Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Page Preface Contents PART ONE OVERVIEW
Chapter 1 Introduction
1.1 What Operating Systems Do 1.2 Computer-System Organization 1.3 Computer-System Architecture 1.4 Operating-System Structure 1.5 Operating-System Operations 1.6 Process Management 1.7 Memory Management 1.8 Storage Management 1.9 Protection and Security 1.10 Kernel Data Structures 1.11 Computing Environments 1.12 Open-Source Operating Systems 1.13 Summary Practice Exercises Bibliographical Notes Bibliography
1.1 What Operating Systems Do 1.2 Computer-System Organization 1.3 Computer-System Architecture 1.4 Operating-System Structure 1.5 Operating-System Operations 1.6 Process Management 1.7 Memory Management 1.8 Storage Management 1.9 Protection and Security 1.10 Kernel Data Structures 1.11 Computing Environments 1.12 Open-Source Operating Systems 1.13 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 2 Operating-System Structures
2.1 Operating-System Services 2.2 User and Operating-System Interface 2.3 System Calls 2.4 Types of System Calls 2.5 System Programs 2.6 Operating-System Design and Implementation 2.7 Operating-System Structure 2.8 Operating-System Debugging 2.9 Operating-System Generation 2.10 System Boot 2.11 Summary Practice Exercises Bibliographical Notes Bibliography
2.1 Operating-System Services 2.2 User and Operating-System Interface 2.3 System Calls 2.4 Types of System Calls 2.5 System Programs 2.6 Operating-System Design and Implementation 2.7 Operating-System Structure 2.8 Operating-System Debugging 2.9 Operating-System Generation 2.10 System Boot 2.11 Summary Practice Exercises Bibliographical Notes Bibliography
Chapter 1 Introduction
1.1 What Operating Systems Do 1.2 Computer-System Organization 1.3 Computer-System Architecture 1.4 Operating-System Structure 1.5 Operating-System Operations 1.6 Process Management 1.7 Memory Management 1.8 Storage Management 1.9 Protection and Security 1.10 Kernel Data Structures 1.11 Computing Environments 1.12 Open-Source Operating Systems 1.13 Summary Practice Exercises Bibliographical Notes Bibliography
1.1 What Operating Systems Do 1.2 Computer-System Organization 1.3 Computer-System Architecture 1.4 Operating-System Structure 1.5 Operating-System Operations 1.6 Process Management 1.7 Memory Management 1.8 Storage Management 1.9 Protection and Security 1.10 Kernel Data Structures 1.11 Computing Environments 1.12 Open-Source Operating Systems 1.13 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 2 Operating-System Structures
2.1 Operating-System Services 2.2 User and Operating-System Interface 2.3 System Calls 2.4 Types of System Calls 2.5 System Programs 2.6 Operating-System Design and Implementation 2.7 Operating-System Structure 2.8 Operating-System Debugging 2.9 Operating-System Generation 2.10 System Boot 2.11 Summary Practice Exercises Bibliographical Notes Bibliography
2.1 Operating-System Services 2.2 User and Operating-System Interface 2.3 System Calls 2.4 Types of System Calls 2.5 System Programs 2.6 Operating-System Design and Implementation 2.7 Operating-System Structure 2.8 Operating-System Debugging 2.9 Operating-System Generation 2.10 System Boot 2.11 Summary Practice Exercises Bibliographical Notes Bibliography PART TWO PROCESS MANAGEMENT
Chapter 3 Processes
