Operating Systems. (Record no. 25633)

MARC details
000 -LEADER
fixed length control field 09733nam a22003733i 4500
001 - CONTROL NUMBER
control field EBC5127071
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190107113539.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s2008 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131740293
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5127071
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5127071
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL262891
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1024279919
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.43
Edition number 23 rd
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William.
245 10 - TITLE STATEMENT
Title Operating Systems.
250 ## - EDITION STATEMENT
Edition statement 6th ed.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (998 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Contents -- Preface -- Chapter 0 Reader's Guide -- 0.1 Outline of the Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- PART ONE: BACKGROUND -- Chapter 1 Computer System Overview -- 1.1 Basic Elements -- 1.2 Processor Registers -- 1.3 Instruction Execution -- 1.4 Interrupts -- 1.5 The Memory Hierarchy -- 1.6 Cache Memory -- 1.7 I/O Communication Techniques -- 1.8 Recommended Reading and Web Sites -- 1.9 Key Terms, Review Questions, and Problems -- Appendix 1A: Performance Characteristics of Two-Level Memory -- Appendix 1B: Procedure Control -- Chapter 2 Operating System Overview -- 2.1 Operating System Objectives and Functions -- 2.2 The Evolution of Operating Systems -- 2.3 Major Achievements -- 2.4 Developments Leading to Modern Operating Systems -- 2.5 Microsoft Windows Overview -- 2.6 Traditional UNIX Systems -- 2.7 Modern UNIX Systems -- 2.8 Linux -- 2.9 Recommended Reading and Web Sites -- 2.10 Key Terms, Review Questions, and Problems -- PART TWO: PROCESSES -- Chapter 3 Process Description and Control -- 3.1 What is a Process? -- 3.2 Process States -- 3.3 Process Description -- 3.4 Process Control -- 3.5 Execution of the Operating System -- 3.6 Security Issues -- 3.7 UNIX SVR4 Process Management -- 3.8 Summary -- 3.9 Recommended Reading -- 3.10 Key Terms, Review Questions, and Problems -- Programming Project One Developing a Shell -- Chapter 4 Threads, SMP, and Microkernels -- 4.1 Processes and Threads -- 4.2 Symmetric Multiprocessing (SMP) -- 4.3 Microkernels -- 4.4 Windows Vista Thread and SMP Management -- 4.5 Solaris Thread and SMP Management -- 4.6 Linux Process and Thread Management -- 4.7 Summary -- 4.8 Recommended Reading -- 4.9 Key Terms, Review Questions, and Problems -- Chapter 5 Concurrency: Mutual Exclusion and Synchronization -- 5.1 Principles of Concurrency.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5.2 Mutual Exclusion: Hardware Support -- 5.3 Semaphores -- 5.4 Monitors -- 5.5 Message Passing -- 5.6 Readers/Writers Problem -- 5.7 Summary -- 5.8 Recommended Reading -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Concurrency: Deadlock and Starvation -- 6.1 Principles of Deadlock -- 6.2 Deadlock Prevention -- 6.3 Deadlock Avoidance -- 6.4 Deadlock Detection -- 6.5 An Integrated Deadlock Strategy -- 6.6 Dining Philosophers Problem -- 6.7 UNIX Concurrency Mechanisms -- 6.8 Linux Kernel Concurrency Mechanisms -- 6.9 Solaris Thread Synchronization Primitives -- 6.10 Windows Vista Concurrency Mechanisms -- 6.11 Summary -- 6.12 Recommended Reading -- 6.13 Key Terms, Review Questions, and Problems -- PART THREE: MEMORY -- Chapter 7 Memory Management -- 7.1 Memory Management Requirements -- 7.2 Memory Partitioning -- 7.3 Paging -- 7.4 Segmentation -- 7.5 Security Issues -- 7.6 Summary -- 7.7 Recommended Reading -- 7.8 Key Terms, Review Questions, and Problems -- Appendix 7A: Loading and Linking -- Chapter 8 Virtual Memory -- 8.1 Hardware and Control Structures -- 8.2 Operating System Software -- 8.3 UNIX and Solaris Memory Management -- 8.4 Linux Memory Management -- 8.5 Windows Vista Memory Management -- 8.6 Summary -- 8.7 Recommended Reading and Web Sites -- 8.8 Key Terms, Review Questions, and Problems -- Appendix 8A: Hash Tables -- PART FOUR: SCHEDULING -- Chapter 9 Uniprocessor Scheduling -- 9.1 Types of Scheduling -- 9.2 Scheduling Algorithms -- 9.3 Traditional UNIX Scheduling -- 9.4 Summary -- 9.5 Recommended Reading -- 9.6 Key Terms, Review Questions, and Problems -- Appendix 9A: Response Time -- Appendix 9B: Queuing Systems -- Programming Project TwoThe HOST Dispatcher Shell -- Chapter 10 Multiprocessor and Real-Time Scheduling -- 10.1 Multiprocessor Scheduling -- 10.2 Real-Time Scheduling -- 10.3 Linux Scheduling.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 10.4 UNIX FreeBSD Scheduling -- 10.5 Windows Vista Scheduling -- 10.6 Summary -- 10.7 Recommended Reading -- 10.8 Key Terms, Review Questions, and Problems -- PART FIVE: INPUT/OUTPUT AND FILES -- Chapter 11 I/O Management and Disk Scheduling -- 11.1 I/O Devices -- 11.2 Organization of the I/O Function -- 11.3 Operating System Design Issues -- 11.4 I/O Buffering -- 11.5 Disk Scheduling -- 11.6 RAID -- 11.7 Disk Cache -- 11.8 UNIX FreeBSD I/O -- 11.9 Linux I/O -- 11.10 Windows Vista I/O -- 11.11 Summary -- 11.12 Recommended Reading -- 11.13 Key Terms, Review Questions, and Problems -- Appendix 11A: Disk Storage Devices -- Chapter 12 File Management -- 12.1 Overview -- 12.2 File Organization and Access -- 12.3 File Directories -- 12.4 File Sharing -- 12.5 Record Blocking -- 12.6 Secondary Storage Management -- 12.7 File System Security -- 12.8 UNIX File Management -- 12.9 Linux File Management -- 12.10 Windows Vista File System -- 12.11 Summary -- 12.12 Recommended Reading -- 12.13 Key Terms, Review Questions, and Problems -- PART SIX: EMBEDDED SYSTEMS -- Chapter 13 Embedded Operating Systems -- 13.1 Embedded Systems -- 13.2 Characteristics of Embedded Operating Systems -- 13.3 eCOS -- 13.4 TinyOS -- 13.5 Recommended Reading and Web Sites -- 13.6 Key Terms, Review Questions, and Problems -- PART SEVEN: SECURITY -- Chapter 14 Computer Security Threats -- 14.1 Computer Security Concepts -- 14.2 Threats,Attacks, and Assets -- 14.3 Intruders -- 14.4 Malicious Software Overview -- 14.5 Viruses, Worms, and Bots -- 14.6 Rootkits -- 14.7 Recommended Readings and Web Sites -- 14.8 Key Terms, Review Questions, and Problems -- Chapter 15 Computer Security Techniques -- 15.1 Authentication -- 15.2 Access Control -- 15.3 Intrusion Detection -- 15.4 Malware Defense -- 15.5 Dealing with Buffer Overflow Attacks -- 15.6 Windows Vista Security.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 15.7 Recommended Readings and Web Sites -- 15.8 Key Terms, Review Questions, and Problems -- PART EIGHT: DISTRIBUTED SYSTEMS -- Chapter 16 Distributed Processing, Client/Server, and Clusters -- 16.1 Client/Server Computing -- 16.2 Distributed Message Passing -- 16.3 Remote Procedure Calls -- 16.4 Clusters -- 16.5 Windows Vista Cluster Server -- 16.6 Sun Cluster -- 16.7 Beowulf and Linux Clusters -- 16.8 Summary -- 16.9 Recommended Reading -- 16.10 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A: Topics in Concurrency -- A.1 Mutual Exclusion: Software Approaches -- A.2 Race Conditions and Semaphores -- A.3 A Barbershop Problem -- A.4 Problems -- Appendix B: Object-Oriented Design -- B.1 Motivation -- B.2 Object-Oriented Concepts -- B.3 Benefits of Object-Oriented Design -- B.4 CORBA -- B.5 Recommended Reading and Web Site -- Appendix C: Programming and Operating System Projects -- C.1 Animations and Animation Projects -- C.2 Simulations -- C.3 Programming Projects -- C.4 Research Projects -- C.5 Reading/Report Assignments -- C.6 Writing Assignments -- C.7 Documentation Projects -- C.8 BACI and Nachos -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Z -- ONLINE CHAPTERS AND APPENDICES -- Chapter 17 Networking -- 17.1 The Need for a Protocol Architecture -- 17.2 The TCP/IP Protocol Architecture -- 17.3 Sockets -- 17.4 Linux Networking -- 17.5 Summary -- 17.6 Recommended Reading and Web Sites -- 17.7 Key Terms, Review Questions, and Problems -- Appendix 17A: The Trivial File Transfer Protocol -- Chapter 18 Distributed Process Management -- 18.1 Process Migration -- 18.2 Distributed Global States.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 18.3 Distributed Mutual Exclusion -- 18.4 Distributed Deadlock -- 18.5 Summary -- 18.6 Recommended Reading -- 18.7 Key Terms, Review Questions, and Problems -- Appendix D: The Complexity of Algorithms -- Appendix E: Standards Organizations -- E.1 The Importance of Standards -- E.2 Standards and Regulation -- E.3 Standards-Setting Organizations -- Appendix F: Cryptographic Algorithms -- F.1 Symmetric Encryption -- F.2 Public-Key Cryptography -- F.3 Secure Hash Functions -- Appendix G: The International Reference Alphabet -- Appendix H: BACI:The Ben-Ari Concurrent Programming System -- H.1 Introduction -- H.2 BACI -- H.3 Examples of BACI Programs -- H.4 BACI Projects -- H.5 Enhancements to the BACK System -- Appendix I: Sockets: A Programmer's Introduction -- I.1 Versions of Sockets -- I.2 Sockets, Socket Descriptors, Ports, and Connections -- I.3 The Client/Server Model of Communication -- I.4 Sockets Elements -- I.5 Stream and Datagram Sockets -- I.6 Run-Time Program Control -- I.7 Remote Execution of a Windows Console Application.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Stallings, William
Title Operating Systems: Internals and Design Principles
Place, publisher, and date of publication : Pearson India,c2008
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127071">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127071</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification Online access     CENTRAL LIBRARY Digital Library Digital Library 07/01/2019   005.43 STA-O6 E0139 07/01/2019 07/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery