Operating System Concepts : Essentials

Guardado en:
Detalles Bibliográficos
Autores principales: Silberschatz, Abraham, Baer Galvin, Peter, Gagne, Greg
Formato: Libro
Lenguaje:Inglés
Publicado: New Jersey : Wiley, 2014.
Edición:2a ed.
Materias:
Aporte de:Registro referencial: Solicitar el recurso aquí
LEADER 05222nam a22003137a 4500
003 AR-BaUNH
005 20230513063108.0
008 230214s2014 us ado |r|||| 001 0 eng d
020 |a 9781118804926 
040 |a AR-BaUNH  |b spa  |c AR-BaUNH  |d AR-BaUNH  |e aacr 
041 0 |a eng 
082 1 |a 005.2 
100 1 |9 5482  |a Silberschatz, Abraham 
100 1 |9 6560  |a Baer Galvin, Peter 
100 1 |9 6561  |a Gagne, Greg 
245 |a Operating System Concepts :  |b Essentials 
250 |a 2a ed. 
260 |a New Jersey :  |b Wiley,  |c 2014. 
300 |a xx, 20 p. :  |b il., fot. b&n, gra. ;  |c 26 cm. 
505 |a Preface. -- INTRODUCTION. -- What operating systems do. -- Computer-system organization. -- Computer-system architecture. -- Operating-system structure. -- Operating-system operations. -- Process management. -- Memory management. -- Storage management. -- Protection and security. -- Kernel data structures. -- Computing data enviroment. -- Open-source operating systems. -- Summary. -- OPERATING-SYSTEM STRUCTURES. -- Operating-system services. -- User an operating-system interface. -- System calls. -- Types of system calls. -- System programs. -- Operating-system desing and implementation. -- Operating-system structure. -- Operating-system debugging. -- Operating-system generation. -- System boot. -- Summary. -- PROCESSES. -- Process concept. -- Process building. -- Operations on processes. -- Interprocess communication. -- Examples of IPC systems. -- Communication in client-server systems. -- Summary. -- THREADS. -- Overview. -- Multicore programming. -- Multithreading models. -- Thread libraries. -- Implicit threading. -- Threading issues. -- Operating-system examples. -- Summary. -- PROCESS SYNCHRONIZATION. -- Background. -- The critical-selection problem. -- Peterson's solution. -- Synchronization hardware. -- Mutex locks. -- Semaphores. -- Classic problems of synchronization. -- Monitors. -- Synchronization examples. -- Alternative approaches. -- Deadlocks. -- Summary. -- CPU SCHEDULING. -- Basis concepts. -- Scheduling criteria. -- Scheduling algorithms. -- Thread scheduling. -- Multiple-processor scheduling. -- Real-time CPU scheduling. -- Operating-system examples. -- Algorithm evaluation. -- Summary. -- MAIN MEMORY. -- Background. -- Swapping. -- Contiguous memory allocation. -- Segmentation. -- Paging. -- Structure of the page table. -- Example: Intel 32 and 34-bit architectures. -- Example: ARM architecture. -- Summary. -- VIRTUAL MEMORY. -- Background. -- Demand paging. -- Copy-on-write. -- Page replacement. -- Allocation of frames. -- Trashing. -- Memory-mapped films. -- Allocating Kernel memory. -- Other considerations. -- Operating-system examples. -- Summary. -- MASS-STORAGE STRUCTURE. -- Overview of mass-storage structure. -- Disk structure. -- Disk attachmente. -- Disk scheduling. -- Disk management. -- Swap-space management. -- RAID structure. -- Stable-storage implementation. -- Summary. -- FILE-SYSTEM INTERFACE. -- File concept. -- Acces methods. -- Directory and disk structure. -- File system mounting. -- Filse sharing. -- Protection. -- Summary. -- FILE-SYSTEM IMPLEMENTATION. -- Sile-system structure. -- Sile-system Implementation. -- Directory implementation. -- Allocation methods. -- Free-space management. -- Efficiency and performance. -- Recovery. -- NFS. -- Example: The WAFL file-system. -- Summary. -- I/O SYSTEMS. -- Overview. -- I/O hardware. -- Application I/O interface. -- Kernel I/O subsystem. -- Transforming I/O request to hardware operations. -- Streams. -- Performance. -- Summary. -- PROTECTION. -- Goals of protection. -- Principles of protection. -- Domain of protection. -- Acces matrix. -- Implementation of the access matrix. -- Access control. -- Revocation of access rights. -- Capability-based systemes. -- Language-based protection. -- Summary. -- SECURITY. -- The security problem. -- Program threats. -- System and netqwork threats. -- Cryptography as a security tool. -- User authentication. -- Implementing security defenses. -- Firewalling to protect systems and networks. -- Computer-security classifications. -- An example: Windows 7. -- Summary. -- THE LINUX SYSTEM. -- Linux history. -- Design principles. -- Kernel modules. -- Process management. -- Scheduling. -- Memory management. -- File systems. -- Input and output. -- Interprocess communications. -- Network security. -- Security. -- Summary. -- APPENDEX A. BSD UNIX (CONTENTS ONLINE). -- UNIX history. -- Design principles. -- Programmer interface. -- Process management. -- Memory management. -- File system. -- I/O system. -- Interprocess communications. -- Summary. -- APPENDIX B. THE MACH SYSTEM (CONTENTS ONLINE). -- History of the Mach system. -- Desing principles. -- System components. -- Process management. -- Interprocess communication. -- Memory management. -- Programmer interface B section 17.7. -- Summary. -- Index. 
650 0 |a INFORMÁTICA  |9 1376 
650 7 |a SISTEMAS OPERATIVOS (Computadoras)  |9 6492 
650 0 |9 6574  |a GESTION DE PROCESOS (Informática) 
650 0 |9 6575  |a ALMACENAMIENTO DE DATOS 
650 0 |9 6569  |a GESTIÓN DE MEMORIA 
650 0 |a CETI  |9 6648 
900 |a Bruno  |b Bruno 
942 |2 ddc  |c LIBROS 
999 |c 4648  |d 4650