MARC details
| 000 -LEADER |
| fixed length control field |
11219cam a22004214i 4500 |
| 001 - CONTROL NUMBER |
| control field |
13765249 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210112110111.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
041028s2005 njua b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0471694665 (hc. : alk. paper) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780471694663 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Description conventions |
rda |
| Transcribing agency |
DLC |
| Modifying agency |
DLC |
| -- |
EG-NcFUE |
| Language of cataloging |
eng |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.43 |
| Edition number |
22 |
| Item number |
S.A.O |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Silberschatz, Abraham. |
| 9 (RLIN) |
13549 |
| 245 10 - TITLE STATEMENT |
| Title |
Operating system concepts / |
| Statement of responsibility, etc |
Abraham Silberschatz, Peter Baer Galvin, Greg Gagne. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Seventh edition. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Hoboken, NJ : |
| Name of publisher, distributor, etc |
J. Wiley and Sons, |
| Date of publication, distribution, etc |
[2005] |
| 264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Date of publication, distribution, etc |
c2005 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxii, 921 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
27 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references (pages 855-884) and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1 Introduction<br/><br/>1.1 What Operating Systems Do 3<br/><br/>1.2 Computer-System Organization 6<br/><br/>1.3 Computer-System Architecture 12<br/><br/>1.4 Operating-System Structure 18<br/><br/>1.5 Operating-System Operations 20<br/><br/>1.6 Process Management 23<br/><br/>1.7 Memory Management 24<br/><br/>1.8 Storage Management 25<br/><br/>1.9 Protection and Security 29<br/><br/>1.10 Distributed Systems 30<br/><br/>1.11 Special-Purpose Systems 32<br/><br/>1.12 Computing Environments 34<br/><br/>1.13 Open-Source Operating Systems 37<br/><br/>1.14 Summary 40<br/><br/>Exercises 42<br/><br/>Bibliographical Notes 46<br/><br/>Chapter 2 Operating-System Structures<br/><br/>2.1 Operating-System Services 49<br/><br/>2.2 User Operating-System Interface 52<br/><br/>2.3 System Calls 55<br/><br/>2.4 Types of System Calls 58<br/><br/>2.5 System Programs 66<br/><br/>2.6 Operating-System Design and<br/><br/>Implementation 68<br/><br/>2.7 Operating-System Structure 70<br/><br/>2.8 Virtual Machines 76<br/><br/>2.9 Operating-System Debugging 84<br/><br/>2.10 Operating-System Generation 88<br/><br/>2.11 System Boot 89<br/><br/>2.12 Summary 90<br/><br/>Exercises 91<br/><br/>Bibliographical Notes 98<br/><br/>PART TWO PROCESS MANAGEMENT<br/><br/>Chapter 3 Processes<br/><br/>3.1 Process Concept 101<br/><br/>3.2 Process Scheduling 105<br/><br/>3.3 Operations on Processes 110<br/><br/>3.4 Interprocess Communication 116<br/><br/>3.5 Examples of IPC Systems 123<br/><br/>3.6 Communication in Client–<br/><br/>Server Systems 128<br/><br/>3.7 Summary 140<br/><br/>Exercises 141<br/><br/>Bibliographical Notes 152<br/><br/>xvii<br/><br/>xviii Contents<br/><br/>Chapter 4 Threads<br/><br/>4.1 Overview 153<br/><br/>4.2 Multithreading Models 157<br/><br/>4.3 Thread Libraries 159<br/><br/>4.4 Threading Issues 165<br/><br/>4.5 Operating-System Examples 171<br/><br/>4.6 Summary 174<br/><br/>Exercises 174<br/><br/>Bibliographical Notes 182<br/><br/>Chapter 5 CPU Scheduling<br/><br/>5.1 Basic Concepts 183<br/><br/>5.2 Scheduling Criteria 187<br/><br/>5.3 