3.1 Process Concept 3.2 Process Scheduling 3.3 Operations on Processes 3.4 Interprocess Communication 3.5 Examples of IPC Systems 3.6 Communication in Client–Server Systems 3.7 Summary Practice Exercises Bibliographical Notes Bibliography
3.1 Process Concept 3.2 Process Scheduling 3.3 Operations on Processes 3.4 Interprocess Communication 3.5 Examples of IPC Systems 3.6 Communication in Client–Server Systems 3.7 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 4 Threads
4.1 Overview 4.2 Multicore Programming 4.3 Multithreading Models 4.4 Thread Libraries 4.5 Implicit Threading 4.6 Threading Issues 4.7 Operating-System Examples 4.8 Summary Practice Exercises Bibliographical Notes Bibliography
4.1 Overview 4.2 Multicore Programming 4.3 Multithreading Models 4.4 Thread Libraries 4.5 Implicit Threading 4.6 Threading Issues 4.7 Operating-System Examples 4.8 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 5 Process Synchronization
5.1 Background 5.2 The Critical-Section Problem 5.3 Peterson’s Solution 5.4 Synchronization Hardware 5.5 Mutex Locks 5.6 Semaphores 5.7 Classic Problems of Synchronization 5.8 Monitors 5.9 Synchronization Examples 5.10 Alternative Approaches 5.11 Summary Practice Exercises Bibliographical Notes Bibliography
5.1 Background 5.2 The Critical-Section Problem 5.3 Peterson’s Solution 5.4 Synchronization Hardware 5.5 Mutex Locks 5.6 Semaphores 5.7 Classic Problems of Synchronization 5.8 Monitors 5.9 Synchronization Examples 5.10 Alternative Approaches 5.11 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 6 CPU Scheduling
6.1 Basic Concepts 6.2 Scheduling Criteria 6.3 Scheduling Algorithms 6.4 Thread Scheduling 6.5 Multiple-Processor Scheduling 6.6 Real-Time CPU Scheduling 6.7 Operating-System Examples 6.8 Algorithm Evaluation 6.9 Summary Practice Exercises Bibliographical Notes Bibliography
6.1 Basic Concepts 6.2 Scheduling Criteria 6.3 Scheduling Algorithms 6.4 Thread Scheduling 6.5 Multiple-Processor Scheduling 6.6 Real-Time CPU Scheduling 6.7 Operating-System Examples 6.8 Algorithm Evaluation 6.9 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 7 Deadlocks
7.1 System Model 7.2 Deadlock Characterization 7.3 Methods for Handling Deadlocks 7.4 Deadlock Prevention 7.5 Deadlock Avoidance 7.6 Deadlock Detection 7.7 Recovery from Deadlock 7.8 Summary Practice Exercises Bibliography
7.1 System Model 7.2 Deadlock Characterization 7.3 Methods for Handling Deadlocks 7.4 Deadlock Prevention 7.5 Deadlock Avoidance 7.6 Deadlock Detection 7.7 Recovery from Deadlock 7.8 Summary Practice Exercises Bibliography
Chapter 3 Processes
3.1 Process Concept 3.2 Process Scheduling 3.3 Operations on Processes 3.4 Interprocess Communication 3.5 Examples of IPC Systems 3.6 Communication in Client–Server Systems 3.7 Summary Practice Exercises Bibliographical Notes Bibliography
3.1 Process Concept 3.2 Process Scheduling 3.3 Operations on Processes 3.4 Interprocess Communication 3.5 Examples of IPC Systems 3.6 Communication in Client–Server Systems 3.7 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 4 Threads
4.1 Overview 4.2 Multicore Programming 4.3 Multithreading Models 4.4 Thread Libraries 4.5 Implicit Threading 4.6 Threading Issues 4.7 Operating-System Examples 4.8 Summary Practice Exercises Bibliographical Notes Bibliography
4.1 Overview 4.2 Multicore Programming 4.3 Multithreading Models 4.4 Thread Libraries 4.5 Implicit Threading 4.6 Threading Issues 4.7 Operating-System Examples 4.8 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 5 Process Synchronization
