|
|
S1 |
Advanced Solaris System Administration Topics |
![](/legacy/graphics/dot_clear.gif) |
S2 |
Topics in UNIX and Linux Administration, Part 1 NEW |
![](/legacy/graphics/dot_clear.gif) |
S3 |
Linux System Administration |
![](/legacy/graphics/dot_clear.gif) |
S4 |
Intrusion Detection: Evaluation, Architecture, and Implementation NEW |
![](/legacy/graphics/dot_clear.gif) |
S5 |
Hacking and Securing Web-Based Applications NEW |
![](/legacy/graphics/dot_clear.gif) |
S6 |
Beyond Shell Scripts: 21st-Century Automation Tools and Techniques NEW |
![](/legacy/graphics/dot_clear.gif) |
S7 |
Blueprints for High Availability: Designing Resilient Distributed Systems NEW |
![](/legacy/graphics/dot_clear.gif) |
|
S8 |
Administering Veritas NetBackup NEW |
![](/legacy/graphics/dot_clear.gif) |
S9 |
Perl for System Administration: The Networking Power Hours, Part 1 NEW |
![](/legacy/graphics/dot_clear.gif) |
S10 |
Introduction to Domain Name System Administration |
![](/legacy/graphics/dot_clear.gif) |
|
S11 |
Using SANs and NAS |
![](/legacy/graphics/dot_clear.gif) |
S12 |
Perl for System Administration: The Networking Power Hours, Part 2 NEW |
![](/legacy/graphics/dot_clear.gif) |
S13 |
Intermediate Topics in Domain Name System Administration NEW |
|
|
M1 |
Exploring the Potential of LDAP NEW |
![](/legacy/graphics/dot_clear.gif) |
M2 |
Topics in UNIX and Linux Administration, Part 2 NEW |
![](/legacy/graphics/dot_clear.gif) |
M3 |
Administering Linux in Production Environments |
![](/legacy/graphics/dot_clear.gif) |
M4 |
Issues in UNIX
Infrastructure Design |
![](/legacy/graphics/dot_clear.gif) |
M5 |
Practical Wireless IP: Concepts, Administration, and Security |
![](/legacy/graphics/dot_clear.gif) |
M6 |
Building a syslog Infrastructure |
![](/legacy/graphics/dot_clear.gif) |
M7 |
Technical Tools for Creating Happy Users NEW |
![](/legacy/graphics/dot_clear.gif) |
|
M8 |
SAN-Enable Your Backup System |
![](/legacy/graphics/dot_clear.gif) |
M9 |
Regular Expression Mastery NEW |
![](/legacy/graphics/dot_clear.gif) |
M10 |
Building a Disaster Recovery Plan NEW |
![](/legacy/graphics/dot_clear.gif) |
|
M11 |
Next-Generation Storage Architectures: Beyond Conventional SAN and NAS |
![](/legacy/graphics/dot_clear.gif) |
M12 |
Perl Program Repair Shop and Red Flags NEW |
![](/legacy/graphics/dot_clear.gif) |
M13 |
Practical Project Management |
Tuesday, November 5, 2002
|
|
|
T1 |
System and Network Monitoring NEW |
![](/legacy/graphics/dot_clear.gif) |
T2 |
UNIX Security Threats and Solutions NEW |
![](/legacy/graphics/dot_clear.gif) |
T3 |
Linux Firewalls NEW |
![](/legacy/graphics/dot_clear.gif) |
T4 |
Configuring and Administering SAMBA Servers |
![](/legacy/graphics/dot_clear.gif) |
T5 |
System and Network Performance Tuning |
![](/legacy/graphics/dot_clear.gif) |
T6 |
Network Security Profiles: A Collection (Hodgepodge) of Stuff Hackers Know About You |
![](/legacy/graphics/dot_clear.gif) |
T7 |
Advanced Topics in DNS Administration NEW |
|
T8 |
Introduction to Massive Upgrades and Changes NEW |
![](/legacy/graphics/dot_clear.gif) |
T9 |
Console Servers: Getting up to Speed NEW |
![](/legacy/graphics/dot_clear.gif) |
T10 |
Documentation Techniques for Sysadmins |
|
T11 |
But Is It UNIX? A Mac OS X Administrator's Survival Guide NEW |
![](/legacy/graphics/dot_clear.gif) |
T12 |
Advanced Console Remote Access NEW |
![](/legacy/graphics/dot_clear.gif) |
T13 |
Advanced Shell Programming |
![](/legacy/graphics/dot_clear.gif) |