About USENIX Events Membership Publications Students
;login:
The Magazine of USENIX and SAGE

Special Issue: Intrusion Detection (Sept. 1999)
Table of Contents

IN THIS ISSUE . . .

CONFERENCE REPORTS
Reports on the First Conference on Network Administration
Reports on the Workshop on Intrusion Detection and Network Monitoring

FEATURES
Cisco Flow Logs and Intrusion Detection at the Ohio State University by Steve Romig, Mark Fullmer, and Suresh Ramachandran
Invisible Intruders: Rootkits in Practice by David Brumley
Indicators of UNIX Host Compromise by Paul C. Brutch, Tasneem G. Brutch, and Udo Pooch
A Hacker's Approach to ID by Mudge
A Glimpse Into the Future of ID by Tim Bass and Dave Gruber
On Reliability by John Sellens

ANNOUNCEMENTS AND CALLS
3rd Annual Linux Showcase
3rd Large Installation System Administration of Windows NT / 2000 Conference
9th USENIX Security Symposium

?Need help? Use our Contacts page.

Last changed: 7 Jan. 2002 ml
;login: Index
Publications Index
USENIX Home