Silberschatz's Operating System Concepts, Global Edition
Häftad, Engelska, 2019
Av Abraham Silberschatz, Peter B. Galvin, Greg Gagne, Abraham (Yale University) Silberschatz, Peter B. (Corporate Technologies) Galvin, Greg (Westminster College) Gagne
849 kr
Skickas imorgon
Fri frakt för medlemmar vid köp för minst 249 kr.Instruction on operating system functionality with examples incorporated for improved learningWith the updating of Silberschatz's Operating System Concepts, 10th Edition, students have access to a text that presents both important concepts and real-world applications. Key concepts are reinforced in this global edition through instruction, chapter practice exercises, homework exercises, and suggested readings. Students also receive an understanding how to apply the content. The book provides example programs written in C and Java for use in programming environments.
Produktinformation
- Utgivningsdatum2019-07-30
- Mått201 x 252 x 36 mm
- Vikt1 656 g
- FormatHäftad
- SpråkEngelska
- Antal sidor896
- Upplaga10
- FörlagJohn Wiley & Sons Inc
- ISBN9781119454083
Tillhör följande kategorier
- Part One OverviewChapter 1 Introduction1.1 What Operating Systems Do 41.2 Computer-System Organization 71.3 Computer-System Architecture 151.4 Operating-System Operations 211.5 Resource Management 271.6 Security and Protection 331.7 Virtualization 341.8 Distributed Systems 351.9 Kernel Data Structures 361.10 Computing Environments 401.11 Free and Open-Source Operating Systems 461.12 Summary 51Exercises 53Further Reading 57Chapter 2 Operating-System Structures2.1 Operating-System Services 592.2 User and Operating-System Interface 622.3 System Calls 662.4 System Services 782.5 Linkers and Loaders 792.6 Why Applications Are Operating-System Specific 812.7 Operating-System Design and Implementation 832.8 Operating-System Structure 852.9 Building and Booting an Operating System 952.10 Operating-System Debugging 992.11 Summary 104Exercises 105Further Reading 107Part Two Process ManagementChapter 3 Processes3.1 Process Concept 1123.2 Process Scheduling 1163.3 Operations on Processes 1223.4 Interprocess Communication 1293.5 IPC in Shared-Memory Systems 1313.6 IPC in Message-Passing Systems 1333.7 Examples of IPC Systems 1383.8 Communication in Client–Server Systems 1513.9 Summary 159Exercises 161Further Reading 166Chapter 4 Threads & Concurrency4.1 Overview 1684.2 Multicore Programming 1704.3 Multithreading Models 1744.4 Thread Libraries 1764.5 Implicit Threading 1844.6 Threading Issues 1964.7 Operating-System Examples 2024.8 Summary 204Exercises 205Further Reading 208Chapter 5 CPU Scheduling5.1 Basic Concepts 2125.2 Scheduling Criteria 2165.3 Scheduling Algorithms 2175.4 Thread Scheduling 2295.5 Multi-Processor Scheduling 2325.6 Real-Time CPU Scheduling 2395.7 Operating-System Examples 2465.8 Algorithm Evaluation 2565.9 Summary 262Exercises 263Further Reading 270Part Three Process SynchronizationChapter 6 Synchronization Tools6.1 Background 2736.2 The Critical-Section Problem 2766.3 Peterson’s Solution 2786.4 Hardware Support for Synchronization 2816.5 Mutex Locks 2866.6 Semaphores 2886.7 Monitors 2926.8 Liveness 2996.9 Evaluation 3006.10 Summary 302Exercises 303Further Reading 309Chapter 7 Synchronization Examples7.1 Classic Problems of Synchronization 3117.2 Synchronization within the Kernel 3177.3 POSIX Synchronization 3217.4 Synchronization in Java 3257.5 Alternative Approaches 3337.6 Summary 336Exercises 336Further Reading 338Chapter 8 Deadlocks8.1 System Model 3428.2 Deadlock in Multithreaded Applications 3438.3 Deadlock Characterization 3458.4 Methods for Handling Deadlocks 3508.5 Deadlock Prevention 3518.6 Deadlock Avoidance 3548.7 Deadlock Detection 3618.8 Recovery