Operating System
Introduction to the RelationalModel
- WHAT IS AN OPERATING SYSTEM?
- HISTORY OF OPERATING SYSTEMS
- COMPUTER HARDWARE REVIEW
- THE OPERATING SYSTEM ZOO
- OPERATING SYSTEM CONCEPTS
- SYSTEM CALLS
- OPERATING SYSTEM STRUCTURE
- THE WORLD ACCORDING TO C
- RESEARCH ON OPERATING SYSTEMS
- OUTLINE OF THE REST OF THIS BOOK
- METRIC UNITS
- SUMMARY
PROCESSES AND THREADS
- PROCESSES
- THREADS
- INTERPROCESS COMMUNICATION
- SCHEDULING
- CLASSICAL IPC PROBLEMS
- RESEARCH ON PROCESSES AND THREADS
- SUMMARY
MEMORY MANAGEMENT
See Topics ...
- NO MEMORY ABSTRACTION
- A MEMORY ABSTRACTION: ADDRESS SPACES
- VIRTUAL MEMORY
- PAGE REPLACEMENT ALGORITHMS
- DESIGN ISSUES FOR PAGING SYSTEMS
- IMPLEMENTATION ISSUES
- SEGMENTATION
- RESEARCH ON MEMORY MANAGEMENT
- SUMMARY
FILE SYSTEMS
See Topics ...
- FILES
- DIRECTORIES
- FILE-SYSTEM IMPLEMENTATION
- FILE-SYSTEM MANAGEMENT AND OPTIMIZATION
- EXAMPLE FILE SYSTEMS
- RESEARCH ON FILE SYSTEMS
- SUMMARY
INPUT/OUTPUT
See Topics ...
- PRINCIPLES OF I/O HARDWARE
- PRINCIPLES OF I/O SOFTWARE
- I/O SOFTWARE LAYERS
- DISKS
- CLOCKS
- USER INTERFACES: KEYBOARD, MOUSE, MONITOR
- THIN CLIENTS
- POWER MANAGEMENT
- RESEARCH ON INPUT/OUTPUT
- SUMMARY
DEADLOCKS
See Topics ...
- RESOURCES
- INTRODUCTION TO DEADLOCKS
- THE OSTRICH ALGORITHM
- DEADLOCK DETECTION AND RECOVERY
- DEADLOCK AVOIDANCE
- DEADLOCK PREVENTION
- OTHER ISSUES
- RESEARCH ON DEADLOCKS
- SUMMARY
VIRTUALIZATION AND THE CLOUD
See Topics ...
- HISTORY
- REQUIREMENTS FOR VIRTUALIZATION
- TYPE 1 AND TYPE 2 HYPERVISORS
- TECHNIQUES FOR EFFICIENT VIRTUALIZATION
- ARE HYPERVISORS MICROKERNELS DONE RIGHT?
- MEMORY VIRTUALIZATION
- I/O VIRTUALIZATION
- VIRTUAL APPLIANCES
- VIRTUAL MACHINES ON MULTICORE CPUS
- LICENSING ISSUES
- CLOUDS
- CASE STUDY: VMWARE
- RESEARCH ON VIRTUALIZATION AND THE CLOUD
MULTIPLE PROCESSOR SYSTEMS
See Topics ...
- MULTIPROCESSORS
- MULTICOMPUTERS
- DISTRIBUTED SYSTEMS
- RESEARCH ON MULTIPLE PROCESSOR SYSTEMS
- SUMMARY
SECURITY
>
See Topics ...
- THE SECURITY ENVIRONMENT
- OPERATING SYSTEMS SECURITY
- CONTROLLING ACCESS TO RESOURCES
- FORMAL MODELS OF SECURE SYSTEMS
- BASICS OF CRYPTOGRAPHY
- AUTHENTICATION
- EXPLOITING SOFTWARE
- INSIDER ATTACKS
- MALWARE
- DEFENSES
- RESEARCH ON SECURITY
- SUMMARY
OPERATING SYSTEM DESIGN
>
See Topics ...
- THE NATURE OF THE DESIGN PROBLEM
- INTERFACE DESIGN
- IMPLEMENTATION
- PERFORMANCE
- PROJECT MANAGEMENT
- TRENDS IN OPERATING SYSTEM DESIGN
- SUMMARY
READING LIST AND BIBLIOGRAPHY
>
See Topics ...
- SUGGESTIONS FOR FURTHER READING
- ALPHABETICAL BIBLIOGRAPHY