


default search action
login - The Usenix Magazine, Volume 25
Volume 25, Number 5, August 2000
- Rob Kolstad:

MOTD. - Tina Darmohray:

apropos.
- Clif Flynt:

The Tclsh Spot. - Glen McCluskey:

Java Performance. - Prithvi Rao:

Using Java.
- Marcus J. Ranum:

The Network Police Blotter. - Rik Farrow:

Musings.
- John Sellens:

System and Network Monitoring. - Mark Burgess:

System Administration Research, Part 3. - Daniel Singer:

Toolman. - William S. Annis:

Pithy Sayings for the UNIX Sysadmin.
- John Nicholson:

Taming the Wild West. - Steve Johnson, Dusty White:

To the Limit. - Christopher M. Russo:

Keeping Employees by Keeping Them Happy.
- Virginia E. Rezmierski, Adriana Carroll, Jamie Hine:

A Study on Incident Costs and Frequencies.
- Peter H. Salus:

The Bookworm.
- Andrew Josey:

Austin Group Status Update. - Joe Gwinn:

POSIX System Services Working Group - Realtime (SSWG-RT).
- Daniel E. Geer Jr.:

From the President. - Peter H. Salus:

N Years Ago: Anniversaries. - Rob Kolstad:

The 1999 - 2000 USACO Report. - Jane-Ellen Long:

Sun Comes Through for USENIX.
Volume 25, Number 6, October 2000
- Rob Kolstad:

MOTD. - Tina Darmohray:

Apropos. - Glen McCluskey:

Letters to the Editor. - Prithvi Rao:

Using Java.
- Barbara Dijker:

Use Your Local Tools. - Marcus J. Ranum:

The Network Police Blotter. - Rik Farrow:

Musings.
- Rob Kolstad:

An Interview With Geoff Halprin. - Geoff Halprin:

An Ode to Risk Management. - Strata Rose Chalup:

Vendor Contract Services. - David K. Z. Harris, Bryan Stansell:

Finding Time To Do It All. - David W. Parter:

Sysadmin Ethics.
- Steve Johnson, Dusty White:

Just Presuppose...
- Peter H. Salus:

The Bookworm.
Volume 25, Number 7, November 2000
- Rik Farrow:

In This Issue.
- Evi Nemeth:

Securing the DNS. - David Brumley:

Repeatable Security. - Steve Romig:

Correlating Log File Entries. - Renaud Deraison, Jordan Hrycaj:

Nessus: The Free Network Security Scanner. - Mudge:

Security Devices that Might Not Be. - Sven Dietrich:

Scalpel, Gauze, and Decompilers. - Carole Fennely:

An Interview with Blaine Burnham.
- Peter H. Salus:

The Bookworm.
Volume 25, Number 8, December 2000
- Rob Kolstad:

MOTD. - Tina Darmohray:

APROPOS. - Mark Burgess:

Letters to the Editor. - John Nicholson:

National Laws and the Net. - Rik Farrow:

Musings.
- Clif Flynt:

The Tclsh Spot. - Glen McCluskey:

Java Performance. - Prithvi Rao:

Using Java.
- Marcus J. Ranum:

The Network Police Blotter. - Gary Bahadur:

Why Should You Enforce a Network Security Policy? - Dario V. Forte:

Using Trinux for Security Testing. - Brian Martin:

A Note on Security Disclosures.
- Robert Haskins:

Mail Message Metering.
- Strata Rose Chalup:

Technical Interviews. - Steve Johnson, Dusty White:

The First Miracle of Management.
- Peter H. Salus:

The Bookworm.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














