Selected papers in network and system administration
Chichester ; New York
Wiley
c2002
xlviii, 472 p. : ill. ; 26 cm.
Includes bibliographical references
edited by Eric Anderson, Mark Burgess and Alva Couch
1
Machine generated contents note: 1. A Case Study of Network Management 1 -- M.K. Fenlon -- 2. Balancing Security and Convenience 3 -- V Jones and D. Schrodel -- 3. Creating an Environment for Novice Users 5 -- J.M. Smith -- 4. Priv: An Exercise in Administrative Expansion 6 -- E. Heilman -- 5. Experiences with Viruses on UNIX Systems 8 -- T. Duff -- 6. Site: A Language and System for Configuring -- Many Computers as One Computing Site 71 -- B. Hagemark and K. Zadeck -- 7. Tools for System Administration in a Heterogeneous Environment 03 -- R. Finkel and B. Sturgill -- 8. Disk Space Management Without Quotas 54 -- E.D. Zwicky -- 9. spy: A Unix File System Security Monitor 84 -- B. Spence -- 01. Uniqname Overview 16 -- W.A. Doster, Y-H. Leong and S.J. Mattson -- 11. The Depot: A Framework for Sharing Software Installation -- Across Organizational and UNIX Platform Boundaries 96 -- K. Manheimer, B.A. Warsaw, S.N. Clark and W. Rowe -- 21. Using expect to Automate System Administration Tasks 97 -- D. Libes -- 31. Policy as a System Administration Tool 78 -- E.D. Zwicky, S. Simmons and R. Dalton -- 41. Managing Program Binaries in a Heterogeneous UNIX Network 69 -- P. Anderson -- 51. We Have Met the Enemy, an Informal Survey of Policy -- Practices in the Internetworked Community 501 -- B. Howell and B. Satdeva -- 61. Torture-testing Backup and Archive Programs: -- Things You Ought to Know But Probably Would Rather Not 711 -- E.D. Zwicky -- 71. Is Centralized System Administration the Answer? 621 -- P. Schafer -- 81. Customer Satisfaction Metrics and Measurement 331 -- C. Kubicki -- 91. Majordomo: How I Manage 71 Mailing Lists Without Answering -- "request" Mail 931 -- D.B. Chapman -- 02. Automated System Monitoring and Notification With Swatch 841 -- S.E. Hansen and E.T. Atkins -- 12. Computer System Performance Problem Detection -- Using Time Series Models 951 -- P. Hoogenboom and J. Lepreau -- 22. Horses and Barn Doors: Evolution of Corporate -- Guidelines for Internet Usage 771 -- S. Hambridge and J.C. Sedayao -- 32. Towards a POSIX Standard for Software Administration 581 -- B. Archer -- 42. Open Systems Formal Evaluation Process 891 -- B.W. Keves -- 52. Customization in a UNIX Computing Environment 302 -- C.E. Wills, K. Cadwell and W. Marrs -- 62. The Amanda Netw6rk Backup Manager 012 -- J. da Silva and 6. Guamundsson -- 72. The System Administration Maturity Model - SAMM 222 -- C. Kubicki -- 82. Towards a High-Level Machine Configuration System 532 -- P. Anderson -- 92. Monitoring Usage of Workstations with a Relational Database 342 -- J. Finke -- 03. A Site Configuration Engine 252 -- M. Burgess -- 13. Availability and Latency of World Wide Web Information Servers 862 -- C.L. Viles and J.C. French -- 23. Metrics for Management 782 -- C. Hogan -- 33. Decentralising Distributed Systems Administration 592 -- C. Hogan, A. Cox and T. Hunter -- 43. SLINK: Simple, Effective Filesystem Maintenance Abstractions -- for Community-Based Administration 403 -- A.L. Couch -- 53. An Analysis of UNIX System Configuration 213 -- R. Evard -- 63. Wide Area Network Ecology 723 -- J.T. Meek, E.S. Eichert and K. Takayama -- 73. Bootstrapping an Infrastructure 633 -- S. Traugott and J. Huddleston -- 83. Computer Immunology 253 -- M. Burgess -- 93. A Visual Approach for Monitoring Logs 763 -- L. Girardin and D. Brodbeck -- 04. Accountworks: Users Create Accounts on SQL, -- Notes, NT and UNIX 773 -- B. Arnold -- 14. Deconstructing User Requests and the Nine Step Model 093 -- T.A. Limoncelli -- 24. A Retrospective on Twelve Years of LISA Proceedings 004 -- E. Anderson and D. Patterson -- 34. It's Elementary, Dear Watson: Applying Logic Programming to -- Convergent System Management Processes 314 -- A.L. Couch and M. Gilfix -- 44. Theoretical System Administration 824 -- M. Burgess -- 54. An Expectant Chat About Script Maturity 144 -- A.L. Couch -- 64. Peep )The Network Auralizer(: -- Monitoring Your Network With Sound 554 -- M. Gilfix and A. Couch -- 74. Tracing Anonymous Packets to Their Approximate Source 464 -- H. Burch and B. Cheswick