|  | 
				
| Full Day (9:00 a.m.5:00 p.m.) | 
				
				
					|   | 
| S1 Salon 1
 | Rik Farrow | Hands-on Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 1 of 2) 
   | 
|   | 
|   | 
| S3 Salon 2
   | Ned McClain |  Hot Topics in System Administration 
   | 
|   | 
|   | 
				
| Half-Day Tutorials (a.m.) | 
				
				
					|   | 
| S4 Salon 3
 | Mark-Jason Dominus | Regular Expression Mastery 
   | 
|   | 
|   | 
| S5 Salon H
 | Jacob Farmer |  Eliminating Backup System Bottlenecks Using Disk-to-Disk and Other Methods 
   | 
|   | 
|   | 
| S6 Salon 4
 
 | Gerald Carter 
   |  Kerberos 5Revenge of the Three-Headed Dog 
   | 
|   | 
|   | 
| S7 Salon J
 
 | Mike Ciavarella |  Advanced Shell Programming 
   | 
|   | 
|   | 
| S8 Salon K
 | Peter Baer Galvin |  Next-Generation Security Tools 
   | 
|   | 
|   | 
				
| Half-Day Tutorials (p.m.) | 
				
				
					|   | 
| S9 Salon H
 | Mark-Jason Dominus | Perl Program Repair Shop and Red Flags 
   | 
|   | 
|   | 
| S10 Salon 3
 | Jacob Farmer |  Next-Generation Storage Networking and Data Protection 
   | 
|   | 
|   | 
| S11 Salon 4
 | David N. Blank-Edelman 
   |  Over the Edge System Administration, Volume 1 
   | 
|   | 
|   | 
| S12 Salon J
 | Mike Ciavarella |  Documentation Techniques for SysAdmins 
   | 
|   | 
|   | 
| S13 Salon K
 | Geoff Halprin 
   |  Troubleshooting: A Basic Skill 
   | 
|   | 
					|  | 
				
					|   | 
| M1 Salon 1
 | Rik Farrow | Hands-on Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 2 of 2) 
   | 
|   | 
|   | 
| M2 Salon K
 | Radia Perlman and Charlie Kaufman 
   | Network Security Protocols: Theory and Current Standards 
   | 
|   | 
|   | 
| M3 Salon 2
 | Peter Baer Galvin | Advanced Solaris System Administration Topics 
   | 
|   | 
|   | 
| M4 Salon G
 | David Blank-Edelman | Perl for System Administration: The Power and the Praxis 
   | 
|   | 
|   | 
| M5 Salon 3
 | Theodore Ts'o | Inside the Linux Kernel (Updated for v. 2.6) 
   | 
|   | 
|   | 
| M6 Salon H
 | Heison Chak |  VoIP Principles and Practice 
   | 
|   | 
|   | 
| M7 Salon J
 | Mike Ciavarella and Lee Damon |  Seven Habits of the Highly Effective System Administrator 
   | 
|   | 
|   | 
| M8 Salon 4
 | Marcus Ranum | System Log Aggregation, Statistics, and Analysis 
   | 
|   | 
					|  | 
				
				
					|   | 
| T2 Salon H
 | James Mauro and Richard McDougall |  Solaris Kernel Performance, Observability, and Debugging (Day 1 of 2) 
   | 
|   | 
|   | 
| T3 Salon J
 | Peter Baer Galvin |  Solaris 10 Security Features Workshop 
   | 
|   | 
|   | 
| T4 Salon 4
 | Tom Christiansen | Advanced Perl Programming 
   | 
|   | 
|   | 
| T5 Salon G
 | Joshua Jensen |  RPM Package Management 
   | 
|   | 
|   | 
| T6 Salon 3
 | Gerald Carter | Managing Samba 3.0 | 
|   | 
|   | 
|   | 
| T7 Salon 1
 | John Sellens | Practical System and Network Monitoring 
   | 
|   | 
|   | 
| T8 Salon 2
 | Lee Damon and Geoff Halprin |  Release Engineering and Project Lifecycle 
   | 
|   | 
					|  | 
				
					|   | 
| W2 Salon 1
 | James Mauro and Richard McDougall |  Solaris Kernel Performance, Observability, and Debugging (Day 2 of 2) 
   | 
|   | 
|   | 
| W3 Salon 2
 | Gerald Carter | Implementing LDAP Directories 
   | 
|   | 
|   | 
| W4 Salon 3
   | John Sellens 
   | System and Network Monitoring: Tools in Depth 
   | 
|   | 
|   | 
| W5 Salon 4
 | Æleen Frisch | Administering Linux in Production Environments 
   | 
|   | 
					|  | 
				
					|   | 
| R1 Salon 1
 | David Rhoades | Hacking & Securing Web-based Applications 
   | 
|   | 
|   | 
| R2 Salon 2
   | Richard Bejtlich |  Network Security Monitoring with Open Source Tools 
   | 
|   | 
|   | 
| R3 Salon 3
 | Mark Burgess |  Configuration Management with Cfengine 
   |