图书介绍

操作系统概念 英文本2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

操作系统概念 英文本
  • (美)Abraham Silberschatz等著 著
  • 出版社: 北京:高等教育出版社
  • ISBN:7040110482
  • 出版时间:2002
  • 标注页数:887页
  • 文件大小:95MB
  • 文件页数:910页
  • 主题词:操作系统理论

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

操作系统概念 英文本PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART ONE OVERVIEW3

Chapter 1 Introduction3

1.1 What Is an Operating System?3

1.2 Mainframe Systems7

1.3 Desktop Systems11

1.4 Multiprocessor Systems12

1.5 Distributed Systems14

1.6 Clustered Systems16

1.7 Real-Time Systems17

1.8 Handheld Systems19

1.9 Feature Migration20

1.10 Computing Environments21

1.11 Summary23

Exercises24

Bibliographical Notes25

Chapter 2 Computer-System Structures27

2.1 Computer-System Operation27

2.2 I/O Structure30

2.3 Storage Structure34

2.4 Storage Hierarchy38

2.5 Hardware Protection42

2.6 Network Structure48

2.7 Summary51

Exercises52

Bibliographical Notes54

Chapter 3 Operating-System Structures55

3.1 System Components55

3.2 Operating-System Services61

3.3 System Calls63

3.4 System Programs72

3.5 System Structure74

3.6 Virtual Machines80

3.7 System Design and Implementation85

3.8 System Generation88

3.9 Summary89

Exercises90

Bibliographical Notes92

PART TWO PROCESS MANAGEMENT95

Chapter 4 Processes95

4.1 Process Concept95

4.2 Process Scheduling99

4.3 Operations on Processes103

4.4 Cooperating Processes107

4.5 Interprocess Communication109

4.6 Communication in Client-Server Systems117

4.7 Summary126

Exercises127

Bibliographical Notes128

Chapter 5 Threads129

5.1 Overview129

5.2 Multithreading Models132

5.3 Threading Issues135

5.4 Pthreads139

5.5 Solaris 2 Threads141

5.6 Window 2000 Threads143

5.7 Linux Threads144

5.8 Java Threads145

5.9 Summary147

Exercises147

Bibliographical Notes148

Chapter 6 CPU Scheduling151

6.1 Basic Concepts151

6.2 Scheduling Criteria155

6.3 Scheduling Algorithms157

6.4 Multiple-Processor Scheduling169

6.5 Real-Time Scheduling170

6.6 Algorithm Evaluation172

6.7 Process Scheduling Models177

6.8 Summary184

Exercises185

Bibliographical Notes187

Chapter 7 Process Synchronization189

7.1 Background189

7.2 The Critical-Section Problem191

7.3 Synchronization Hardware197

7.4 Semaphores201

7.5 Classic Problems of Synchronization206

7.6 Critical Regions211

7.7 Monitors216

7.8 OS Synchronization223

7.9 Atomic Transactions225

7.10 Summary235

Exercises236

Bibliographical Notes240

Chpater 8 Deadlocks243

8.1 System Model243

8.2 Deadlock Characterization245

8.3 Methods for Handling Deadlocks248

8.4 Deadlock Prevention250

8.5 Deadlock Avoidance253

8.6 Deadlock Detection260

8.7 Recovery from Deadlock264

8.8 Summary266

Exercises266

Bibliographical Notes270

PART THREE STORAGE MANAGEMENT273

Chapter 9 Memory Management273

9.1 Background273

9.2 Swapping280

9.3 Contiguous Memory Allocation283

9.4 Paging287

9.5 Segmentation303

9.6 Segmentation with Paging309

9.7 Summary312

Exercises313

Bibliographical Notes316

Chapter 10 Virtual Memory317

10.1 Background317

10.2 Demand Paging320

10.3 Process Creation328

10.4 Page Replacement330

10.5 Allocation of Frames344

10.6 Thrashing348

10.7 Operating-System Examples353

10.8 Other Considerations356

10.9 Summary363

Exercises364

Bibliographical Notes369

Chapter 11 File-System Interface371

11.1 File Concept371

11.2 Access Methods379

11.3 Directory Structure383

11.4 File-System Mounting393

11.5 File Sharing395

11.6 Protection402

11.7 Summary406

