Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Operating system concepts / (Record no. 3395)

MARC details
000 -LEADER
fixed length control field 11219cam a22004214i 4500
001 - CONTROL NUMBER
control field 13765249
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210112110111.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 041028s2005 njua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471694665 (hc. : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780471694663
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Description conventions rda
Transcribing agency DLC
Modifying agency DLC
-- EG-NcFUE
Language of cataloging eng
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.43
Edition number 22
Item number S.A.O
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Silberschatz, Abraham.
9 (RLIN) 13549
245 10 - TITLE STATEMENT
Title Operating system concepts /
Statement of responsibility, etc Abraham Silberschatz, Peter Baer Galvin, Greg Gagne.
250 ## - EDITION STATEMENT
Edition statement Seventh edition.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc J. Wiley and Sons,
Date of publication, distribution, etc [2005]
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc c2005
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 921 pages :
Other physical details illustrations ;
Dimensions 27 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 855-884) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 Introduction<br/><br/>1.1 What Operating Systems Do 3<br/><br/>1.2 Computer-System Organization 6<br/><br/>1.3 Computer-System Architecture 12<br/><br/>1.4 Operating-System Structure 18<br/><br/>1.5 Operating-System Operations 20<br/><br/>1.6 Process Management 23<br/><br/>1.7 Memory Management 24<br/><br/>1.8 Storage Management 25<br/><br/>1.9 Protection and Security 29<br/><br/>1.10 Distributed Systems 30<br/><br/>1.11 Special-Purpose Systems 32<br/><br/>1.12 Computing Environments 34<br/><br/>1.13 Open-Source Operating Systems 37<br/><br/>1.14 Summary 40<br/><br/>Exercises 42<br/><br/>Bibliographical Notes 46<br/><br/>Chapter 2 Operating-System Structures<br/><br/>2.1 Operating-System Services 49<br/><br/>2.2 User Operating-System Interface 52<br/><br/>2.3 System Calls 55<br/><br/>2.4 Types of System Calls 58<br/><br/>2.5 System Programs 66<br/><br/>2.6 Operating-System Design and<br/><br/>Implementation 68<br/><br/>2.7 Operating-System Structure 70<br/><br/>2.8 Virtual Machines 76<br/><br/>2.9 Operating-System Debugging 84<br/><br/>2.10 Operating-System Generation 88<br/><br/>2.11 System Boot 89<br/><br/>2.12 Summary 90<br/><br/>Exercises 91<br/><br/>Bibliographical Notes 98<br/><br/>PART TWO PROCESS MANAGEMENT<br/><br/>Chapter 3 Processes<br/><br/>3.1 Process Concept 101<br/><br/>3.2 Process Scheduling 105<br/><br/>3.3 Operations on Processes 110<br/><br/>3.4 Interprocess Communication 116<br/><br/>3.5 Examples of IPC Systems 123<br/><br/>3.6 Communication in Client–<br/><br/>Server Systems 128<br/><br/>3.7 Summary 140<br/><br/>Exercises 141<br/><br/>Bibliographical Notes 152<br/><br/>xvii<br/><br/>xviii Contents<br/><br/>Chapter 4 Threads<br/><br/>4.1 Overview 153<br/><br/>4.2 Multithreading Models 157<br/><br/>4.3 Thread Libraries 159<br/><br/>4.4 Threading Issues 165<br/><br/>4.5 Operating-System Examples 171<br/><br/>4.6 Summary 174<br/><br/>Exercises 174<br/><br/>Bibliographical Notes 182<br/><br/>Chapter 5 CPU Scheduling<br/><br/>5.1 Basic Concepts 183<br/><br/>5.2 Scheduling Criteria 187<br/><br/>5.3 Scheduling Algorithms 188<br/><br/>5.4 Thread Scheduling 199<br/><br/>5.5 