default search action
Search dblp for Publications
export results for "toc:db/journals/usenix-login/usenix-login27.bht:"
@article{DBLP:journals/usenix-login/Allison02, author = {Jared Allison}, title = {Automated Log Procesing}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/automated-log-procesing}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Allison02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Arkin02, author = {Ofir Arkin}, title = {A Remote Active {OS} Fingerprinting Tool Using {ICMP}}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/remote-active-os-fingerprinting-tool-using-icmp}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Arkin02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Arkin02a, author = {Ofir Arkin}, title = {Security Threats to {IP} Telephony-Based Networks}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/security-threats-ip-telephony-based-networks}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Arkin02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Ashizawa02, author = {Neil Ashizawa}, title = {Monitoring Strategies for High-Availability Web Apps}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/monitoring-strategies-high-availability-web-apps}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Ashizawa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Carlini02, author = {James Carlini}, title = {Cabling: Just the Tip of the Iceberg}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/cabling-just-tip-iceberg}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Carlini02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chalup02, author = {Strata R. Chalup}, title = {Consulting Reflections}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/consulting-reflections}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chalup02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chalup02a, author = {Strata R. Chalup}, title = {Wiki, Blog, Zope, and Other Communicative Grunts}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/wiki-blog-zope-and-other-communicative-grunts}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chalup02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chalup02b, author = {Strata R. Chalup}, title = {Uncle Sam as Uncle Spam}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/uncle-sam-uncle-spam}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chalup02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Chalup02c, author = {Strata R. Chalup}, title = {Vive la R{\'{e}}volution! Now Get Over It!}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/vive-la-r\%C3\%A9volution-now-get-over-it}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Chalup02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Cohen02, author = {Gary Cohen}, title = {Securing {FTP}}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/securing-ftp}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Cohen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Danielyan02, author = {Edgar Danielyan}, title = {The Law Moves In}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/law-moves}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Danielyan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Darmohray02, author = {Tina Darmohray}, title = {Apropos}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/apropos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Darmohray02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Darmohray02a, author = {Tina Darmohray}, title = {Apropos}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/apropos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Darmohray02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Darmohray02b, author = {Tina Darmohray}, title = {Apropos}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/apropos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Darmohray02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Darmohray02c, author = {Tina Darmohray}, title = {Apropos}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/apropos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Darmohray02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/DarmohrayK02, author = {Tina Darmohray and Rob Kolstad}, title = {Point/Counterpoint}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/pointcounterpoint}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/DarmohrayK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Dietrich02, author = {Sven Dietrich}, title = {Active Network Defense: Some Concepts and Techniques}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/active-network-defense-some-concepts-and}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Dietrich02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow02, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow02a, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow02b, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow02c, author = {Rik Farrow}, title = {Musings}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/musings}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow02d, author = {Rik Farrow}, title = {Musings, Or What {I} Did on My Summer Vacation}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/musings-or-what-i-did-my-summer-vacation}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow02d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Farrow02e, author = {Rik Farrow}, title = {In This Issue}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/issue}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Farrow02e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Flynt02, author = {Clif Flynt}, title = {Letters to the Editors}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/letters-editors}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Flynt02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Flynt02a, author = {Clif Flynt}, title = {The Tclsh Spot}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/tclsh-spot}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Flynt02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Flynt02b, author = {Clif Flynt}, title = {The Tclsh Spot}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/tclsh-spot}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Flynt02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Flynt02c, author = {Clif Flynt}, title = {The Tclsh Spot}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/tclsh-spot}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Flynt02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Flynt02d, author = {Clif Flynt}, title = {Generating Ethernet Packets}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/generating-ethernet-packets}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Flynt02d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Foust02, author = {Robert Foust}, title = {Identifying and Tracking Unauthorized 802.11 Cards and Access