Exercises407

Bibliographical Notes409

Chapter 12 File-System Implementation411

12.1 File-System Structure411

12.2 File-System Implementation413

12.3 Directory Implementation420

12.4 Allocation Methods421

12.5 Free-Space Management430

12.6 Efficiency and Performance433

12.7 Recovery437

12.8 Log-Structured File System439

12.9 NFS441

12.10 Summary448

Exercises449

Bibliographical Notes451

PART FOUR I/O SYSTEMS455

Chapter 13 I/O Systems455

13.1 Overview455

13.2 I/O Hardware456

13.3 Application I/O Interface466

13.4 Kernel I/O Subsystem472

13.5 Transforming I/O to Hardware Operations478

13.6 STREAMS481

13.7 Performance483

13.8 Summary487

Exercises487

Bibliographical Notes488

Chapter 14 Mass-Storage Structure491

14.1 Disk Structure491

14.2 Disk Scheduling492

14.3 Disk Management498

14.4 Swap-Space Management502

14.5 RAID Structure505

14.6 Disk Attachment512

14.7 Stable-Storage Implementation514

14.8 Tertiary-Storage Structure516

14.9 Summary526

Exercises528

Bibliographical Notes535

PART FIVE DISTRIBUTED SYSTEMS539

Chapter 15 Distributed System Structures539

15.1 Background539

15.2 Topology546

15.3 Network Types548

15.4 Communication551

15.5 Communication Protocols558

15.6 Robustness562

15.7 Design Issues564

15.8 An Example:Networking566

15.9 Summary568

Exercises569

Bibliographical Notes571

Chapter 16 Distributed File Systems573

16.1 Background573

16.2 Naming and Transparency575

16.3 Remote File Access579

16.4 Stateful Versus Stateless Service583

16.5 File Replication585

16.6 An Example:AFS586

16.7 Summary591

Exercises592

Bibliographical Notes593

Chapter 17 Distributed Coordination595

17.1 Event Ordering595

17.2 Mutual Exclusion598

17.3 Atomicity601

17.4 Concurrency Control605

17.5 Deadlock Handling610

17.6 Election Algorithms618

17.7 Reaching Agreement620

17.8 Summary623

Exercises624

Bibliographical Notes625

PART SIX PROTECTION AND SECURITY629

Chapter 18 Protection629

18.1 Goals of Protection629

18.2 Domain of Protection630

18.3 Access Matrix636

18.4 Implementation of Access Matrix640

18.5 Revocation of Access Rights643

18.6 Capability-Based Systems645

18.7 Language-Based Protection648

18.8 Summary654

Exercises655

Bibliographical Notes656

Chapter 19 Security657

19.1 The Security Problem657

19.2 User Authentication659

19.3 Program Threats663

19.4 System Threats666

19.5 Securing Systems and Facilities671

19.6 Intrusion Detection674

19.7 Cryptography680

19.8 Computer-Security Classification686

19.9 An Example:Windows NT687

19.10 Summary689

Exercises690

Bibliographical Notes691

PART SEVEN CASE STUDIES695

Chapter 20 The Linux System695

20.1 History695

20.2 Design Principles700

20.3 Kernel Modules703

20.4 Process Management707

20.5 Scheduling711

20.6 Memory Management716

20.7 File Systems724

20.8 Input and Output729

20.9 Interprocess Communication732

20.10 Network Structure734

20.11 Security737

20.12 Summary739

Exercises740

Bibliographical Notes741

Chapter 21 Windows 2000743

21.1 History743

21.2 Design Principles744

21.3 System Components746

21.4 Environmental Subsystems763

21.5 File System766

21.6 Networking774

21.7 Programmer Interface780

21.8 Summary787

Exercises787

Bibliographical Notes788

Chapter 22 Historical Perspective789

22.1 Early Systems789

22.2 Atlas796

22.3 XDS-940797

22.4 THE798

22.5 RC 4000799

22.6 CTSS800

22.7 MULTICS800

22.8 OS/360801

22.9 Mach803

22.10 Other Systems804

Bibliography807

Credits837

Index839

热门推荐