| 000 | 07175nam a2201237Ia 4500 | ||
|---|---|---|---|
| 000 | 05315cam a2200361 i 4500 | ||
| 001 | 16370 | ||
| 003 | 0 | ||
| 005 | 20250920171834.0 | ||
| 008 | 020515s2002 enka b 000 0 eng c | ||
| 010 |
_z _z _o _a2002282200 _b |
||
| 015 |
_22 _aGBA1-V7086 |
||
| 016 |
_2 _2 _a _z |
||
| 020 |
_e _e _a0470843853 (paperback) _b _z _c _q _x |
||
| 022 |
_y _y _l _a2 |
||
| 024 |
_2 _2 _d _c _a _q |
||
| 028 |
_a _a _b |
||
| 029 |
_a _a _b |
||
| 032 |
_a _a _b |
||
| 035 |
_a _a(OCoLC)ocm47937964;(IMchF)fol08619707 _b _z _c _q |
||
| 037 |
_n _n _c _a _b |
||
| 040 |
_e _erda _aUKM _dGCO;DAY;DLC _b _cUKM |
||
| 041 |
_e _e _a _b _g _h _r |
||
| 042 | _apcc | ||
| 043 |
_a _a _b |
||
| 045 |
_b _b _a |
||
| 050 |
_a _aQA76.24 _d _bS45 20022 _c0 |
||
| 051 |
_c _c _a _b |
||
| 055 |
_a _a _b |
||
| 060 |
_a _a _b |
||
| 070 |
_a _a _b |
||
| 072 |
_2 _2 _d _a _x |
||
| 082 |
_a _a _d _b2 _c |
||
| 084 |
_2 _2 _a |
||
| 086 |
_2 _2 _a |
||
| 090 |
_a _a _m _b _q |
||
| 092 |
_f _f _a _b |
||
| 096 |
_a _a _b |
||
| 097 |
_a _a _b |
||
| 100 |
_e _e _a _d _b4 _u _c0 _q16 |
||
| 110 |
_e _e _a _d _b _n _c _k |
||
| 111 |
_a _a _d _b _n _c |
||
| 130 |
_s _s _a _p _f _l _k |
||
| 210 |
_a _a _b |
||
| 222 |
_a _a _b |
||
| 240 |
_s _s _a _m _g _n _f _l _o _p _k |
||
| 245 | 0 |
_a _aSelected papers in network and system administration / _d _b _n _cedited by Eric Anderson, Mark Burgess and Alva Couch. _h6 _p |
|
| 246 |
_a _a _b _n _i _f6 _p |
||
| 249 |
_i _i _a |
||
| 250 |
_6 _6 _a _b |
||
| 260 |
_e _e _a _b _f _c _g |
||
| 264 |
_3 _3 _aChichester ;;New York : _d _bWiley, _c[2002];copyright 200246 |
||
| 300 |
_e _e _c26 cm. _axlviii, 472 pages : _billustrations |
||
| 310 |
_a _a _b |
||
| 321 |
_a _a _b |
||
| 336 |
_b _atext _2rdacontent |
||
| 337 |
_3 _30 _b _aunmediated _2rdamedia |
||
| 338 |
_3 _30 _b _avolume _2rdacarrier |
||
| 340 |
_2 _20 _g _n |
||
| 344 |
_2 _2 _a0 _b |
||
| 347 |
_2 _2 _a0 |
||
| 362 |
_a _a _b |
||
| 385 |
_m _m _a2 |
||
| 410 |
_t _t _b _a _v |
||
| 440 |
_p _p _a _x _v |
||
| 490 |
_a _a _x _v |
||
| 500 |
_a _a _d _b _c56 |
||
| 504 |
_a _aIncludes bibliographical references. _x |
||
| 505 |
_a _aMachine generated contents note: 1. A Case Study of Network Management 1 -- M.K. Fenlon -- 2. Balancing Security and Convenience 3 -- V Jones and D. Schrodel -- 3. Creating an Environment for Novice Users 5 -- J.M. Smith -- 4. Priv: An Exercise in Administrative Expansion 6 -- E. Heilman -- 5. Experiences with Viruses on UNIX Systems 8 -- T. Duff -- 6. Site: A Language and System for Configuring -- Many Computers as One Computing Site 17 -- B. Hagemark and K. Zadeck -- 7. Tools for System Administration in a Heterogeneous Environment 30 -- R. Finkel and B. Sturgill -- 8. Disk Space Management Without Quotas 45 -- E.D. Zwicky -- 9. spy: A Unix File System Security Monitor 48 -- B. Spence -- 10. Uniqname Overview 61 -- W.A. Doster, Y-H. Leong and S.J. Mattson -- 11. The Depot: A Framework for Sharing Software Installation -- Across Organizational and UNIX Platform Boundaries 69 -- K. Manheimer, B.A. Warsaw, S.N. Clark and W. Rowe -- 12. Using expect to Automate System Administration Tasks 79 -- D. Libes -- 13. Policy as a System Administration Tool 87 -- E.D. Zwicky, S. Simmons and R. Dalton -- 14. Managing Program Binaries in a Heterogeneous UNIX Network 96 -- P. Anderson -- 15. We Have Met the Enemy, an Informal Survey of Policy -- Practices in the Internetworked Community 105 -- B. Howell and B. Satdeva -- 16. Torture-testing Backup and Archive Programs: -- Things You Ought to Know But Probably Would Rather Not 117 -- E.D. Zwicky -- 17. Is Centralized System Administration the Answer? 