Multiple-Processor Scheduling 200<br/><br/>5.6 Operating System Examples 206<br/><br/>5.7 Algorithm Evaluation 213<br/><br/>5.8 Summary 217<br/><br/>Exercises 218<br/><br/>Bibliographical Notes 223<br/><br/>Chapter 6 Process Synchronization<br/><br/>6.1 Background 225<br/><br/>6.2 The Critical-Section Problem 227<br/><br/>6.3 Peterson’s Solution 229<br/><br/>6.4 Synchronization Hardware 231<br/><br/>6.5 Semaphores 234<br/><br/>6.6 Classic Problems of<br/><br/>Synchronization 239<br/><br/>6.7 Monitors 244<br/><br/>6.8 Synchronization Examples 252<br/><br/>6.9 Atomic Transactions 257<br/><br/>6.10 Summary 267<br/><br/>Exercises 267<br/><br/>Bibliographical Notes 280
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 7 Deadlocks<br/><br/>7.1 System Model 283<br/><br/>7.2 Deadlock Characterization 285<br/><br/>7.3 Methods for Handling Deadlocks 290<br/><br/>7.4 Deadlock Prevention 291<br/><br/>7.5 Deadlock Avoidance 294<br/><br/>7.6 Deadlock Detection 301<br/><br/>7.7 Recovery from Deadlock 304<br/><br/>7.8 Summary 306<br/><br/>Exercises 307<br/><br/>Bibliographical Notes 311<br/><br/>PART THREE MEMORY MANAGEMENT<br/><br/>Chapter 8 Main Memory<br/><br/>8.1 Background 315<br/><br/>8.2 Swapping 322<br/><br/>8.3 Contiguous Memory Allocation 324<br/><br/>8.4 Paging 328<br/><br/>8.5 Structure of the Page Table 337<br/><br/>8.6 Segmentation 342<br/><br/>8.7 Example: The Intel Pentium 345<br/><br/>8.8 Summary 349<br/><br/>Exercises 350<br/><br/>Bibliographical Notes 354<br/><br/>Contents xix<br/><br/>Chapter 9 VirtualMemory<br/><br/>9.1 Background 357<br/><br/>9.2 Demand Paging 361<br/><br/>9.3 Copy-on-Write 367<br/><br/>9.4 Page Replacement 369<br/><br/>9.5 Allocation of Frames 382<br/><br/>9.6 Thrashing 386<br/><br/>9.7 Memory-Mapped Files 390<br/><br/>9.8 Allocating Kernel Memory 396<br/><br/>9.9 Other Considerations 399<br/><br/>9.10 Operating-System Examples 405<br/><br/>9.11 Summary 407<br/><br/>Exercises 409<br/><br/>Bibliographical Notes 417<br/><br/>PART FOUR STORAGE MANAGEMENT<br/><br/>Chapter 10 File-System Interface<br/><br/>10.1 File Concept 421<br/><br/>10.2 Access Methods 430<br/><br/>10.3 Directory and Disk Structure 433<br/><br/>10.4 File-System Mounting 444<br/><br/>10.5 File Sharing 446<br/><br/>10.6 Protection 451<br/><br/>10.7 Summary 456<br/><br/>Exercises 457
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 11 File-System Implementation<br/><br/>11.1 File-System Structure 461<br/><br/>11.2 File-System Implementation 464<br/><br/>11.3 Directory Implementation 470<br/><br/>11.4 Allocation Methods 471<br/><br/>11.5 Free-Space Management 479<br/><br/>11.6 Efficiency and Performance 482<br/><br/>11.7 Recovery 486<br/><br/>11.8 NFS 490<br/><br/>11.9 Example: The WAFL File System 496<br/><br/>11.10 Summary 498<br/><br/>Exercises 499<br/><br/>Bibliographical Notes 502<br/><br/>Chapter 12 Mass-Storage Structure<br/><br/>12.1 Overview of Mass-Storage<br/><br/>Structure 505<br/><br/>12.2 Disk Structure 508<br/><br/>12.3 Disk Attachment 509<br/><br/>12.4 Disk Scheduling 510<br/><br/>12.5 Disk Management 516<br/><br/>12.6 Swap-Space Management 520<br/><br/>12.7 RAID Structure 522<br/><br/>12.8 Stable-Storage Implementation 533<br/><br/>12.9 Tertiary-Storage Structure 534<br/><br/>12.10 Summary 543<br/><br/>Exercises 545<br/><br/>Bibliographical Notes 552<br/><br/>Chapter 13 I/O Systems<br/><br/>13.1 Overview 555<br/><br/>13.2 I/O Hardware 556<br/><br/>13.3 Application I/O Interface 565<br/><br/>13.4 Kernel I/O Subsystem 571<br/><br/>13.5 Transforming I/O Requests to<br/><br/>Hardware Operations 578<br/><br/>13.6 STREAMS 