from Deadlock 3658.9 Summary 367Exercises 368Further Reading 374Part Four Memory ManagementChapter 9 Main Memory9.1 Background 3799.2 Contiguous Memory Allocation 3869.3 Paging 3909.4 Structure of the Page Table 4019.5 Swapping 4069.6 Example: Intel 32- and 64-bit Architectures 4099.7 Example: ARMv8 Architecture 4139.8 Summary 414Exercises 415Further Reading 420Chapter 10 Virtual Memory10.1 Background 42110.2 Demand Paging 42410.3 Copy-on-Write 43110.4 Page Replacement 43310.5 Allocation of Frames 44510.6 Thrashing 45110.7 Memory Compression 45710.8 Allocating Kernel Memory 45810.9 Other Considerations 46210.10 Operating-System Examples 46810.11 Summary 472Exercises 473Further Reading 482Part Five Storage ManagementChapter 11 Mass-Storage Structure11.1 Overview of Mass-Storage Structure 48511.2 HDD Scheduling 49311.3 NVM Scheduling 49711.4 Error Detection and Correction 49811.5 Storage Device Management 49911.6 Swap-Space Management 50311.7 Storage Attachment 50511.8 RAID Structure 50911.9 Summary 521Exercises 522Further Reading 527Chapter 12 I/O Systems12.1 Overview 52912.2 I/O Hardware 53012.3 Application I/O Interface 54012.4 Kernel I/O Subsystem 54812.5 Transforming I/O Requests to Hardware Operations 55612.6 STREAMS 55912.7 Performance 56112.8 Summary 564Exercises 565Further Reading 567Part Six File SystemChapter 13 File-System Interface13.1 File Concept 57113.2 Access Methods 58113.3 Directory Structure 58313.4 Protection 59213.5 Memory-Mapped Files 59713.6 Summary 602Exercises 602Further Reading 606Chapter 14 File-System Implementation14.1 File-System Structure 60814.2 File-System Operations 61014.3 Directory Implementation 61214.4 Allocation Methods 61414.5 Free-Space Management 62214.6 Efficiency and Performance 62614.7 Recovery 63014.8 Example: The WAFL File System 63314.9 Summary 637Exercises 638Further Reading 640Chapter 15 File-System Internals15.1 File Systems 64315.2 File-System Mounting 64415.3 Partitions and Mounting 64715.4 File Sharing 64815.5 Virtual File Systems 64915.6 Remote File Systems 65115.7 Consistency Semantics 65415.8 NFS 65615.9 Summary 661Exercises 662Further Reading 664Part Seven Security and ProtectionChapter 16 Security16.1 The Security Problem 66916.2 Program Threats 67316.3 System and Network Threats 68216.4 Cryptography as a Security Tool 68516.5 User Authentication 69616.6 Implementing Security Defenses 70116.7 An Example: Windows 10 71016.8 Summary 712Exercises 713Further Reading 714Chapter 17 Protection17.1 Goals of Protection 71717.2 Principles of Protection 71817.3 Protection Rings 71917.4 Domain of Protection 72117.5 Access Matrix 72517.6 Implementation of the Access Matrix 72917.7 Revocation of Access Rights 73217.8 Role-Based Access Control 73317.9 Mandatory Access Control (MAC) 73417.10 Capability-Based Systems 73517.11 Other Protection Improvement Methods 73717.12 Language-Based Protection 74017.13 Summary 746Exercises 747Further Reading 749Part Eight Advanced TopicsChapter 18 Virtual Machines18.1 Overview 75318.2 History 75518.3 Benefits and Features 75618.4 Building Blocks 75918.5 Types of VMs and Their Implementations 76518.6 Virtualization and Operating-System Components 77118.7 Examples 77818.8 Virtualization Research 78018.9 Summary 781Exercises 782Further Reading 783Chapter 19 Networks and Distributed Systems19.1 Advantages of Distributed Systems 78519.2 Network Structure 78719.3 Communication Structure 79019.4 Network and Distributed Operating Systems 80119.5 Design Issues in Distributed Systems 80519.6 Distributed File Systems 80919.7 DFS Naming and Transparency 81319.8 Remote File Access 81619.9 Final Thoughts on Distributed File Systems 81919.10 Summary 820Exercises 821Further Reading 825Credits 827Index 829