UEU-co logo

Category: Operating Systems Design and Implementation

J

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Java virtual machine Job Job control 2nd Jobs, StevenJVM [See Java Virtual Machine]

K

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] K&R C [See Kernighan &, Ritchie C] Kernel 2nd Kernel call 2nd 3rd 4th Kernel mode 2nd Kernighan & Ritchie C 2nd 3rd 4th Key logger Keyboard driver, […]

L

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] LAN [See Local Area Network] Layered operating systemLBA [See Logical Block Addressing] LBA48 disk addressingLDT [See Local Descriptor Table] Least recently used algorithmLFS [See Log-Structured File System] Lightweight […]

M

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Mac OS X Machine language Magic number 2nd 3rd 4th Mailbox Mainframe Major device number Makefile Malware     key logger     logic bomb     spyware     Trojan horse     virus     worm Master boot […]

N

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] NEC PD 765 chip Network operating system Network server New technology file system 2nd     directory Next-fit algorithmNFU [See Not Frequently Used algorithm] Noncanonical mode 2nd Nonpreemptable resource Nonpreemptive […]

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

E

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] ECC [See Error-Correcting Code] Echoing Eckert, J. PresperEIDE [See Extended IDE disk] Elevator algorithm Engelbart, Douglas Error handling 2nd Error reporting Error-correcting code 2nd Escape character Escape sequence […]

F

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Fair-share schedulingFAT [See File Allocation Table] Feature test macro 2ndFIFO [See First-In First-Out algorithm] File 2nd     block special 2nd 3rd 4th 5th 6th 7th     character special 2nd 3rd […]

G

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] GDT [See Global Descriptor Table] GE-645 Generic rightGID [See Group IDentification] Glass tty Global allocation Global descriptor table Global page allocation algorithms Graphical user interface Group Group identification […]

H

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Handler, interrupt 2nd 3rd 4th 5th 6th 7th Handler, signal 2nd 3rd 4th 5th 6th 7th 8th 9th Hard disk driver, MINIX 3 Hard link 2nd Hard real […]

I

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] I space 2nd 3rd 4th I-node 2ndI/O [See Input/Output] I/O adapter I/O bound process 2nd 3rd 4th I/O channel I/O device I/O device controller I/O in MINIX 3     […]

Copyright [Page iv] Library of Congress Cataloging in Publication Data Tanenbaum, Andrew S. Operating Systems: Design and Implementation / Andrew S. Tanenbaum, Albert S. Woodhull. — 3rd ed. ISBN: 0-13-142938-8 1. Operating systems (Computers) I. Woodhull, Albert S. II. Title QA76.76.O63T36 2006005.4’3–dc22 Vice President and Editorial Director, ECS: Marcia J. Horton Executive Editor: Tracy Dunkelberger Editorial Assistant: Christianna Lee Executive Managing Editor: Vince O’Brien Managing Editor: Camille Trentacoste Director of Creative Services: Paul Belfanti Art Director and Cover Manager: Heather Scott Cover Design and Illutsration: […]

D

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] D space 2nd 3rd 4th Daemon 2nd 3rd Data confidentiality Data integrity Data loss, accidental Data segmentDDOS attack [See Distributed Denial Of Service attack] Deadlock 2nd     banker’s algorithm […]

[Page 607 (continued)] Problems 1. NTFS uses Unicode for naming files. Unicode supports 16-bit characters. Give an advantage of Unicode file naming over ASCII file naming. 2. Some files begin with a magic number. Of what use is this? 3. Fig. 5-4 lists some file attributes. Not listed in this table is parity. Would that […]

[Page 611] 6. Reading List and Bibliography In the previous five chapters we have touched upon a variety of topics. This chapter is intended as an aid to readers interested in pursuing their study of operating systems further. Section 6.1 is a list of suggested readings. Section 6.2 is an alphabetical bibliography of all books […]

No related posts found…

Categories

apply_now Pepperstone Group Limited