580<br/><br/>13.7 Performance 582<br/><br/>13.8 Summary 585<br/><br/>Exercises 586<br/><br/>Bibliographical Notes 588<br/><br/>xx Contents<br/><br/>PART FIVE PROTECTION AND SECURITY<br/><br/>Chapter 14 Protection<br/><br/>14.1 Goals of Protection 591<br/><br/>14.2 Principles of Protection 592<br/><br/>14.3 Domain of Protection 593<br/><br/>14.4 Access Matrix 598<br/><br/>14.5 Implementation of Access Matrix 602<br/><br/>14.6 Access Control 605<br/><br/>14.7 Revocation of Access Rights 606<br/><br/>14.8 Capability-Based Systems 607<br/><br/>14.9 Language-Based Protection 610<br/><br/>14.10 Summary 615<br/><br/>Exercises 616<br/><br/>Bibliographical Notes 618<br/><br/>Chapter 15 Security<br/><br/>15.1 The Security Problem 621<br/><br/>15.2 Program Threats 625<br/><br/>15.3 System and Network Threats 633<br/><br/>15.4 Cryptography as a Security Tool 638<br/><br/>15.5 User Authentication 649<br/><br/>15.6 Implementing Security Defenses 654<br/><br/>15.7 Firewalling to Protect Systems and<br/><br/>Networks 661<br/><br/>15.8 Computer-Security<br/><br/>Classifications 662<br/><br/>15.9 An Example: Windows XP 664<br/><br/>15.10 Summary 665<br/><br/>Exercises 666<br/><br/>Bibliographical Notes 668<br/><br/>PART SIX DISTRIBUTED SYSTEMS<br/><br/>Chapter 16 Distributed System Structures<br/><br/>16.1 Motivation 673<br/><br/>16.2 Types of Networkbased<br/><br/>Operating Systems 675<br/><br/>16.3 Network Structure 679<br/><br/>16.4 Network Topology 683<br/><br/>16.5 Communication Structure 684<br/><br/>16.6 Communication Protocols 690<br/><br/>16.7 Robustness 694<br/><br/>16.8 Design Issues 697<br/><br/>16.9 An Example: Networking 699<br/><br/>16.10 Summary 701<br/><br/>Exercises 701<br/><br/>Bibliographical Notes 704
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 17 Distributed File Systems<br/><br/>17.1 Background 705<br/><br/>17.2 Naming and Transparency 707<br/><br/>17.3 Remote File Access 710<br/><br/>17.4 Stateful Versus Stateless Service 715<br/><br/>17.5 File Replication 716<br/><br/>17.6 An Example: AFS 718<br/><br/>17.7 Summary 723<br/><br/>Exercises 724<br/><br/>Bibliographical Notes 725<br/><br/>Chapter 18 Distributed Coordination<br/><br/>18.1 Event Ordering 727<br/><br/>18.2 Mutual Exclusion 730<br/><br/>18.3 Atomicity 733<br/><br/>18.4 Concurrency Control 736<br/><br/>18.5 Deadlock Handling 740<br/><br/>18.6 Election Algorithms 747<br/><br/>18.7 Reaching Agreement 750<br/><br/>18.8 Summary 752<br/><br/>Exercises 753<br/><br/>Bibliographical Notes 755<br/><br/>Contents xxi<br/><br/>PART SEVEN SPECIAL -PURPOSE SYSTEMS<br/><br/>Chapter 19 Real-Time Systems<br/><br/>19.1 Overview 759<br/><br/>19.2 System Characteristics 760<br/><br/>19.3 Features of Real-Time Kernels 762<br/><br/>19.4 Implementing Real-Time Operating<br/><br/>Systems 764<br/><br/>19.5 Real-Time CPU Scheduling 768<br/><br/>19.6 An Example: VxWorks 5.x 774<br/><br/>19.7 Summary 776<br/><br/>Exercises 777<br/><br/>Bibliographical Notes 778<br/><br/>Chapter 20 Multimedia Systems<br/><br/>20.1 What Is Multimedia? 779<br/><br/>20.2 Compression 782<br/><br/>20.3 Requirements of Multimedia<br/><br/>Kernels 784<br/><br/>20.4 CPU Scheduling 786<br/><br/>20.5 Disk Scheduling 787<br/><br/>20.6 Network Management 789<br/><br/>20.7 An Example: CineBlitz 792<br/><br/>20.8 Summary 795<br/><br/>Exercises 795<br/><br/>Bibliographical Notes 797<br/><br/>PART EIGHT CASE STUDIES<br/><br/>Chapter 21 The Linux System<br/><br/>21.1 Linux History 801<br/><br/>21.2 Design Principles 806<br/><br/>21.3 Kernel Modules 809<br/><br/>21.4 Process Management 812<br/><br/>21.5 Scheduling 