Selected papers in network and system administration / edited by Eric Anderson, Mark Burgess and Alva Couch.
Contributor(s): Anderson, Eric (Eric Arnold) | Burgess, Mark | Couch, Alva
Publisher: Chichester ; New York : Wiley, [2002]Copyright date: copyright 2002Description: xlviii, 472 p. : ill. ; 26 cmContent type: text Carrier type: volumeISBN: 0470843853Subject(s): Computer systems -- Management | Computer networks -- ManagementLOC classification: QA76.24 | .S45 2002Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
BOOK | Circulation Section | Circulation Section Circulation Section | 004.6 Se48 2002 (Browse shelf) | Available | C30321 |
Includes bibliographical references.
Machine generated contents note: 1. A Case Study of Network Management 1 -- M.K. Fenlon -- 2. Balancing Security and Convenience 3 -- V Jones and D. Schrodel -- 3. Creating an Environment for Novice Users 5 -- J.M. Smith -- 4. Priv: An Exercise in Administrative Expansion 6 -- E. Heilman -- 5. Experiences with Viruses on UNIX Systems 8 -- T. Duff -- 6. Site: A Language and System for Configuring -- Many Computers as One Computing Site 17 -- B. Hagemark and K. Zadeck -- 7. Tools for System Administration in a Heterogeneous Environment 30 -- R. Finkel and B. Sturgill -- 8. Disk Space Management Without Quotas 45 -- E.D. Zwicky -- 9. spy: A Unix File System Security Monitor 48 -- B. Spence -- 10. Uniqname Overview 61 -- W.A. Doster, Y-H. Leong and S.J. Mattson -- 11. The Depot: A Framework for Sharing Software Installation -- Across Organizational and UNIX Platform Boundaries 69 -- K. Manheimer, B.A. Warsaw, S.N. Clark and W. Rowe -- 12. Using expect to Automate System Administration Tasks 79 -- D. Libes -- 13. Policy as a System Administration Tool 87 -- E.D. Zwicky, S. Simmons and R. Dalton -- 14. Managing Program Binaries in a Heterogeneous UNIX Network 96 -- P. Anderson -- 15. We Have Met the Enemy, an Informal Survey of Policy -- Practices in the Internetworked Community 105 -- B. Howell and B. Satdeva -- 16. Torture-testing Backup and Archive Programs: -- Things You Ought to Know But Probably Would Rather Not 117 -- E.D. Zwicky -- 17. Is Centralized System Administration the Answer? 126 -- P. Schafer -- 18. Customer Satisfaction Metrics and Measurement 133 -- C. Kubicki -- 19. Majordomo: How I Manage 17 Mailing Lists Without Answering -- "request" Mail 139 -- D.B. Chapman -- 20. Automated System Monitoring and Notification With Swatch 148 -- S.E. Hansen and E.T. Atkins -- 21. Computer System Performance Problem Detection -- Using Time Series Models 159 -- P. Hoogenboom and J. Lepreau -- 22. Horses and Barn Doors: Evolution of Corporate -- Guidelines for Internet Usage 177 -- S. Hambridge and J.C. Sedayao -- 23. Towards a POSIX Standard for Software Administration 185 -- B. Archer -- 24. Open Systems Formal Evaluation Process 198 -- B.W. Keves -- 25. Customization in a UNIX Computing Environment 203 -- C.E. Wills, K. Cadwell and W. Marrs -- 26. The Amanda Netw6rk Backup Manager 210 -- J. da Silva and 6. Guamundsson -- 27. The System Administration Maturity Model - SAMM 222 -- C. Kubicki -- 28. Towards a High-Level Machine Configuration System 235 -- P. Anderson -- 29. Monitoring Usage of Workstations with a Relational Database 243 -- J. Finke -- 30. A Site Configuration Engine 252 -- M. Burgess -- 31. Availability and Latency of World Wide Web Information Servers 268 -- C.L. Viles and J.C. French -- 32. Metrics for Management 287 -- C. Hogan -- 33. Decentralising Distributed Systems Administration 295 -- C. Hogan, A. Cox and T. Hunter -- 34. SLINK: Simple, Effective Filesystem Maintenance Abstractions -- for Community-Based Administration 304 -- A.L. Couch -- 35. An Analysis of UNIX System Configuration 312 -- R. Evard -- 36. Wide Area Network Ecology 327 -- J.T. Meek, E.S. Eichert and K. Takayama -- 37. Bootstrapping an Infrastructure 336 -- S. Traugott and J. Huddleston -- 38. Computer Immunology 352 -- M. Burgess -- 39. A Visual Approach for Monitoring Logs 367 -- L. Girardin and D. Brodbeck -- 40. Accountworks: Users Create Accounts on SQL, -- Notes, NT and UNIX 377 -- B. Arnold -- 41. Deconstructing User Requests and the Nine Step Model 390 -- T.A. Limoncelli -- 42. A Retrospective on Twelve Years of LISA Proceedings 400 -- E. Anderson and D. Patterson -- 43. It's Elementary, Dear Watson: Applying Logic Programming to -- Convergent System Management Processes 413 -- A.L. Couch and M. Gilfix -- 44. Theoretical System Administration 428 -- M. Burgess -- 45. An Expectant Chat About Script Maturity 441 -- A.L. Couch -- 46. Peep (The Network Auralizer): -- Monitoring Your Network With Sound 455 -- M. Gilfix and A
There are no comments for this item.