Points}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/identifying-and-tracking-unauthorized-80211-cards}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Foust02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/FuKM02, author = {Kevin Fu and Michael Kaminsky and David Mazi{\`{e}}res}, title = {Using {SFS} for a Secure Network File System}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/using-sfs-secure-network-file-system}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/FuKM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Harris02, author = {Trey Harris}, title = {Ask Mr. Know-It-All}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/ask-mr-know-it-all}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Harris02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins02, author = {Robert Haskins}, title = {ISPAdmin}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/ispadmin}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins02a, author = {Robert Haskins}, title = {ISPAdmin}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/ispadmin}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins02b, author = {Robert Haskins}, title = {ISPAdmin}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/ispadmin}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Haskins02c, author = {Robert Haskins}, title = {ISPAdmin}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/ispadmin}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Haskins02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Hobbit02, author = {Hobbit}, title = {High Availability}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/high-availability}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Hobbit02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Hope02, author = {Paco Hope}, title = {Using Jails in FreeBSD for Fun and Profit}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/using-jails-freebsd-fun-and-profit}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Hope02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JohnsonW02, author = {Steve Johnson and Dusty White}, title = {Judgment}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/judgment}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JohnsonW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Jones02, author = {George M. Jones}, title = {The Case for Network Infrastructure Security}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/case-network-infrastructure-security}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Jones02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Josey02, author = {Andrew Josey}, title = {Report received August 2002}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/report-received-august-2002}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Josey02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kenneally02, author = {Erin Kenneally}, title = {Evolving Behavioral Boundaries in Cyberspace}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/evolving-behavioral-boundaries-cyberspace}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kenneally02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kenneally02a, author = {Erin Kenneally}, title = {Computer Forensics}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/computer-forensics}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kenneally02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kenneally02b, author = {Erin Kenneally}, title = {"It Depends": Defining Legal Values for Network Behavior}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/it-depends-defining-legal-values-network}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kenneally02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad02, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad02a, author = {Rob Kolstad}, title = {Conference on File and Storage Technologies {(FAST} '02)}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/conference-file-and-storage-technologies-fast-02}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad02b, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad02c, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad02d, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad02d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Kolstad02e, author = {Rob Kolstad}, title = {{MOTD}}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/motd}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Kolstad02e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey02, author = {Glen McCluskey}, title = {New Preprocessor Features in {C9X}}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/new-preprocessor-features-c9x}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey02a, author = {Glen McCluskey}, title = {Math Library Functions in {C9X}}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/math-library-functions-c9x}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey02b, author = {Glen McCluskey}, title = {New {I/O} Features in {C9X}}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/new-io-features-c9x}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey02c, author = {Glen McCluskey}, title = {Wide Characters}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/wide-characters}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/McCluskey02d, author = {Glen McCluskey}, title = {{C99} and Compatability}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/c99-and-compatability}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/McCluskey02d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Moen02, author = {Rick Moen}, title = {A Recipe for a Successful Linux User Group}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/recipe-successful-linux-user-group}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Moen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Nicholson02, author = {John Nicholson}, title = {Data Privacy}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/data-privacy}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Nicholson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Nicholson02a, author = {John Nicholson}, title = {Software Licensing 101}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/software-licensing-101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Nicholson02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Owen02, author = {Howard Owen}, title = {The Problem of {PORCMOLSULB}}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/problem-porcmolsulb}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Owen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Patterson02, author = {David A. Patterson}, title = {An Introduction to Dependability}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/introduction-dependability}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Patterson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Perrine02, author = {Tom Perrine}, title = {The Kernelized Secure Operating System {(KSOS)}}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/kernelized-secure-operating-system-ksos}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Perrine02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Russo02, author = {Christopher M. Russo}, title = {What is Your Problem? That Email Was Fine!