Sunday, June 6, 1999 |
 |
Full Day Tutorial Session (9:00am-5:00pm): |
 |
S1 |
Windows NT Internals
|
 |
S2 |
UNIX Security Tools: Use and Comparison
|
 |
S3 |
Linux Systems Administration
|
 |
S4 |
Essential UNIX Programming
|
 |
S5 |
Network Security Profiles: A Collection (hodgepodge) of Stuff Hackers Know About You
|
 |
S6 |
Learning Perl
|
 |
S7 |
Secure Communications Over Open Networks
|
 |
S8 |
Advanced Solaris System Administration Topics
|
Monday, June 7, 1999 |
 |
Full Day Tutorial Session (9:00am-5:00pm): |
 |
M1 |
Inside the Linux Kernel UPDATED
|
 |
M2 |
Administering Windows NT: A Course for UNIX People NEW
|
 |
M3 |
Multithreaded Programming in POSIX NEW
|
 |
M4 |
UNIX Network Programming
|
 |
M5 |
System and Network Performance Tuning
|
 |
M6 |
CGI and WWW Programming in Perl
|
 |
M7 |
Intrusion Detection and Network Forensics NEW
|
 |
M8 |
Hot New Topics in Modern System Administration NEW
|
Tuesday, June 8, 1999 |
 |
Full Day Tutorial Session (9:00am-5:00pm): |
 |
T1 |
Solaris Architecture: Internals, Tools, Tips and Tidbits NEW
|
 |
T2 |
Sendmail Configuration and Operation (Updated for Sendmail 8.9)
|
 |
T3 |
Linux on the Edge NEW
PART I: Real-Time Applications in Real-Time Linux
PART II: How to Build a Beowulf: Assembling, Programming, and Using a Commodity Supercomputer
|
 |
T4 |
High Availability - Getting and Maintaining It
|
 |
T5 |
Advanced Topics in Perl Programming NEW
|
 |
T6 |
Configuring Cisco Routers on an IP Network NEW
|
 |
T7 |
Windows NT and UNIX Integration: Problems and Solutions NEW
|
 |
T8 |
Modern Security Systems for Intranets, Extranets, and the Internet NEW
|