| Interactive Network Management Visualization with SVG and AJAX | LISA '06 | Athanasios Douitsis, Dimitrios Kalogeras |
| Bridging the Host-Network Divide: Survey, Taxonomy, and Solution | LISA '06 | Glenn A. Fink, Vyas Duggirala, Ricardo Correa, Chris North |
| The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of Privacy | LISA '06 | Danny O'Brien |
| Command and Control: System Administration at U.S. Central Command | LISA '06 | Andrew Seely |
| Black Ops 2006: Pattern Recognition | LISA '06 | Dan Kaminsky |
| Seriously, Tape-Only Backup Systems Are Dead | LISA '06 | W. Curtis Preston |
| The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing Software | LISA '06 | Andrew Pavlo, Peter Couvares, Rebekah Gietzel, Anatoly Karp, Ian D. Alderman, Miron Livny, Charles Bacon |
| Unifying Unified Voice Messaging | LISA '06 | Jon Finke |
| Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking System | LISA '06 | Daniel S. Crosta, Matthew J. Singleton, Benjamin A. Kuperman |
| Zombies and Botnets: Attacks on Messaging Security by Organized Criminal Enterprises | LISA '06 | Dmitri Alperovitch |
| Power-Managed Storage: Longer Data Life and Lower Energy Consumption | LISA '06 | Aloke Guha |
| The Future of System Administration: How to Stop Worrying and Learn to Love Self-Managing Systems | LISA '06 | Alva L. Couch |
| WORK-IN-PROGRESS REPORTS (WIPS | LISA '06 | |
| System Administration: Drowning in Management Complexity | LISA '06 | Chad Verbowski |
| Corporate Security: A Hacker Perspective | LISA '06 | Mark "Simple Nomad" Loveless |
| Improv for Sysadmins | LISA '06 | Bob Apthorpe, Dan Klein |
| Bigtable: A Distributed Storage System for Structured Data | OSDI '06 | Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber |
| Opening Remarks, Awards, and Keynote | USENIX Security '06 | |
| Keynote Address The Current State of the War on Terrorism and What It Means for Homeland Security and Technology | USENIX Security '06 | Richard A. Clarke |
| A Usability Study and Critique of Two Password Managers | USENIX Security '06 | Sonia Chiasson, P.C. van Oorschot, Robert Biddle |
| On the Release of CRLs in Public Key Infrastructure | USENIX Security '06 | Chengyu Ma, Nan Hu, Yingjiu Li |
| Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing | USENIX Security '06 | Lucas Ballard, Fabian Monrose, Daniel Lopresti |
| Selling Security to Software Developers: Lessons Learned While Building a Commercial Static Analysis Tool | USENIX Security '06 | Brian Chess |
| Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, Pseudo-Science, Fun, and Profit | USENIX Security '06 | Ivan Arce |
| How to Build a Low-Cost, Extended-Range RFID Skimmer | USENIX Security '06 | Ilan Kirschenbaum, Avishai Wool |