126 -- P. Schafer -- 18. Customer Satisfaction Metrics and Measurement 133 -- C. Kubicki -- 19. Majordomo: How I Manage 17 Mailing Lists Without Answering -- request Mail 139 -- D.B. Chapman -- 20. Automated System Monitoring and Notification With Swatch 148 -- S.E. Hansen and E.T. Atkins -- 21. Computer System Performance Problem Detection -- Using Time Series Models 159 -- P. Hoogenboom and J. Lepreau -- 22. Horses and Barn Doors: Evolution of Corporate -- Guidelines for Internet Usage 177 -- S. Hambridge and J.C. Sedayao -- 23. Towards a POSIX Standard for Software Administration 185 -- B. Archer -- 24. Open Systems Formal Evaluation Process 198 -- B.W. Keves -- 25. Customization in a UNIX Computing Environment 203 -- C.E. Wills, K. Cadwell and W. Marrs -- 26. The Amanda Netw6rk Backup Manager 210 -- J. da Silva and 6. Guamundsson -- 27. The System Administration Maturity Model - SAMM 222 -- C. Kubicki -- 28. Towards a High-Level Machine Configuration System 235 -- P. Anderson -- 29. Monitoring Usage of Workstations with a Relational Database 243 -- J. Finke -- 30. A Site Configuration Engine 252 -- M. Burgess -- 31. Availability and Latency of World Wide Web Information Servers 268 -- C.L. Viles and J.C. French -- 32. Metrics for Management 287 -- C. Hogan -- 33. Decentralising Distributed Systems Administration 295 -- C. Hogan, A. Cox and T. Hunter -- 34. SLINK: Simple, Effective Filesystem Maintenance Abstractions -- for Community-Based Administration 304 -- A.L. Couch -- 35. An Analysis of UNIX System Configuration 312 -- R. Evard -- 36. Wide Area Network Ecology 327 -- J.T. Meek, E.S. Eichert and K. Takayama -- 37. Bootstrapping an Infrastructure 336 -- S. Traugott and J. Huddleston -- 38. Computer Immunology 352 -- M. Burgess -- 39. A Visual Approach for Monitoring Logs 367 -- L. Girardin and D. Brodbeck -- 40. Accountworks: Users Create Accounts on SQL, -- Notes, NT and UNIX 377 -- B. Arnold -- 41. Deconstructing User Requests and the Nine Step Model 390 -- T.A. Limoncelli -- 42. A Retrospective on Twelve Years of LISA Proceedings 400 -- E. Anderson and D. Patterson -- 43. It's Elementary, Dear Watson: Applying Logic Programming to -- Convergent System Management Processes 413 -- A.L. Couch and M. Gilfix -- 44. Theoretical System Administration 428 -- M. Burgess -- 45. An Expectant Chat About Script Maturity 441 -- A.L. Couch -- 46. Peep (The Network Auralizer): -- Monitoring Your Network With Sound 455 -- M. Gilfix and A _b _t _g _r |
||
| 506 |
_a _a5 |
||
| 510 |
_a _a _x |
||
| 520 |
_b _b _c _a _u |
||
| 521 |
_a _a _b |
||
| 533 |
_e _e _a _d _b _n _c |
||
| 540 |
_c _c _a5 |
||
| 542 |
_g _g _f |
||
| 546 |
_a _a _b |
||
| 583 |
_5 _5 _k _c _a _b |
||
| 590 |
_a _a _b |
||
| 600 |
_b _b _v _t _c2 _q _a _x0 _z _d _y |
||
| 610 |
_b _b _v _t2 _x _a _k0 _p _z _d6 _y |
||
| 611 |
_a _a _d _n2 _c0 _v |
||
| 630 |
_x _x _a _d _p20 _v |
||
| 648 |
_2 _2 _a |
||
| 650 |
_x _xManagement.;Management. _aComputer systems;Computer networks _d _b _z _y20 _v |
||
| 651 |
_x _x _a _y20 _v _z |
||
| 655 |
_0 _0 _a _y2 _z |
||
| 700 |
_i _i _t _c _b _s1 _q(Eric Arnold) _f _k40 _p _d1966- _e _aAnderson, Eric;Burgess, Mark,;Couch, Alva. _l _n6 |
||
| 710 |
_b _b _t _c _e _f _k40 _p _d5 _l _n6 _a |
||
| 711 |
_a _a _d _b _n _t _c |
||
| 730 |
_s _s _a _d _n _p _f _l _k |
||
| 740 |
_e _e _a _d _b _n _c6 |
||
| 753 |
_c _c _a |
||
| 767 |
_t _t _w |
||
| 770 |
_t _t _w _x |
||
| 773 |
_a _a _d _g _m _t _b _v _i _p |
||
| 775 |
_t _t _w _x |
||
| 776 |
_s _s _a _d _b _z _i _t _x _h _c _w |
||
| 780 |
_x _x _a _g _t _w |
||
| 785 |
_t _t _w _a _x |
||
| 787 |
_x _x _d _g _i _t _w |
||
| 800 |
_a _a _d _l _f _t0 _q _v |
||
| 810 |
_a _a _b _f _t _q _v |
||
| 830 |
_x _x _a _p _n _l0 _v |
||
| 942 |
_a _alcc _cBK |
||
| 999 |
_c20741 _d20741 |
||