}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/what-your-problem-email-was-fine}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Russo02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus02, author = {Peter H. Salus}, title = {The Bookworm}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Salus02a, author = {Peter H. Salus}, title = {Secure from What?}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/secure-what}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Salus02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SalusC02, author = {Peter H. Salus and Anton Chuvakin}, title = {Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SalusC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SalusK02, author = {Peter H. Salus and Nina Karhuluoma}, title = {Have You Locked the Castle Gates? reviewed by Chuck Hardin, and of John Viega and Gary McGraw: Building Secure Software}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SalusK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SalusS02, author = {Peter H. Salus and Raymond M. Schneider}, title = {The Bookworm / "Agile Software Development" by Alistair Cockburn}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SalusS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SalusS02a, author = {Peter H. Salus and Raymond M. Schneider}, title = {Dave Sill: The qmail Handbook reviewed by Dustin Puryear, and of Yukihiro Matsumoto w/translated text by David L. Reynolds: Ruby in a Nutshell}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/bookworm}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SalusS02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sellens02, author = {John Sellens}, title = {Ten Reasons to Monitor Your System}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/ten-reasons-monitor-your-system}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sellens02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Singer02, author = {Abe Singer}, title = {The Regional Information Watch}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/regional-information-watch}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Singer02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Sitaker02, author = {Kragen Sitaker}, title = {Python or Perl: Which is Better?}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/python-or-perl-which-better}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Sitaker02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Skvarcek02, author = {Jozef Skvarcek}, title = {Remote Monitoring with {SNMP}}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/remote-monitoring-snmp}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Skvarcek02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Spitzner02, author = {Lance Spitzner}, title = {{HOSUS} (Honeypot Surveillance System)}, journal = {login Usenix Mag.}, volume = {27}, number = {6}, year = {2002}, url = {https://www.usenix.org/publications/login/december-2002-volume-27-number-6/hosus-honeypot-surveillance-system}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Spitzner02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Swartz02, author = {Ray Swartz}, title = {When Do You Plan to Retire?}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/when-do-you-plan-retire}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Swartz02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Swartz02a, author = {Ray Swartz}, title = {Planning a Model Retirement}, journal = {login Usenix Mag.}, volume = {27}, number = {2}, year = {2002}, url = {https://www.usenix.org/publications/login/april-2002-volume-27-number-2/planning-model-retirement}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Swartz02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Turoff02, author = {Adam Turoff}, title = {Practical Perl}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/practical-perl}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Turoff02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Turoff02a, author = {Adam Turoff}, title = {Practical Perl}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/practical-perl}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Turoff02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Turoff02b, author = {Adam Turoff}, title = {Practical Perl}, journal = {login Usenix Mag.}, volume = {27}, number = {5}, year = {2002}, url = {https://www.usenix.org/publications/login/october-2002-volume-27-number-5/practical-perl}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Turoff02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Tylock02, author = {Steven M. Tylock}, title = {{GVSAGE} Visits the Local Technology Show}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/gvsage-visits-local-technology-show}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Tylock02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Tylock02a, author = {Steven M. Tylock}, title = {If Computers Had Blood, We'd Be Called Doctors, Part 2}, journal = {login Usenix Mag.}, volume = {27}, number = {1}, year = {2002}, url = {https://www.usenix.org/publications/login/february-2002-volume-27-number-1/if-computers-had-blood-wed-be-called-doctors}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Tylock02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Tylock02b, author = {Steven M. Tylock}, title = {If Systems Were Cars, Would Yours Be Doubled Parked?}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/if-systems-were-cars-would-yours-be-doubled-parked}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Tylock02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Tylock02c, author = {Steven M. Tylock}, title = {The SysAdmin's Court: Liz Action vs. Jack Trades}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/sysadmins-court-liz-action-vs-jack-trades}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Tylock02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Wolf02, author = {Gunnar E. Wolf}, title = {ProtoWrap}, journal = {login Usenix Mag.}, volume = {27}, number = {3}, year = {2002}, url = {https://www.usenix.org/publications/login/june-2002-volume-27-number-3/protowrap}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Wolf02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Wool02, author = {Avishai Wool}, title = {Combating the Perils of Port 80 at the Firewall}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/combating-perils-port-80-firewall}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Wool02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.