Scheduling Algorithms 188<br/><br/>5.4 Thread Scheduling 199<br/><br/>5.5 Multiple-Processor Scheduling 200<br/><br/>5.6 Operating System Examples 206<br/><br/>5.7 Algorithm Evaluation 213<br/><br/>5.8 Summary 217<br/><br/>Exercises 218<br/><br/>Bibliographical Notes 223<br/><br/>Chapter 6 Process Synchronization<br/><br/>6.1 Background 225<br/><br/>6.2 The Critical-Section Problem 227<br/><br/>6.3 Peterson’s Solution 229<br/><br/>6.4 Synchronization Hardware 231<br/><br/>6.5 Semaphores 234<br/><br/>6.6 Classic Problems of<br/><br/>Synchronization 239<br/><br/>6.7 Monitors 244<br/><br/>6.8 Synchronization Examples 252<br/><br/>6.9 Atomic Transactions 257<br/><br/>6.10 Summary 267<br/><br/>Exercises 267<br/><br/>Bibliographical Notes 280 |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 7 Deadlocks<br/><br/>7.1 System Model 283<br/><br/>7.2 Deadlock Characterization 285<br/><br/>7.3 Methods for Handling Deadlocks 290<br/><br/>7.4 Deadlock Prevention 291<br/><br/>7.5 Deadlock Avoidance 294<br/><br/>7.6 Deadlock Detection 301<br/><br/>7.7 Recovery from Deadlock 304<br/><br/>7.8 Summary 306<br/><br/>Exercises 307<br/><br/>Bibliographical Notes 311<br/><br/>PART THREE MEMORY MANAGEMENT<br/><br/>Chapter 8 Main Memory<br/><br/>8.1 Background 315<br/><br/>8.2 Swapping 322<br/><br/>8.3 Contiguous Memory Allocation 324<br/><br/>8.4 Paging 328<br/><br/>8.5 Structure of the Page Table 337<br/><br/>8.6 Segmentation 342<br/><br/>8.7 Example: The Intel Pentium 345<br/><br/>8.8 Summary 349<br/><br/>Exercises 350<br/><br/>Bibliographical Notes 354<br/><br/>Contents xix<br/><br/>Chapter 9 VirtualMemory<br/><br/>9.1 Background 357<br/><br/>9.2 Demand Paging 361<br/><br/>9.3 Copy-on-Write 367<br/><br/>9.4 Page Replacement 369<br/><br/>9.5 Allocation of Frames 382<br/><br/>9.6 Thrashing 386<br/><br/>9.7 Memory-Mapped Files 390<br/><br/>9.8 Allocating Kernel Memory 396<br/><br/>9.9 Other Considerations 399<br/><br/>9.10 Operating-System Examples 405<br/><br/>9.11 Summary 407<br/><br/>Exercises 409<br/><br/>Bibliographical Notes 417<br/><br/>PART FOUR STORAGE MANAGEMENT<br/><br/>Chapter 10 File-System Interface<br/><br/>10.1 File Concept 421<br/><br/>10.2 Access Methods 430<br/><br/>10.3 Directory and Disk Structure 433<br/><br/>10.4 File-System Mounting 444<br/><br/>10.5 File Sharing 446<br/><br/>10.6 Protection 451<br/><br/>10.7 Summary 456<br/><br/>Exercises 457 |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 11 File-System Implementation<br/><br/>11.1 File-System Structure 461<br/><br/>11.2 File-System Implementation 464<br/><br/>11.3 Directory Implementation 470<br/><br/>11.4 Allocation Methods 471<br/><br/>11.5 Free-Space Management 479<br/><br/>11.6 Efficiency and Performance 482<br/><br/>11.7 Recovery 486<br/><br/>11.8 NFS 490<br/><br/>11.9 Example: The WAFL File System 496<br/><br/>11.10 Summary 498<br/><br/>Exercises 499<br/><br/>Bibliographical Notes 502<br/><br/>Chapter 12 Mass-Storage Structure<br/><br/>12.1 Overview of Mass-Storage<br/><br/>Structure 505<br/><br/>12.2 Disk Structure 508<br/><br/>12.3 Disk Attachment 509<br/><br/>12.4 Disk Scheduling 510<br/><br/>12.5 Disk Management 516<br/><br/>12.6 Swap-Space Management 520<br/><br/>12.7 RAID Structure 522<br/><br/>12.8 Stable-Storage Implementation 533<br/><br/>12.9 Tertiary-Storage Structure 534<br/><br/>12.10 Summary 543<br/><br/>Exercises 545<br/><br/>Bibliographical Notes 552<br/><br/>Chapter 13 I/O Systems<br/><br/>13.1 Overview 555<br/><br/>13.2 I/O Hardware 556<br/><br/>13.3 Application I/O Interface 565<br/><br/>13.4 Kernel I/O Subsystem 571<br/><br/>13.5 Transforming I/O Requests to<br/><br/>Hardware