游客您好
第三方账号登陆
  • 点击联系客服

    在线时间:8:00-16:00

    电子邮件

    dzs80vip@163.com
  • 扫描二维码

    关注星点微信公众号

《操作系统原理与设计》(乔德赫里)
[复制链接]
2021-08-22 发布
  • 超级版主
  • 8
  • 7047
  • 0
Tikeni 发表于 2021-8-22 20:15:23 | 显示全部楼层 |阅读模式 打印 上一主题 下一主题
操作系统原理与设计
操作系统原理与设计
  • 作者:乔德赫里
  • 类别:操作系统
    格式:PDF
    本站推荐:升级会员无限下载,节约时间成本
简介《操作系统原理与设计》以简单易懂的语言,全面而系统地介绍了操作系统的概念、原理和设计,包括CPU调度、设备调度、死锁、内存管理、文件系统以及系统的安全性等内容,并给出了丰富的C语言演示程序,所有这些C程序都在Linux操作系统下测试通过。《操作系统原理与设计》以单独章节介绍了设备管理、文件管理和低功耗系统设计,并详细阐述了如何防御对Linux系统的攻击,不仅是一本很好的操作系统教材,也是从事操作系统研究人员的很好参考用书。
  • 电子书下载
  • 电子书介绍
  • 下载说明
  • 电子书下载Ebook Download
  • 电子书简介Ebook Intros
    《操作系统原理与设计》以简单易懂的语言,全面而系统地介绍了操作系统的概念、原理和设计,包括CPU调度、设备调度、死锁、内存管理、文件系统以及系统的安全性等内容,并给出了丰富的C语言演示程序,所有这些C程序都在Linux操作系统下测试通过。《操作系统原理与设计》以单独章节介绍了设备管理、文件管理和低功耗系统设计,并详细阐述了如何防御对Linux系统的攻击,不仅是一本很好的操作系统教材,也是从事操作系统研究人员的很好参考用书。
    电子书目录Ebook Index
    preface xiii
    acknowledgements xv
    1 introduction to the operating system
    1.1 os functions
    1.1.1 os acts as a user/computer interface
    1.1.2 interaction with os
    1.1.3 operating system commands
    1.1.4 operating system as efficient resource manager
    1.1.5 os upgrading
    1.1.6 operating system security and protection
    1.2 evolution of operating system
    1.2.1 serial processing
    1.2.2 batch processing
    1.2.3 multiprogramming or simple concurrent processing
    1.2.4 resource management
    1.2.5 operating system structure
    1.2.6 future operating system trends
    summary
    exercises
    2 os prerequisites
    2.1 important software resources to be managed by os
    2.2 interaction with os in mainframe systems (interrupts ingeneral)
    2.2.1 the program status word
    2.2.2 different fields of psw
    2.2.3 controlling i/o
    2.2.4 the interrupt concept
    2.2.5 interrupt priority
    2.2.6 what other manufacturers (other than ibm) do?
    2.2.7 interrupt cycle
    2.2.8 differences between subroutine call and interruptscheme
    2.3 example from pc environment and related discussion
    2.3.1 different ways to control pc hardware
    2.3.2 accessing the bios and dos
    2.4 current ‘state-of-the-art’ scenario in os design
    2.5 fundamental concepts related to ipc
    2.5.1 message queues
    2.5.2 semaphores
    2.5.3 shared memory
    summary
    exercises
    3 concurrent processing
    3.1 introduction to concurrent processing
    3.2 process concept
    3.3 introduction to process control block
    3.4 interaction of user’s process with the system
    3.4.1 exec sys
    3.5 introduction to concurrent program
    3.6 distinction between a procedure call and a processcreation
    3.7 introduction to process environment
    3.7.1 introduction to process id
    3.7.2 shells or command interpreter
    3.8 process state transitions
    3.9 difference between user, daemon and kernel processes
    3.10 interprocess communication
    3.1.01 file and record locking
    3.10.2 simple pipes and named pipes
    3.10.3 pipes and sockets
    3.11 hierarchy of processes
    3.1.11 process creation
    3.1.12 processes and threads
    summary
    exercises
    4 scheduling
    4.1 cpu scheduling algorithms
    4.1.1 allocation of different resources
    4.1.2 scheduling queues
    4.1.3 different scheduling algorithms
    4.1.4 algorithm evaluation
    summary
    exercises
    5 discussion on concurrency control
    5.1 bernstein’s concurrency conditions
    5.1.1 fork and join construct
    5.1.2 alternative to fork-join
    5.2 process states and precedence graphs
    5.3 dijkstra’s concurrent statement in the form of fork and joinconstructs
    5.4 the critical section problem
    5.4.1 bounded buffer producerconsumer problem
    5.4.2 critical section problem description and their solution
    5.5 hardware solution to the critical section problem
    5.6 new synchronization tool—semaphore
    5.6.1 usage of semaphores
    5.7 classical process coordination problems
    5.7.1 bounded buffer problem
    5.7.2 the reader’s and writer’s problem
    5.7.3 dining philosophers’ problem
    5.7.4 sleeping barber problem
    5.7.5 cigarette smoker’s problem
    5.8 language constructs for synchronization andmodularization
    5.8.1 critical regions
    5.8.2 conditional critical region
    5.8.3 monitor construct
    summary
    exercises
    6 deadlock
    6.1 introduction
    6.2 definition of deadlock
    6.3 deadlock and starvation
    6.4 resource allocation graph
    6.5 ways to solve deadlock problem
    6.5.1 tackling deadlock using deadlock prevention
    6.5.2 deadlock avoidance
    6.5.3 deadlock detection
    6.5.4 difference between deadlock detection algorithm (multipleinstances of each resource type) and safety algorithm
    6.5.5 solution of deadlock under different scenarios
    summary
    exercises
    7 main memory management
    7.1 introduction
    7.2 memory management schemes
    7.3 partitioned allocation