815<br/><br/>21.6 Memory Management 820<br/><br/>21.7 File Systems 828<br/><br/>21.8 Input and Output 834<br/><br/>21.9 Interprocess Communication 837<br/><br/>21.10 Network Structure 838<br/><br/>21.11 Security 840<br/><br/>21.12 Summary 843<br/><br/>Exercises 844<br/><br/>Bibliographical Notes 845<br/><br/>Chapter 22 Windows XP<br/><br/>22.1 History 847<br/><br/>22.2 Design Principles 849<br/><br/>22.3 System Components 851<br/><br/>22.4 Environmental Subsystems 874<br/><br/>22.5 File System 878<br/><br/>22.6 Networking 886<br/><br/>22.7 Programmer Interface 892<br/><br/>22.8 Summary 900<br/><br/>Exercises 900<br/><br/>Bibliographical Notes 901<br/><br/>Chapter 23 Influential Operating Systems<br/><br/>23.1 Feature Migration 903<br/><br/>23.2 Early Systems 904<br/><br/>23.3 Atlas 911<br/><br/>23.4 XDS-940 912<br/><br/>23.5 THE 913<br/><br/>23.6 RC 4000 913<br/><br/>23.7 CTSS 914<br/><br/>23.8 MULTICS 915<br/><br/>23.9 IBM OS/360 915<br/><br/>23.10 TOPS-20 917<br/><br/>23.11 CP/M and MS/DOS 917<br/><br/>23.12 Macintosh Operating System and<br/><br/>Windows 918<br/><br/>23.13 Mach 919<br/><br/>23.14 Other Systems 920<br/><br/>Exercises 921<br/><br/>xxii Contents<br/><br/>PART NINE APPENDICES<br/><br/>Appendix A BSD UNIX (contents online)<br/><br/>A.1 UNIX History A1<br/><br/>A.2 Design Principles A6<br/><br/>A.3 Programmer Interface A8<br/><br/>A.4 User Interface A15<br/><br/>A.5 Process Management A18<br/><br/>A.6 Memory Management A22<br/><br/>A.7 File System A24<br/><br/>A.8 I/O System A32<br/><br/>A.9 Interprocess Communication A35<br/><br/>A.10 Summary A40<br/><br/>Exercises A41<br/><br/>Bibliographical Notes A42<br/><br/>Appendix B TheMach System (contents online)<br/><br/>B.1 History of the Mach System B1<br/><br/>B.2 Design Principles B3<br/><br/>B.3 System Components B4<br/><br/>B.4 Process Management B7<br/><br/>B.5 Interprocess Communication B13<br/><br/>B.6 Memory Management B18<br/><br/>B.7 Programmer Interface B23<br/><br/>B.8 Summary B24<br/><br/>Exercises B25<br/><br/>Bibliographical Notes B26<br/><br/>Appendix C Windows 2000 (contents online)<br/><br/>C.1 History C1<br/><br/>C.2 Design Principles C2<br/><br/>C.3 System Components C3<br/><br/>C.4 Environmental Subsystems C19<br/><br/>C.5 File System C21<br/><br/>C.6 Networking C28<br/><br/>C.7 Programmer Interface C33<br/><br/>C.8 Summary C40<br/><br/>Exercises C40<br/><br/>Bibliographical Notes C41<br/><br/>Bibliography 923<br/><br/>Credits 955<br/><br/>Index 957
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating systems (Computers)
9 (RLIN) 13550
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Galvin, Peter B.
9 (RLIN) 13551
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gagne, Greg.
9 (RLIN) 13552
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents only
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/toc/wiley051/2004059084.html">http://www.loc.gov/catdir/toc/wiley051/2004059084.html</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Contributor biographical information
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy0618/2004059084-b.html">http://www.loc.gov/catdir/enhancements/fy0618/2004059084-b.html</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Publisher description
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy0618/2004059084-d.html">http://www.loc.gov/catdir/enhancements/fy0618/2004059084-d.html</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ocip
f 19
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A1 01/01/2009 Academic bookshop DO   005.43 S.A.O 00007215 18/02/2025 25/11/2010 Books