Operations 578<br/><br/>13.6 STREAMS 580<br/><br/>13.7 Performance 582<br/><br/>13.8 Summary 585<br/><br/>Exercises 586<br/><br/>Bibliographical Notes 588<br/><br/>xx Contents<br/><br/>PART FIVE PROTECTION AND SECURITY<br/><br/>Chapter 14 Protection<br/><br/>14.1 Goals of Protection 591<br/><br/>14.2 Principles of Protection 592<br/><br/>14.3 Domain of Protection 593<br/><br/>14.4 Access Matrix 598<br/><br/>14.5 Implementation of Access Matrix 602<br/><br/>14.6 Access Control 605<br/><br/>14.7 Revocation of Access Rights 606<br/><br/>14.8 Capability-Based Systems 607<br/><br/>14.9 Language-Based Protection 610<br/><br/>14.10 Summary 615<br/><br/>Exercises 616<br/><br/>Bibliographical Notes 618<br/><br/>Chapter 15 Security<br/><br/>15.1 The Security Problem 621<br/><br/>15.2 Program Threats 625<br/><br/>15.3 System and Network Threats 633<br/><br/>15.4 Cryptography as a Security Tool 638<br/><br/>15.5 User Authentication 649<br/><br/>15.6 Implementing Security Defenses 654<br/><br/>15.7 Firewalling to Protect Systems and<br/><br/>Networks 661<br/><br/>15.8 Computer-Security<br/><br/>Classifications 662<br/><br/>15.9 An Example: Windows XP 664<br/><br/>15.10 Summary 665<br/><br/>Exercises 666<br/><br/>Bibliographical Notes 668<br/><br/>PART SIX DISTRIBUTED SYSTEMS<br/><br/>Chapter 16 Distributed System Structures<br/><br/>16.1 Motivation 673<br/><br/>16.2 Types of Networkbased<br/><br/>Operating Systems 675<br/><br/>16.3 Network Structure 679<br/><br/>16.4 Network Topology 683<br/><br/>16.5 Communication Structure 684<br/><br/>16.6 Communication Protocols 690<br/><br/>16.7 Robustness 694<br/><br/>16.8 Design Issues 697<br/><br/>16.9 An Example: Networking 699<br/><br/>16.10 Summary 701<br/><br/>Exercises 701<br/><br/>Bibliographical Notes 704 |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 17 Distributed File Systems<br/><br/>17.1 Background 705<br/><br/>17.2 Naming and Transparency 707<br/><br/>17.3 Remote File Access 710<br/><br/>17.4 Stateful Versus Stateless Service 715<br/><br/>17.5 File Replication 716<br/><br/>17.6 An Example: AFS 718<br/><br/>17.7 Summary 723<br/><br/>Exercises 724<br/><br/>Bibliographical Notes 725<br/><br/>Chapter 18 Distributed Coordination<br/><br/>18.1 Event Ordering 727<br/><br/>18.2 Mutual Exclusion 730<br/><br/>18.3 Atomicity 733<br/><br/>18.4 Concurrency Control 736<br/><br/>18.5 Deadlock Handling 740<br/><br/>18.6 Election Algorithms 747<br/><br/>18.7 Reaching Agreement 750<br/><br/>18.8 Summary 752<br/><br/>Exercises 753<br/><br/>Bibliographical Notes 755<br/><br/>Contents xxi<br/><br/>PART SEVEN SPECIAL -PURPOSE SYSTEMS<br/><br/>Chapter 19 Real-Time Systems<br/><br/>19.1 Overview 759<br/><br/>19.2 System Characteristics 760<br/><br/>19.3 Features of Real-Time Kernels 762<br/><br/>19.4 Implementing Real-Time Operating<br/><br/>Systems 764<br/><br/>19.5 Real-Time CPU Scheduling 768<br/><br/>19.6 An Example: VxWorks 5.x 774<br/><br/>19.7 Summary 776<br/><br/>Exercises 777<br/><br/>Bibliographical Notes 778<br/><br/>Chapter 20 Multimedia Systems<br/><br/>20.1 What Is Multimedia? 779<br/><br/>20.2 Compression 782<br/><br/>20.3 Requirements of Multimedia<br/><br/>Kernels 784<br/><br/>20.4 CPU Scheduling 786<br/><br/>20.5 Disk Scheduling 787<br/><br/>20.6 Network Management 789<br/><br/>20.7 An Example: CineBlitz 792<br/><br/>20.8 Summary 795<br/><br/>Exercises 795<br/><br/>Bibliographical Notes 797<br/><br/>PART EIGHT CASE STUDIES<br/><br/>Chapter 21 The Linux System<br/><br/>21.1 Linux History 801<br/><br/>21.2 Design Principles 806<br/><br/>21.3 Kernel Modules 809<br/><br/>21.4 Process Management 812<br/><br/>21.5 Scheduling 