5.1 Background 5.2 The Critical-Section Problem 5.3 Peterson’s Solution 5.4 Synchronization Hardware 5.5 Mutex Locks 5.6 Semaphores 5.7 Classic Problems of Synchronization 5.8 Monitors 5.9 Synchronization Examples 5.10 Alternative Approaches 5.11 Summary Practice Exercises Bibliographical Notes Bibliography
5.1 Background 5.2 The Critical-Section Problem 5.3 Peterson’s Solution 5.4 Synchronization Hardware 5.5 Mutex Locks 5.6 Semaphores 5.7 Classic Problems of Synchronization 5.8 Monitors 5.9 Synchronization Examples 5.10 Alternative Approaches 5.11 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 6 CPU Scheduling
6.1 Basic Concepts 6.2 Scheduling Criteria 6.3 Scheduling Algorithms 6.4 Thread Scheduling 6.5 Multiple-Processor Scheduling 6.6 Real-Time CPU Scheduling 6.7 Operating-System Examples 6.8 Algorithm Evaluation 6.9 Summary Practice Exercises Bibliographical Notes Bibliography
6.1 Basic Concepts 6.2 Scheduling Criteria 6.3 Scheduling Algorithms 6.4 Thread Scheduling 6.5 Multiple-Processor Scheduling 6.6 Real-Time CPU Scheduling 6.7 Operating-System Examples 6.8 Algorithm Evaluation 6.9 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 7 Deadlocks
7.1 System Model 7.2 Deadlock Characterization 7.3 Methods for Handling Deadlocks 7.4 Deadlock Prevention 7.5 Deadlock Avoidance 7.6 Deadlock Detection 7.7 Recovery from Deadlock 7.8 Summary Practice Exercises Bibliography
7.1 System Model 7.2 Deadlock Characterization 7.3 Methods for Handling Deadlocks 7.4 Deadlock Prevention 7.5 Deadlock Avoidance 7.6 Deadlock Detection 7.7 Recovery from Deadlock 7.8 Summary Practice Exercises Bibliography PART THREE MEMORY MANAGEMENT
Chapter 8 Main Memory
8.1 Background 8.2 Swapping 8.3 Contiguous Memory Allocation 8.4 Segmentation 8.5 Paging 8.6 Structure of the Page Table 8.7 Example: Intel 32 and 64-bit Architectures 8.8 Example: ARM Architecture 8.9 Summary Practice Exercises Bibliographical Notes Bibliography
8.1 Background 8.2 Swapping 8.3 Contiguous Memory Allocation 8.4 Segmentation 8.5 Paging 8.6 Structure of the Page Table 8.7 Example: Intel 32 and 64-bit Architectures 8.8 Example: ARM Architecture 8.9 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 9 Virtual Memory
9.1 Background 9.2 Demand Paging 9.3 Copy-on-Write 9.4 Page Replacement 9.5 Allocation of Frames 9.6 Thrashing 9.7 Memory-Mapped Files 9.8 Allocating Kernel Memory 9.9 Other Considerations 9.10 Operating-System Examples 9.11 Summary Practice Exercises Bibliographical Notes Bibliography
9.1 Background 9.2 Demand Paging 9.3 Copy-on-Write 9.4 Page Replacement 9.5 Allocation of Frames 9.6 Thrashing 9.7 Memory-Mapped Files 9.8 Allocating Kernel Memory 9.9 Other Considerations 9.10 Operating-System Examples 9.11 Summary Practice Exercises Bibliographical Notes Bibliography
Chapter 8 Main Memory
8.1 Background 8.2 Swapping 8.3 Contiguous Memory Allocation 8.4 Segmentation 8.5 Paging 8.6 Structure of the Page Table 8.7 Example: Intel 32 and 64-bit Architectures 8.8 Example: ARM Architecture 8.9 Summary Practice Exercises Bibliographical Notes Bibliography
8.1 Background 8.2 Swapping 8.3 Contiguous Memory Allocation 8.4 Segmentation 8.5 Paging 8.6 Structure of the Page Table 8.7 Example: Intel 32 and 64-bit Architectures 8.8 Example: ARM Architecture 8.9 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 9 Virtual Memory
9.1 Background 9.2 Demand Paging 9.3 Copy-on-Write 9.4 Page Replacement 9.5 Allocation of Frames 9.6 Thrashing 9.7 Memory-Mapped Files 9.8 Allocating Kernel Memory 9.9 Other Considerations 9.10 Operating-System Examples 9.11 Summary Practice Exercises Bibliographical Notes Bibliography
9.1 Background 9.2 Demand Paging 9.3 Copy-on-Write 9.4 Page Replacement 9.5 Allocation of Frames 9.6 Thrashing 9.7 Memory-Mapped Files 9.8 Allocating Kernel Memory 9.9 Other Considerations 9.10 Operating-System Examples 9.11 Summary Practice Exercises Bibliographical Notes Bibliography PART FOUR STORAGE MANAGEMENT
Chapter 10 Mass-Storage Structure
10.1 Overview of Mass-Storage Structure 10.2 Disk Structure 10.3 Disk Attachment 10.4 Disk Scheduling 10.5 Disk Management 10.6 Swap-Space Management 10.7 RAID Structure 10.8 Stable-Storage Implementation 10.9 Summary Practice Exercises Bibliographical Notes Bibliography
10.1 Overview of Mass-Storage Structure 10.2 Disk Structure 10.3 Disk Attachment 10.4 Disk Scheduling 10.5 Disk Management 10.6 Swap-Space Management 10.7 RAID Structure 10.8 Stable-Storage Implementation 10.9 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 11 File-System Interface
11.1 File Concept 11.2 Access Methods 11.3 Directory and Disk Structure 11.4 File-System Mounting 11.5 File Sharing 11.6 Protection 11.7 Summary Practice Exercises Bibliographical Notes Bibliography
11.1 File Concept 11.2 Access Methods 11.3 Directory and Disk Structure 11.4 File-System Mounting 11.5 File Sharing 11.6 Protection 11.7 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 12 File-System Implementation
12.1 File-System Structure 12.2 File-System Implementation 12.3 Directory Implementation 12.4 Allocation Methods 12.5 Free-Space Management 12.6 Efficiency and Performance 12.7 Recovery 12.8 NFS 12.9 Example: The WAFL File System 12.10 Summary Practice Exercises Bibliographical Notes Bibliography
12.1 File-System Structure 12.2 File-System Implementation 12.3 Directory Implementation 12.4 Allocation Methods 12.5 Free-Space Management 12.6 Efficiency and Performance 12.7 Recovery 12.8 NFS 12.9 Example: The WAFL File System 12.10 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 13 I/O Systems
13.1 Overview 13.2 I/O Hardware 13.3 Application I/O Interface 13.4 Kernel I/O Subsystem 13.5 Transforming I/O Requests to Hardware Operations 13.6 STREAMS 13.7 Performance 13.8 Summary Practice Exercises Bibliographical Notes Bibliography
13.1 Overview 13.2 I/O Hardware 13.3 Application I/O Interface 13.4 Kernel I/O Subsystem 13.5 Transforming I/O Requests to Hardware Operations 13.6 STREAMS 13.7 Performance 13.8 Summary Practice Exercises Bibliographical Notes Bibliography
Chapter 10 Mass-Storage Structure
10.1 Overview of Mass-Storage Structure 10.2 Disk Structure 10.3 Disk Attachment 10.4 Disk Scheduling 10.5 Disk Management 10.6 Swap-Space Management 10.7 RAID Structure 10.8 Stable-Storage Implementation 10.9 Summary Practice Exercises Bibliographical Notes Bibliography
10.1 Overview of Mass-Storage Structure 10.2 Disk Structure 10.3 Disk Attachment 10.4 Disk Scheduling 10.5 Disk Management 10.6 Swap-Space Management 10.7 RAID Structure 10.8 Stable-Storage Implementation 10.9 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 11 File-System Interface
11.1 File Concept 11.2 Access Methods 11.3 Directory and Disk Structure 11.4 File-System Mounting 11.5 File Sharing 11.6 Protection 11.7 Summary Practice Exercises Bibliographical Notes Bibliography
11.1 File Concept 11.2 Access Methods 11.3 Directory and Disk Structure 11.4 File-System Mounting 11.5 File Sharing 11.6 Protection 11.7 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 12 File-System Implementation
12.1 File-System Structure 12.2 File-System Implementation 12.3 Directory Implementation 12.4 Allocation Methods 12.5 Free-Space Management 12.6 Efficiency and Performance 12.7 Recovery 12.8 NFS 12.9 Example: The WAFL File System 12.10 Summary Practice Exercises Bibliographical Notes Bibliography
12.1 File-System Structure 12.2 File-System Implementation 12.3 Directory Implementation 12.4 Allocation Methods 12.5 Free-Space Management 12.6 Efficiency and Performance 12.7 Recovery 12.8 NFS 12.9 Example: The WAFL File System 12.10 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 13 I/O Systems
13.1 Overview 13.2 I/O Hardware 13.3 Application I/O Interface 13.4 Kernel I/O Subsystem 13.5 Transforming I/O Requests to Hardware Operations 13.6 STREAMS 13.7 Performance 13.8 Summary Practice Exercises Bibliographical Notes Bibliography
13.1 Overview 13.2 I/O Hardware 13.3 Application I/O Interface 13.4 Kernel I/O Subsystem 13.5 Transforming I/O Requests to Hardware Operations 13.6 STREAMS 13.7 Performance 13.8 Summary Practice Exercises Bibliographical Notes Bibliography PART FIVE PROTECTION AND SECURITY
Chapter 14 Protection
14.1 Goals of Protection 14.2 Principles of Protection 14.3 Domain of Protection 14.4 Access Matrix 14.5 Implementation of the Access Matrix 14.6 Access Control 14.7 Revocation of Access Rights 14.8 Capability-Based Systems 14.9 Language-Based Protection 14.10 Summary Practice Exercises Bibliographical Notes Bibliography
14.1 Goals of Protection 14.2 Principles of Protection 14.3 Domain of Protection 14.4 Access Matrix 14.5 Implementation of the Access Matrix 14.6 Access Control 14.7 Revocation of Access Rights 14.8 Capability-Based Systems 14.9 Language-Based Protection 14.10 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 15 Security
15.1 The Security Problem 15.2 Program Threats 15.3 System and Network Threats 15.4 Cryptography as a Security Tool 15.5 User Authentication 15.6 Implementing Security Defenses 15.7 Firewalling to Protect Systems and Networks 15.8 Computer-Security Classifications 15.9 An Example: Windows 7 15.10 Summary Exercises Bibliographical Notes Bibliography
15.1 The Security Problem 15.2 Program Threats 15.3 System and Network Threats 15.4 Cryptography as a Security Tool 15.5 User Authentication 15.6 Implementing Security Defenses 15.7 Firewalling to Protect Systems and Networks 15.8 Computer-Security Classifications 15.9 An Example: Windows 7 15.10 Summary Exercises Bibliographical Notes Bibliography
Chapter 14 Protection
14.1 Goals of Protection 14.2 Principles of Protection 14.3 Domain of Protection 14.4 Access Matrix 14.5 Implementation of the Access Matrix 14.6 Access Control 14.7 Revocation of Access Rights 14.8 Capability-Based Systems 14.9 Language-Based Protection 14.10 Summary Practice Exercises Bibliographical Notes Bibliography
14.1 Goals of Protection 14.2 Principles of Protection 14.3 Domain of Protection 14.4 Access Matrix 14.5 Implementation of the Access Matrix 14.6 Access Control 14.7 Revocation of Access Rights 14.8 Capability-Based Systems 14.9 Language-Based Protection 14.10 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 15 Security
15.1 The Security Problem 15.2 Program Threats 15.3 System and Network Threats 15.4 Cryptography as a Security Tool 15.5 User Authentication 15.6 Implementing Security Defenses 15.7 Firewalling to Protect Systems and Networks 15.8 Computer-Security Classifications 15.9 An Example: Windows 7 15.10 Summary Exercises Bibliographical Notes Bibliography
15.1 The Security Problem 15.2 Program Threats 15.3 System and Network Threats 15.4 Cryptography as a Security Tool 15.5 User Authentication 15.6 Implementing Security Defenses 15.7 Firewalling to Protect Systems and Networks 15.8 Computer-Security Classifications 15.9 An Example: Windows 7 15.10 Summary Exercises Bibliographical Notes Bibliography PART SIX ADVANCED TOPICS
Chapter 16 Virtual Machines
16.1 Overview 16.2 History 16.3 Benefits and Features 16.4 Building Blocks 16.5 Types of Virtual Machines and Their Implementations 16.6 Virtualization and Operating-System Components 16.7 Examples 16.8 Summary Exercises Bibliographical Notes Bibliography
16.1 Overview 16.2 History 16.3 Benefits and Features 16.4 Building Blocks 16.5 Types of Virtual Machines and Their Implementations 16.6 Virtualization and Operating-System Components 16.7 Examples 16.8 Summary Exercises Bibliographical Notes Bibliography Chapter 17 Distributed Systems
17.1 Advantages of Distributed Systems 17.2 Types of Network-based Operating Systems 17.3 Network Structure 17.4 Communication Structure 17.5 Communication Protocols 17.6 An Example: TCP/IP 17.7 Robustness 17.8 Design Issues 17.9 Distributed File Systems 17.10 Summary Practice Exercises Bibliographical Notes Bibliography
17.1 Advantages of Distributed Systems 17.2 Types of Network-based Operating Systems 17.3 Network Structure 17.4 Communication Structure 17.5 Communication Protocols 17.6 An Example: TCP/IP 17.7 Robustness 17.8 Design Issues 17.9 Distributed File Systems 17.10 Summary Practice Exercises Bibliographical Notes Bibliography
Chapter 16 Virtual Machines
16.1 Overview 16.2 History 16.3 Benefits and Features 16.4 Building Blocks 16.5 Types of Virtual Machines and Their Implementations 16.6 Virtualization and Operating-System Components 16.7 Examples 16.8 Summary Exercises Bibliographical Notes Bibliography
16.1 Overview 16.2 History 16.3 Benefits and Features 16.4 Building Blocks 16.5 Types of Virtual Machines and Their Implementations 16.6 Virtualization and Operating-System Components 16.7 Examples 16.8 Summary Exercises Bibliographical Notes Bibliography Chapter 17 Distributed Systems
17.1 Advantages of Distributed Systems 17.2 Types of Network-based Operating Systems 17.3 Network Structure 17.4 Communication Structure 17.5 Communication Protocols 17.6 An Example: TCP/IP 17.7 Robustness 17.8 Design Issues 17.9 Distributed File Systems 17.10 Summary Practice Exercises Bibliographical Notes Bibliography
17.1 Advantages of Distributed Systems 17.2 Types of Network-based Operating Systems 17.3 Network Structure 17.4 Communication Structure 17.5 Communication Protocols 17.6 An Example: TCP/IP 17.7 Robustness 17.8 Design Issues 17.9 Distributed File Systems 17.10 Summary Practice Exercises Bibliographical Notes Bibliography PART SEVEN CASE STUDIES
Chapter 18 The Linux System
18.1 Linux History 18.2 Design Principles 18.3 Kernel Modules 18.4 Process Management 18.5 Scheduling 18.6 Memory Management 18.7 File Systems 18.8 Input and Output 18.9 Interprocess Communication 18.10 Network Structure 18.11 Security 18.12 Summary Practice Exercises Bibliographical Notes Bibliography
18.1 Linux History 18.2 Design Principles 18.3 Kernel Modules 18.4 Process Management 18.5 Scheduling 18.6 Memory Management 18.7 File Systems 18.8 Input and Output 18.9 Interprocess Communication 18.10 Network Structure 18.11 Security 18.12 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 19 Windows 7
19.1 History 19.2 Design Principles 19.3 System Components 19.4 Terminal Services and Fast User Switching 19.5 File System 19.6 Networking 19.7 Programmer Interface 19.8 Summary Practice Exercises Bibliographical Notes Bibliography
19.1 History 19.2 Design Principles 19.3 System Components 19.4 Terminal Services and Fast User Switching 19.5 File System 19.6 Networking 19.7 Programmer Interface 19.8 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 20 Influential Operating Systems
20.1 Feature Migration 20.2 Early Systems 20.3 Atlas 20.4 XDS-940 20.5 THE 20.6 RC 4000 20.7 CTSS 20.8 MULTICS 20.9 IBM OS/360 20.10 TOPS-20 20.11 CP/M and MS/DOS 20.12 Macintosh Operating System and Windows 20.13 Mach 20.14 Other Systems Exercises Bibliographical Notes Bibliography
20.1 Feature Migration 20.2 Early Systems 20.3 Atlas 20.4 XDS-940 20.5 THE 20.6 RC 4000 20.7 CTSS 20.8 MULTICS 20.9 IBM OS/360 20.10 TOPS-20 20.11 CP/M and MS/DOS 20.12 Macintosh Operating System and Windows 20.13 Mach 20.14 Other Systems Exercises Bibliographical Notes Bibliography
Chapter 18 The Linux System
18.1 Linux History 18.2 Design Principles 18.3 Kernel Modules 18.4 Process Management 18.5 Scheduling 18.6 Memory Management 18.7 File Systems 18.8 Input and Output 18.9 Interprocess Communication 18.10 Network Structure 18.11 Security 18.12 Summary Practice Exercises Bibliographical Notes Bibliography
18.1 Linux History 18.2 Design Principles 18.3 Kernel Modules 18.4 Process Management 18.5 Scheduling 18.6 Memory Management 18.7 File Systems 18.8 Input and Output 18.9 Interprocess Communication 18.10 Network Structure 18.11 Security 18.12 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 19 Windows 7
19.1 History 19.2 Design Principles 19.3 System Components 19.4 Terminal Services and Fast User Switching 19.5 File System 19.6 Networking 19.7 Programmer Interface 19.8 Summary Practice Exercises Bibliographical Notes Bibliography
19.1 History 19.2 Design Principles 19.3 System Components 19.4 Terminal Services and Fast User Switching 19.5 File System 19.6 Networking 19.7 Programmer Interface 19.8 Summary Practice Exercises Bibliographical Notes Bibliography Chapter 20 Influential Operating Systems
20.1 Feature Migration 20.2 Early Systems 20.3 Atlas 20.4 XDS-940 20.5 THE 20.6 RC 4000 20.7 CTSS 20.8 MULTICS 20.9 IBM OS/360 20.10 TOPS-20 20.11 CP/M and MS/DOS 20.12 Macintosh Operating System and Windows 20.13 Mach 20.14 Other Systems Exercises Bibliographical Notes Bibliography
20.1 Feature Migration 20.2 Early Systems 20.3 Atlas 20.4 XDS-940 20.5 THE 20.6 RC 4000 20.7 CTSS 20.8 MULTICS 20.9 IBM OS/360 20.10 TOPS-20 20.11 CP/M and MS/DOS 20.12 Macintosh Operating System and Windows 20.13 Mach 20.14 Other Systems Exercises Bibliographical Notes Bibliography Credits Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion