|
|
|
|
| LEADER |
05222nam a22003137a 4500 |
| 003 |
AR-BaUNH |
| 005 |
20230513063108.0 |
| 008 |
230214s2014 us ado |r|||| 001 0 eng d |
| 020 |
|
|
|a 9781118804926
|
| 040 |
|
|
|a AR-BaUNH
|b spa
|c AR-BaUNH
|d AR-BaUNH
|e aacr
|
| 041 |
0 |
|
|a eng
|
| 082 |
1 |
|
|a 005.2
|
| 100 |
1 |
|
|9 5482
|a Silberschatz, Abraham
|
| 100 |
1 |
|
|9 6560
|a Baer Galvin, Peter
|
| 100 |
1 |
|
|9 6561
|a Gagne, Greg
|
| 245 |
|
|
|a Operating System Concepts :
|b Essentials
|
| 250 |
|
|
|a 2a ed.
|
| 260 |
|
|
|a New Jersey :
|b Wiley,
|c 2014.
|
| 300 |
|
|
|a xx, 20 p. :
|b il., fot. b&n, gra. ;
|c 26 cm.
|
| 505 |
|
|
|a Preface. -- INTRODUCTION. -- What operating systems do. -- Computer-system organization. -- Computer-system architecture. -- Operating-system structure. -- Operating-system operations. -- Process management. -- Memory management. -- Storage management. -- Protection and security. -- Kernel data structures. -- Computing data enviroment. -- Open-source operating systems. -- Summary. -- OPERATING-SYSTEM STRUCTURES. -- Operating-system services. -- User an operating-system interface. -- System calls. -- Types of system calls. -- System programs. -- Operating-system desing and implementation. -- Operating-system structure. -- Operating-system debugging. -- Operating-system generation. -- System boot. -- Summary. -- PROCESSES. -- Process concept. -- Process building. -- Operations on processes. -- Interprocess communication. -- Examples of IPC systems. -- Communication in client-server systems. -- Summary. -- THREADS. -- Overview. -- Multicore programming. -- Multithreading models. -- Thread libraries. -- Implicit threading. -- Threading issues. -- Operating-system examples. -- Summary. -- PROCESS SYNCHRONIZATION. -- Background. -- The critical-selection problem. -- Peterson's solution. -- Synchronization hardware. -- Mutex locks. -- Semaphores. -- Classic problems of synchronization. -- Monitors. -- Synchronization examples. -- Alternative approaches. -- Deadlocks. -- Summary. -- CPU SCHEDULING. -- Basis concepts. -- Scheduling criteria. -- Scheduling algorithms. -- Thread scheduling. -- Multiple-processor scheduling. -- Real-time CPU scheduling. -- Operating-system examples. -- Algorithm evaluation. -- Summary. -- MAIN MEMORY. -- Background. -- Swapping. -- Contiguous memory allocation. -- Segmentation. -- Paging. -- Structure of the page table. -- Example: Intel 32 and 34-bit architectures. -- Example: ARM architecture. -- Summary. -- VIRTUAL MEMORY. -- Background. -- Demand paging. -- Copy-on-write. -- Page replacement. -- Allocation of frames. -- Trashing. -- Memory-mapped films. -- Allocating Kernel memory. -- Other considerations. -- Operating-system examples. -- Summary. -- MASS-STORAGE STRUCTURE. -- Overview of mass-storage structure. -- Disk structure. -- Disk attachmente. -- Disk scheduling. -- Disk management. -- Swap-space management. -- RAID structure. -- Stable-storage implementation. -- Summary. -- FILE-SYSTEM INTERFACE. -- File concept. -- Acces methods. -- Directory and disk structure. -- File system mounting. -- Filse sharing. -- Protection. -- Summary. -- FILE-SYSTEM IMPLEMENTATION. -- Sile-system structure. -- Sile-system Implementation. -- Directory implementation. -- Allocation methods. -- Free-space management. -- Efficiency and performance. -- Recovery. -- NFS. -- Example: The WAFL file-system. -- Summary. -- I/O SYSTEMS. -- Overview. -- I/O hardware. -- Application I/O interface. -- Kernel I/O subsystem. -- Transforming I/O request to hardware operations. -- Streams. -- Performance. -- Summary. -- PROTECTION. -- Goals of protection. -- Principles of protection. -- Domain of protection. -- Acces matrix. -- Implementation of the access matrix. -- Access control. -- Revocation of access rights. -- Capability-based systemes. -- Language-based protection. -- Summary. -- SECURITY. -- The security problem. -- Program threats. -- System and netqwork threats. -- Cryptography as a security tool. -- User authentication. -- Implementing security defenses. -- Firewalling to protect systems and networks. -- Computer-security classifications. -- An example: Windows 7. -- Summary. -- THE LINUX SYSTEM. -- Linux history. -- Design principles. -- Kernel modules. -- Process management. -- Scheduling. -- Memory management. -- File systems. -- Input and output. -- Interprocess communications. -- Network security. -- Security. -- Summary. -- APPENDEX A. BSD UNIX (CONTENTS ONLINE). -- UNIX history. -- Design principles. -- Programmer interface. -- Process management. -- Memory management. -- File system. -- I/O system. -- Interprocess communications. -- Summary. -- APPENDIX B. THE MACH SYSTEM (CONTENTS ONLINE). -- History of the Mach system. -- Desing principles. -- System components. -- Process management. -- Interprocess communication. -- Memory management. -- Programmer interface B section 17.7. -- Summary. -- Index.
|
| 650 |
|
0 |
|a INFORMÁTICA
|9 1376
|
| 650 |
|
7 |
|a SISTEMAS OPERATIVOS (Computadoras)
|9 6492
|
| 650 |
|
0 |
|9 6574
|a GESTION DE PROCESOS (Informática)
|
| 650 |
|
0 |
|9 6575
|a ALMACENAMIENTO DE DATOS
|
| 650 |
|
0 |
|9 6569
|a GESTIÓN DE MEMORIA
|
| 650 |
|
0 |
|a CETI
|9 6648
|
| 900 |
|
|
|a Bruno
|b Bruno
|
| 942 |
|
|
|2 ddc
|c LIBROS
|
| 999 |
|
|
|c 4648
|d 4650
|