Search results

    Success, Failure, and Alternative Solutions for Network Security USENIX ATC '06Peiter "Mudge" Zatko
    Opening RemarksNSDI '06
    Greetings from a Filesystem UserFAST '05Jim Gray
    Silly Network Management TricksLISA '05Terry Slattery
    LISA Game ShowLISA '05Rob Kolstad, Dan Klein
    Picking Locks with CryptologyLISA '05Matt Blaze
    How Sysadmins Can Protect Free Speech and Privacy on the Electronic FrontierLISA '05Kevin Bankston
    Wireless SecurityLISA '05Michael H. Warfield
    Weblogs, Wikis, and RSS for System AdministratorsLISA '05Jonas Luster
    Using Your Body for Authentication: A Biometrics Guide for System AdministratorsLISA '05Michael R. Crusoe
    Automatic PC Desktop Management with Virtualization TechnologyLISA '05Monica Lam
    What's the Worst That Could Happen?LISA '05Peyton Engel
    Network Black Ops: Extracting Unexpected Functionality from Existing Networks LISA '05Dan Kaminsky
    Internet Counter-Intelligence: Offense and DefenseLISA '05Lance Cottrell
    Preventing Child Neglect in DNSSECbis Using Lookaside Validation (DLV)LISA '05Paul Vixie
    What Big Sites Can Learn from Little SitesLISA '05Tom Limoncelli
    Building MIT's Stata Center: An IT PerspectiveLISA '05Garrett Wollman
    Under 200: Applying IS Best Practices to Small CompaniesLISA '05Strata Rose Chalup
    What's a PKI, Why Would I Want One, and How Should it Be Designed?LISA '05Radia Perlman
    Modern Trends in UNIX and Linux Infrastructure ManagementLISA '05Luke Kanies
    Incident Command for IT: What We Can Learn from the Fire DepartmentLISA '05Brent Chapman
    Scaling Search Beyond the Public WebLISA '05Qi Lu
    Homeland Security: Networking, Security, and PolicyUSENIX Security '05Douglas Maughan
    Computer Security in the Real WorldUSENIX Security '05Butler W. Lampson
    Human-Computer Interaction Opportunities for Improving SecurityUSENIX Security '05Ben Shneiderman