815<br/><br/>21.6 Memory Management 820<br/><br/>21.7 File Systems 828<br/><br/>21.8 Input and Output 834<br/><br/>21.9 Interprocess Communication 837<br/><br/>21.10 Network Structure 838<br/><br/>21.11 Security 840<br/><br/>21.12 Summary 843<br/><br/>Exercises 844<br/><br/>Bibliographical Notes 845<br/><br/>Chapter 22 Windows XP<br/><br/>22.1 History 847<br/><br/>22.2 Design Principles 849<br/><br/>22.3 System Components 851<br/><br/>22.4 Environmental Subsystems 874<br/><br/>22.5 File System 878<br/><br/>22.6 Networking 886<br/><br/>22.7 Programmer Interface 892<br/><br/>22.8 Summary 900<br/><br/>Exercises 900<br/><br/>Bibliographical Notes 901<br/><br/>Chapter 23 Influential Operating Systems<br/><br/>23.1 Feature Migration 903<br/><br/>23.2 Early Systems 904<br/><br/>23.3 Atlas 911<br/><br/>23.4 XDS-940 912<br/><br/>23.5 THE 913<br/><br/>23.6 RC 4000 913<br/><br/>23.7 CTSS 914<br/><br/>23.8 MULTICS 915<br/><br/>23.9 IBM OS/360 915<br/><br/>23.10 TOPS-20 917<br/><br/>23.11 CP/M and MS/DOS 917<br/><br/>23.12 Macintosh Operating System and<br/><br/>Windows 918<br/><br/>23.13 Mach 919<br/><br/>23.14 Other Systems 920<br/><br/>Exercises 921<br/><br/>xxii Contents<br/><br/>PART NINE APPENDICES<br/><br/>Appendix A BSD UNIX (contents online)<br/><br/>A.1 UNIX History A1<br/><br/>A.2 Design Principles A6<br/><br/>A.3 Programmer Interface A8<br/><br/>A.4 User Interface A15<br/><br/>A.5 Process Management A18<br/><br/>A.6 Memory Management A22<br/><br/>A.7 File System A24<br/><br/>A.8 I/O System A32<br/><br/>A.9 Interprocess Communication A35<br/><br/>A.10 Summary A40<br/><br/>Exercises A41<br/><br/>Bibliographical Notes A42<br/><br/>Appendix B TheMach System (contents online)<br/><br/>B.1 History of the Mach System B1<br/><br/>B.2 Design Principles B3<br/><br/>B.3 System Components B4<br/><br/>B.4 Process Management B7<br/><br/>B.5 Interprocess Communication B13<br/><br/>B.6 Memory Management B18<br/><br/>B.7 Programmer Interface B23<br/><br/>B.8 Summary B24<br/><br/>Exercises B25<br/><br/>Bibliographical Notes B26<br/><br/>Appendix C Windows 2000 (contents online)<br/><br/>C.1 History C1<br/><br/>C.2 Design Principles C2<br/><br/>C.3 System Components C3<br/><br/>C.4 Environmental Subsystems C19<br/><br/>C.5 File System C21<br/><br/>C.6 Networking C28<br/><br/>C.7 Programmer Interface C33<br/><br/>C.8 Summary C40<br/><br/>Exercises C40<br/><br/>Bibliographical Notes C41<br/><br/>Bibliography 923<br/><br/>Credits 955<br/><br/>Index 957 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Operating systems (Computers) |
| 9 (RLIN) |
13550 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Galvin, Peter B. |
| 9 (RLIN) |
13551 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Gagne, Greg. |
| 9 (RLIN) |
13552 |
| 856 41 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Table of contents only |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/toc/wiley051/2004059084.html">http://www.loc.gov/catdir/toc/wiley051/2004059084.html</a> |
| 856 42 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Contributor biographical information |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0618/2004059084-b.html">http://www.loc.gov/catdir/enhancements/fy0618/2004059084-b.html</a> |
| 856 42 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Publisher description |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/enhancements/fy0618/2004059084-d.html">http://www.loc.gov/catdir/enhancements/fy0618/2004059084-d.html</a> |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
orignew |
| d |
1 |
| e |
ocip |
| f |
19 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |