Search dblp for Publications

export results for "toc:db/journals/usenix-login/usenix-login30.bht:"

 download as .bib file

@article{DBLP:journals/usenix-login/AdamoT05,
  author       = {Massimiliano Adamo and
                  Mauro Tabl{\`{o}}},
  title        = {Linux vs. OpenBSD: {A} Firewall Performance Test},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/linux-vs-openbsd-firewall-performance-test},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/AdamoT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Alder05,
  author       = {Raven Alder},
  title        = {A Summary of Savvy Backbone Defense},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/summary-savvy-backbone-defense},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Alder05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Alexander05,
  author       = {Steven Alexander},
  title        = {Why Teenagers Hack: {A} Personal Memoir},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/why-teenagers-hack-personal-memoir},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Alexander05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Alexander05a,
  author       = {Steven Alexander},
  title        = {The Importance of Securing Workstations},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/importance-securing-workstations},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Alexander05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Alexander05b,
  author       = {Steven Alexander},
  title        = {Letter to the Editor},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/letter-editor},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Alexander05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Alexander05c,
  author       = {Steven Alexander},
  title        = {Defeating Compiler-level Buffer Overflow Protection},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/defeating-compiler-level-buffer-overflow-protection},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Alexander05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Andress05,
  author       = {Jason G. Andress},
  title        = {IPv6: The Next Internet Protocol},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/ipv6-next-internet-protocol},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Andress05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Appelman05,
  author       = {Daniel L. Appelman},
  title        = {Primer on Cybercrime Laws},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/primer-cybercrime-laws},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Appelman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Arkin05,
  author       = {Ofir Arkin},
  title        = {Demystifying Passive Network Discovery and Monitoring Systems},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/demystifying-passive-network-discovery-and},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Arkin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Burgess05,
  author       = {Mark Burgess},
  title        = {The Profession of System Administration},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/profession-system-administration},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Burgess05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Chak05,
  author       = {Heison Chak},
  title        = {Voice over {IP} with Asterisk},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/voice-over-ip-asterisk},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Chak05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Chak05a,
  author       = {Heison Chak},
  title        = {More Asterisk Tricks},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/more-asterisk-tricks},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Chak05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Chow05,
  author       = {Ming Chow},
  title        = {Teaching Computer Security, Privacy, and Politics},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/teaching-computer-security-privacy-and-politics},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Chow05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/CrowcroftFH0W05,
  author       = {Jon Crowcroft and
                  Keir Fraser and
                  Steven Hand and
                  Ian Pratt and
                  Andrew Warfield},
  title        = {The Inevitability of Xen},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/inevitability-xen},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/usenix-login/CrowcroftFH0W05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Darmohray05,
  author       = {Tina Darmohray},
  title        = {Firewalls and Fairy Tales},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/firewalls-and-fairy-tales},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Darmohray05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/El-KadiNGDSNM05,
  author       = {Amr El{-}Kadi and
                  Ahmed Nashed and
                  Kareem El Gebaly and
                  Mahmoud Abo Daoud and
                  Noha El Sharawy and
                  Rania Nazmi and
                  Mostafa Mazen},
  title        = {Architecture and Internal Design of the AUC-Abyss Web Server},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/architecture-and-internal-design-auc-abyss-web},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/El-KadiNGDSNM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05a,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05b,
  author       = {Rik Farrow},
  title        = {Book Reviews},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/book-reviews},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05c,
  author       = {Rik Farrow},
  title        = {Short Topics Booklets},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/short-topics-booklets},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05d,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05e,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05f,
  author       = {Rik Farrow},
  title        = {Book Reviews},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/book-reviews},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05g,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Farrow05h,
  author       = {Rik Farrow},
  title        = {Musings},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/musings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Farrow05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/FarrowH05,
  author       = {Rik Farrow and
                  Chuck Hardin},
  title        = {Book Reviews},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/book-reviews},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/FarrowH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Finke05,
  author       = {Jon Finke},
  title        = {Letter to the Editor},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/letter-editor},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Finke05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Fiuczynski05,
  author       = {Marc E. Fiuczynski},
  title        = {Better Tools for Kernel Evolution, Please!},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/better-tools-kernel-evolution-please},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Fiuczynski05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Flynt05,
  author       = {Clif Flynt},
  title        = {The Tclsh Spot},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/tclsh-spot},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Flynt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Frisch05,
  author       = {{\AE}leen Frisch},
  title        = {The Bookworm},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/bookworm},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Frisch05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Frisch05a,
  author       = {{\AE}leen Frisch},
  title        = {The Bookworm},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/bookworm},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Frisch05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Galvin05,
  author       = {Peter Baer Galvin},
  title        = {Solaris 10 Containers},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/solaris-10-containers},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Galvin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Geer05,
  author       = {Dan Geer},
  title        = {Monoculture on the Back of the Envelope},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/monoculture-back-envelope},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Geer05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Haskins05,
  author       = {Robert Haskins},
  title        = {ISPadmin},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/ispadmin},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Haskins05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Haskins05a,
  author       = {Robert Haskins},
  title        = {ISPadmin: Interview with Vipul Ved Prakash},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/ispadmin-interview-vipul-ved-prakash},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Haskins05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Haskins05b,
  author       = {Robert Haskins},
  title        = {ISPadmin: Understanding and Mitigating DDoS Attacks},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/ispadmin-understanding-and-mitigating-ddos-attacks},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Haskins05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Haskins05c,
  author       = {Robert Haskins},
  title        = {ISPadmin: Embedded Hardware},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/ispadmin-embedded-hardware},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Haskins05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Heiser05,
  author       = {Gernot Heiser},
  title        = {Secure Embedded Systems Need Microkernels},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/secure-embedded-systems-need-microkernels},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Heiser05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Hobbit05,
  author       = {Hobbit},
  title        = {DNS-based Spam Rejection},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/dns-based-spam-rejection},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Hobbit05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Holz05,
  author       = {Thorsten Holz},
  title        = {Spying with Bots},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/spying-bots},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Holz05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Howe05,
  author       = {Anthony Howe},
  title        = {Shoot the Messenger: Some Techniques for Spam Control},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/shoot-messenger-some-techniques-spam-control},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Howe05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Hume05,
  author       = {Andrew Hume},
  title        = {How's Your {OS} These Days?},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/hows-your-os-these-days},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Hume05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/JordanRW05,
  author       = {Christopher Jordan and
                  Jason Royes and
                  Jesse Whyte},
  title        = {Writing Detection Signatures},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/writing-detection-signatures},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/JordanRW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kandula05,
  author       = {Srikanth Kandula},
  title        = {Surviving DDoS Attacks},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/surviving-ddos-attacks},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kandula05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kanies05,
  author       = {Luke Kanies},
  title        = {Using Version Control in System Administration},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/using-version-control-system-administration},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kanies05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad05,
  author       = {Rob Kolstad},
  title        = {{MOTD}},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/motd},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad05a,
  author       = {Rob Kolstad},
  title        = {SAGE-News Article on {SCO} Defacement},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/sage-news-article-sco-defacement},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad05b,
  author       = {Rob Kolstad},
  title        = {{MOTD:} Leverage},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/motd-leverage},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad05c,
  author       = {Rob Kolstad},
  title        = {{MOTD}},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/motd},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad05d,
  author       = {Rob Kolstad},
  title        = {USACO, the {USA} Computing Olympiad},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/usaco-usa-computing-olympiad},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Kolstad05e,
  author       = {Rob Kolstad},
  title        = {{USACO} Team Brings Home the Gold},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/usaco-team-brings-home-gold},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Kolstad05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Levin05,
  author       = {Adam Levin},
  title        = {{SAN} vs. {NAS} for Oracle: {A} Tale of Two Protocols},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/san-vs-nas-oracle-tale-two-protocols},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Levin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Loza05,
  author       = {Boris Loza},
  title        = {Under Attack: Dealing with Missing {UNIX} Files},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/under-attack-dealing-missing-unix-files},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Loza05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Loza05a,
  author       = {Boris Loza},
  title        = {Finding Trojans for Fun and Profit},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/finding-trojans-fun-and-profit},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Loza05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Lucas05,
  author       = {Michael W. Lucas},
  title        = {FreeBSD 5 SMPng},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/freebsd-5-smpng},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Lucas05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/MainlandW05,
  author       = {Geoffrey Mainland and
                  Matt Welsh},
  title        = {Distributed, Adaptive Resource Allocation for Sensor Networks},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/distributed-adaptive-resource-allocation-sensor},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/MainlandW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Malone05,
  author       = {David Malone},
  title        = {Security Through Obscurity: {A} Review of a Few of FreeBSD's Lesser-Known
                  Security Capabilities},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/security-through-obscurity-review-few-freebsds},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Malone05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Manzuik05,
  author       = {Steve Manzuik},
  title        = {Your Defense Is Offensive},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/your-defense-offensive},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Manzuik05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/McCluskey05,
  author       = {Glen McCluskey},
  title        = {Working with C{\#} Serialization},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/working-c-serialization},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/McCluskey05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/McCullough05,
  author       = {Mark McCullough},
  title        = {Secure Automated File Transfer},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/secure-automated-file-transfer},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/McCullough05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Miller05,
  author       = {Hal Miller},
  title        = {Customer Requirements Specificationsfor System Administrators},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/customer-requirements-specifications-system},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Miller05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Mulligan05,
  author       = {Tara Mulligan},
  title        = {Summary of {USENIX} Board of Directors Actions},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/summary-usenix-board-directors-actions},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Mulligan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Mulligan05a,
  author       = {Tara Mulligan},
  title        = {Summary of the {USENIX} Board of Directors Actions},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/summary-usenix-board-directors-actions},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Mulligan05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/MulliganD05,
  author       = {Tara Mulligan and
                  Anne Dickison},
  title        = {New Membership Benefits},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/new-membership-benefits},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/MulliganD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Palmer05,
  author       = {Chris Palmer},
  title        = {{SAGE} Update},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/sage-update},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Palmer05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Parter05,
  author       = {David W. Parter},
  title        = {{SAGE} Update},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/sage-update},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Parter05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Peisert05,
  author       = {Sean Peisert},
  title        = {Forensics for System Administrators},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/forensics-system-administrators},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Peisert05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/PotterN05,
  author       = {Shaya Potter and
                  Jason Nieh},
  title        = {Breaking the Ties That Bind: Application Isolation and Migration},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/breaking-ties-bind-application-isolation-and},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/PotterN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Prevelakis05,
  author       = {Vassilis Prevelakis},
  title        = {The Virtual Firewall},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/virtual-firewall},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Prevelakis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Ranum05,
  author       = {Marcus J. Ranum},
  title        = {Letters to the Editor},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/letters-editor},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Ranum05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus05,
  author       = {Peter H. Salus},
  title        = {The Bookworm},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/bookworm},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus05a,
  author       = {Peter H. Salus},
  title        = {20 Years Ago ... and More},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/20-years-ago-and-more},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus05b,
  author       = {Peter H. Salus},
  title        = {Years and Years Ago},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/years-and-years-ago},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus05c,
  author       = {Peter H. Salus},
  title        = {Thirtieth Anniversary, {USENIX} Association},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/thirtieth-anniversary-usenix-association},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus05d,
  author       = {Peter H. Salus},
  title        = {Annual Awards},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/annual-awards},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus05e,
  author       = {Peter H. Salus},
  title        = {20 Years Ago in ;login},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/20-years-ago-login},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus05f,
  author       = {Peter H. Salus},
  title        = {25 Years Ago},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/25-years-ago},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Salus05g,
  author       = {Peter H. Salus},
  title        = {2006 Election for Board of Directors},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/2006-election-board-directors},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Salus05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/SalusS05,
  author       = {Emily W. Salus and
                  Peter H. Salus},
  title        = {Marketing After the Bubble},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/marketing-after-bubble},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/SalusS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Singer05,
  author       = {Abe Singer},
  title        = {Tempting Fate},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/tempting-fate},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Singer05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Singer05a,
  author       = {Abe Singer},
  title        = {Conference Password Sniffing: Legal and Ethical Issues},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/conference-password-sniffing-legal-and-ethical},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Singer05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Sluyter05,
  author       = {Thomas Sluyter},
  title        = {Getting What You Want: The Fine Art of Proposal Writing},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/getting-what-you-want-fine-art-proposal-writing},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Sluyter05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/SluyterM05,
  author       = {Thomas Sluyter and
                  Roland van Maarschalkerweerd},
  title        = {When Disaster Strikes: Cailin and Roland Discuss Crisis Management},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/when-disaster-strikes-cailin-and-roland-discuss},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/SluyterM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Stoughton05,
  author       = {Nick Stoughton},
  title        = {Update on Standards},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/update-standards},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Stoughton05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/StoverD05,
  author       = {Sam Stover and
                  Matthew Dickerson},
  title        = {Using Memory Dumps in Digital Forensics},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/using-memory-dumps-digital-forensics},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/StoverD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Turoff05,
  author       = {Adam Turoff},
  title        = {Practical Perl: Error Handling Patterns in Perl},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {1},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/february-2005-volume-30-number-1/practical-perl-error-handling-patterns-perl},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Turoff05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Turoff05a,
  author       = {Adam Turoff},
  title        = {Practical Perl: Programs to Write Programs},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {2},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/april-2005-volume-30-number-2/practical-perl-programs-write-programs},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Turoff05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Turoff05b,
  author       = {Adam Turoff},
  title        = {Practical Perl: Date and Time Formatting in Perl},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/practical-perl-date-and-time-formatting-perl},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Turoff05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Turoff05c,
  author       = {Adam Turoff},
  title        = {Practical Perl: Defensive {CGI} Programming with Taint Mode and {CGI:}
                  : Untaint},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {4},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/august-2005-volume-30-number-4/practical-perl-defensive-cgi-programming-taint},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Turoff05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Young05,
  author       = {Ellie Young},
  title        = {Vale, Rob, atque Ave, Rik},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {3},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/june-2005-volume-30-number-3/vale-rob-atque-ave-rik},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Young05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Young05a,
  author       = {Ellie Young},
  title        = {Thanks to Our Volunteers},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/thanks-our-volunteers},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Young05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/YoungM05,
  author       = {Ellie Young and
                  Tara Mulligan},
  title        = {Summary of {USENIX} Board of Directors Meetings},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/summary-usenix-board-directors-meetings},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/YoungM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Zwicky05,
  author       = {Elizabeth Zwicky},
  title        = {Book Reviews},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {6},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/book-reviews},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Zwicky05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/ZwickyT05,
  author       = {Elizabeth Zwicky and
                  Adam Turoff},
  title        = {Book Reviews},
  journal      = {login Usenix Mag.},
  volume       = {30},
  number       = {5},
  year         = {2005},
  url          = {https://www.usenix.org/publications/login/october-2005-volume-30-number-5/book-reviews},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/ZwickyT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics