik05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey05, author = {Glen McCluskey}, title = {Working with C{\#} Serialization}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/working-c-serialization}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCullough05, author = {Mark McCullough}, title = {Secure Automated File Transfer}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/secure-automated-file-transfer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCullough05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Miller05, author = {Hal Miller}, title = {Customer Requirements Specificationsfor System Administrators}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/customer-requirements-specifications-system}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Miller05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Mulligan05, author = {Tara Mulligan}, title = {Summary of {USENIX} Board of Directors Actions}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/summary-usenix-board-directors-actions}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Mulligan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Mulligan05a, author = {Tara Mulligan}, title = {Summary of the {USENIX} Board of Directors Actions}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/summary-usenix-board-directors-actions}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Mulligan05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/MulliganD05, author = {Tara Mulligan and Anne Dickison}, title = {New Membership Benefits}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/new-membership-benefits}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/MulliganD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Palmer05, author = {Chris Palmer}, title = {{SAGE} Update}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/sage-update}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Palmer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Parter05, author = {David W. Parter}, title = {{SAGE} Update}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/sage-update}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Parter05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Peisert05, author = {Sean Peisert}, title = {Forensics for System Administrators}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/forensics-system-administrators}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Peisert05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/PotterN05, author = {Shaya Potter and Jason Nieh}, title = {Breaking the Ties That Bind: Application Isolation and Migration}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/breaking-ties-bind-application-isolation-and}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/PotterN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Prevelakis05, author = {Vassilis Prevelakis}, title = {The Virtual Firewall}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/virtual-firewall}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Prevelakis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ranum05, author = {Marcus J. Ranum}, title = {Letters to the Editor}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/letters-editor}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ranum05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus05, author = {Peter H. Salus}, title = {The Bookworm}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus05a, author = {Peter H. Salus}, title = {20 Years Ago ... and More}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/20-years-ago-and-more}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus05b, author = {Peter H. Salus}, title = {Years and Years Ago}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/years-and-years-ago}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus05c, author = {Peter H. Salus}, title = {Thirtieth Anniversary, {USENIX} Association}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/thirtieth-anniversary-usenix-association}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus05d, author = {Peter H. Salus}, title = {Annual Awards}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/annual-awards}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus05e, author = {Peter H. Salus}, title = {20 Years Ago in ;login}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/20-years-ago-login}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus05f, author = {Peter H. Salus}, title = {25 Years Ago}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/25-years-ago}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus05g, author = {Peter H. Salus}, title = {2006 Election for Board of Directors}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/2006-election-board-directors}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus05g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SalusS05, author = {Emily W. Salus and Peter H. Salus}, title = {Marketing After the Bubble}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/marketing-after-bubble}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SalusS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Singer05, author = {Abe Singer}, title = {Tempting Fate}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/tempting-fate}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Singer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Singer05a, author = {Abe Singer}, title = {Conference Password Sniffing: Legal and Ethical Issues}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/conference-password-sniffing-legal-and-ethical}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Singer05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sluyter05, author = {Thomas Sluyter}, title = {Getting What You Want: The Fine Art of Proposal Writing}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/getting-what-you-want-fine-art-proposal-writing}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sluyter05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SluyterM05, author = {Thomas Sluyter and Roland van Maarschalkerweerd}, title = {When Disaster Strikes: Cailin and Roland Discuss Crisis Management}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/when-disaster-strikes-cailin-and-roland-discuss}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SluyterM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Stoughton05, author = {Nick Stoughton}, title = {Update on Standards}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/update-standards}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Stoughton05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/StoverD05, author = {Sam Stover and Matthew Dickerson}, title = {Using Memory Dumps in Digital Forensics}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/using-memory-dumps-digital-forensics}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/StoverD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Turoff05, author = {Adam Turoff}, title = {Practical Perl: Error Handling Patterns in Perl}, journal = {login Usenix Mag.}, volume = {30}, number = {1}, year = {2005}, url = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/practical-perl-error-handling-patterns-perl}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Turoff05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Turoff05a, author = {Adam Turoff}, title = {Practical Perl: Programs to Write Programs}, journal = {login Usenix Mag.}, volume = {30}, number = {2}, year = {2005}, url = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/practical-perl-programs-write-programs}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Turoff05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Turoff05b, author = {Adam Turoff}, title = {Practical Perl: Date and Time Formatting in Perl}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/practical-perl-date-and-time-formatting-perl}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Turoff05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Turoff05c, author = {Adam Turoff}, title = {Practical Perl: Defensive {CGI} Programming with Taint Mode and {CGI:} : Untaint}, journal = {login Usenix Mag.}, volume = {30}, number = {4}, year = {2005}, url = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/practical-perl-defensive-cgi-programming-taint}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Turoff05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Young05, author = {Ellie Young}, title = {Vale, Rob, atque Ave, Rik}, journal = {login Usenix Mag.}, volume = {30}, number = {3}, year = {2005}, url = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/vale-rob-atque-ave-rik}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Young05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Young05a, author = {Ellie Young}, title = {Thanks to Our Volunteers}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/thanks-our-volunteers}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Young05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/YoungM05, author = {Ellie Young and Tara Mulligan}, title = {Summary of {USENIX} Board of Directors Meetings}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/summary-usenix-board-directors-meetings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/YoungM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Zwicky05, author = {Elizabeth Zwicky}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Zwicky05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/ZwickyT05, author = {Elizabeth Zwicky and Adam Turoff}, title = {Book Reviews}, journal = {login Usenix Mag.}, volume = {30}, number = {5}, year = {2005}, url = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/book-reviews}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/ZwickyT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.