    7.4 logical vs physical address space
    7.4.1 address binding
    7.4.2 address translation
    7.5 simple paging
    7.6 the role of the long-term scheduler
    7.6.1 problem assignment
    7.7 implementation of the page table
    7.8 multiple process using a text editor code
    7.9 simple segmentation
    7.10 details of segmentation
    7.11 combined system
    7.1.11 combination used in ge645 multics system
    7.12 inner details of segmentation and paging for intelsystems
    summary
    exercises
    8 virtual memory technique
    8.1 introduction
    8.2 overlays technique
    8.3 virtual memory
    8.3.1 virtual memory concept
    8.4 demand paging
    8.4.1 performance of demand paging
    8.5 page replacement algorithm
    8.5.1 fifo (simplest page replacement algorithm is first in firstout)
    8.5.2 optimal replacement
    8.5.3 least recently used (lru) algorithm
    8.5.4 second chance replacement (with the help of referencebit)
    8.5.5 ad hoc page replacement algorithms
    8.6 free frame allocation algorithm
    8.6.1 equal allocation
    8.6.2 proportional allocation (according to their needs rather thanequal)
    8.7 thrashing
    8.8 working set
    8.8.1 prepaging
    8.8.2 i/o interlock
    8.8.3 page size anomaly
    8.9 program structure
    summary
    exercises
    9 spooler and disk scheduling
    9.1 introduction to the design of a spooling system
    9.2 relationship between spooling and job scheduling
    9.2.1 a printer spooler
    9.3 device management
    9.4 physical characteristics of disks
    9.4.1 disks
    9.5 fcfs disk scheduling
    9.6 searching an item in the disk with indexed sequential filedirectory
    9.6.1 shortest seek time first (sstf)
    summary
    exercises
    10 file system architecture
    10.1 overview
    10.2 initial notions
    10.2.1 files
    10.2.2 directories
    10.2.3 different types of directories under the unix system
    10.2.4 the directory and file naming conventions
    10.2.5 difference between com and exe program
    10.2.6 abbreviations for path names
    10.2.7 paths are used
    10.3 attributes of unix files (for the beginners)
    10.3.1 the file owner and the group
    10.3.2 access permissions
    10.3.3 creating a file
    10.3.4 removing files
    10.3.5 maintaining files
    10.4 file system and their type
    10.4.1 evolution of file system over the years
    10.5 introduction of ext2 fs
    10.5.1 the view of inodes from the point of view of a blocksgroup
    10.5.2 the allocated blocks
    10.5.3 user and group id
    10.6 virtual file system (vfs)
    10.6.1 the linux virtual file system layer
    10.6.2 registration procedures of vfs
    10.6.3 registering the file systems in kernel
    10.7 program designs
    appendix
    end notes
    summary
    exercises
    11 device driver for operating system
    11.1 introduction
    11.2 initial notions for the design
    11.3 interfacing device drivers with the kernel
    11.3.1 character devices
    11.3.2 block devices
    11.3.3 network device
    11.4 theory to practice
    summary
    exercises
    12 linux kernel and security
    12.1 introduction
    12.2 basics notions
    12.2.1 what are lkms
    12.2.2 what are system calls
    12.2.3 what is kernel symbol table
    12.2.4 how to transform kernel to user space memory
    12.2.5 ways to use user space like functions
    12.2.6 list of daily needed kernel space functions
    12.2.7 what is kernel daemon
    12.2.8 creating your own devices
    12.3 experiments with linux system calls
    12.3.1 how to intercept syscalls
    12.3.2 interesting system calls to intercept
    12.3.3 file system-related hacks
    12.3.4 process-related hacks
    12.3.5 network (socket)-related hacks
    12.3.6 virus writing with lkms
    12.4 directives to the system administrators for securedsystem
    12.4.1 theory and ideas on lkm detector
    12.5 the last word on the ‘lkm story’
    summary
    exercises
    13 role of os towards low power design
    13.1 low power design from various angles
    13.2 power management in embedded linux platform
    13.2.1 dynamic power management
    13.2.2 main generic points in the low power design
    13.2.3 d-bus interface
    13.2.4 hotplug mechanism
    summary
    exercises
    bibliography
    index
  • 电子书下载说明Download Instruments

    下载帮助:

    1. 本站所有电子图书资源下载链接均为百度网盘提取链接和提取码。

    2. 回复所需电子图书资源帖并刷新即可得到百度网盘提取链接和提取码,保存到您网盘下载或直接浏览器下载即可。

    3. 资源下载到您本地后,解压即可得到原始文件,PDF格式用Acrobat DC等PDF阅读器打开,EPUB/MOBI等格式可用calibre打开阅读。

    4. 本站只收集整理市场上难买的绝版电子书籍,方便科研人员查阅!为保护版权,请在使用后自觉删除!

    5. 如果您觉得本站不错 请推荐给您的好友。

    所有资源来源网络,仅用于分享知识,学习和交流,如侵犯您的权益,请联系站长微信dzs80com删除资源。

游客,如果您要查看本电子书下载地址请回复

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?立即注册

x
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Copyright ©2018-2021 All Rights Reserved. 80电子书
*本站提供的所有电子书资源均来自互联网,所有版权皆属原作者所有,如果认为本站侵犯了您的版权,请告知,我们会立即删除。
  • 官方微信