分享
 
 
 

操作系统概念:Java实现(第7版·影印版)(国外优秀信息科学与技术系列教学用书)(Operating System Concepts(Seventh Editon))

操作系统概念:Java实现(第7版·影印版)(国外优秀信息科学与技术系列教学用书)(Operating System Concepts(Seventh Editon))  点此进入淘宝搜索页搜索
  特别声明:本站仅为商品信息简介,并不出售商品,您可点击文中链接进入淘宝网搜索页搜索该商品,有任何问题请与具体淘宝商家联系。
  參考價格: 点此进入淘宝搜索页搜索
  分類: 图书,计算机与互联网,家庭与计算机,Windows使用,
  品牌: 西尔伯查茨

基本信息·出版社:高等教育出版社

·页码:966 页

·出版日期:2007年

·ISBN:9787040215090

·条形码:9787040215090

·包装版本:7版

·装帧:平装

·开本:16

·正文语种:英语

·读者对象:使用对象:高校师生

·丛书名:国外优秀信息科学与技术系列教学用书

·外文书名:Operating System Concepts(Seventh Editon)

产品信息有问题吗?请帮我们更新产品信息。

内容简介操作系统是计算机系统的基本组成部分,同样,“操作系统”课程也是计算机科学教育的基本组成部分,随着计算机在众多领域得到广泛应用,操作系统也正在以惊人的速度发展着。 本书是一本操作系统的入门教材,清晰直观地描述了操作系统的基本概念,阐述了重要理论结论,并通过使用图表和例子来代替证明,以说明结论的正确性。

《操作系统概念——Java实现》共有八大部分:第1章与第2章解释操作系统是什么、能做什么以及它们是如何设计与构造的。第3章到第7章描述作为现代操作系统核心的进程以及并发的概念。第8章和第9章主要讨论进程执行过程中的主存管理问题、保护和安全。第14章和第15章讨论为使操作系统中的进程活动,如何对系统中的进程加以保护。第19章和第20章讨论专用系统,包括实时系统与多媒体系统。第21章到第23章和网站上的附录A到附录C通过描述实际操作系统,融合了《操作系统概念——Java实现》的概念。

编辑推荐一流的品质,优惠的价格,

本套教学用书的特点:

权威性——教育部高等教育司推荐、教育部高等学校信息科学与技术引进教材专家组遴选

系统性—一覆盖计算机专业主干课程和非计算机专业计算机基础课程

先进性——著名计算机专家近两年的最新著作,内容体系先进

经济性——价格与国内自编教材相当,是国内引进教材价格最低的

深入当今最为流行的操作系统内部

当今的操作系统如何工作?Abraham Silberschatz、Peter Baer Galvin和Greg Gagne将带你尽快了解计算机操作系统的所有关键概念。采用流行的Java编程语言,此新版本以通俗易懂的方式引导你全面了解操作系统的理论基础,从而使你在进行更高级的计算机工作时能应用到许多系统中。

《操作系统概念——Java实现》第七版重新作了更新,包括当前最新的主题、应用及设计,以帮助你缩小理论与实践之间的差距。全书结合客户机一服务器模式,带你逐步学习编程的主要内容。

无论你是新学Java,或是已经采用了Java,你都将欣赏Java P—mer所包含的富有思想的内容。版式设计使你更方便学习章节、丰富的例子、编程练习等,以帮助你吸收和加强所学的知识。通过这些全面的支持,你将有信心尽快进入操作系统设计的世界。

作者Abraham Silberschatz是美国耶鲁大学计算机科学系教授,曾任新泽西州Murray Hill的贝尔实验室信息科学研究中心副主任。Peter Baer Galvin是技术合作公司的技术主管,曾任美国布朗大学计算机科学系的系统主管。作为顾问和培训教师,他在世界各地讲解和教授网络系统管理、安全和性能等。Greg Gagne是美国盐湖城威斯特敏斯特学院计算机科学系主任。除了讲授操作系统外,他还教授计算机网络、分布式系统和软件工程等。

目录

PART ONE OVERVIEW

Chapter 1 Introduction

1.1 What Operating Systems Do

1.2 Computer-System Organization

1.3 Computer-System Architecture

1.4 Operating-System Structure

1.5 Operating-System Operations

1.6 Process Management

1.7 Memory Management

1.8 Storage Management

1.9 Protection and Security

1.10 Distributed Systems

1.11 Special-Purpose Systems

1.12 Computing Environments

1.13 Summary

Exercises

Bibliographical Notes

Chapter 2 Operating-System Structures

2.1 Operating-System Services

2.2 User Operating-System Interface

2.3 System Calls

2.4 Types of System Calls

2.5 System Programs

2.6 Operating-System Design and ImplementatiOn

2.7 Operating-System Structure

2.8 Virtual Machines

2.9 Java

2.10 Operating-System Generation

2.11 System Boot

2.12 Summary

Exercises

Bibliographical Notes

PART TWO PROCESS MANAGEMENT

Chapter 3 Processes

3.1 Process Concept

3.2 Process Scheduling

3.3 Operations on Processes

3.4 Interprocess Communication

3.5 Examples of IPC Systems

3.6 Communication in Client-Server Systems

3.7 Summary

Exercises

Bibliographical Notes

Chapter 4 Threads

4.1 Overview

4.2 Multithreading Models

4.3 Thread Libraries

4.4 Java Threads

4.5 Threading Issues

4.6 Operating-System Examples

4.7 Summary

Exercises

Bibliographical Notes

Chapter 5 CPU Scheduling

5.1 Basic Concepts

5.2 Scheduling Criteria

5.3 Scheduling Algorithms

5.4 Multiple-Processor Scheduling

5.5 Thread Scheduling

5.6 Operating System Examples

5.7 Java Scheduling

5.8 Algorithm Evaluation

5.9 Summary

Exercises

Bibliographical Notes

Chapter 6 Process Synchronization

6.1 Background

6.2 The Critical-Section problem

6.3 Peterson's Solution

6.4 Synchronization Hardware

6.5 Semaphores

6.6 Classic Problems of Synchronization

6.7 Monitors

6.8 Java Synchronization

6.9 Synchronization Examples

6.10 Atomic Transactions

6.11 Summary

Exercises

Bibliographical Notes

Chapter 7 Deadlocks

7.1 System Model

7.2 Deadlock Characterization

7.3 Methods for Handling Deadlocks

7.4 Deadlock Prevention

7.5 Deadlock Avoidance

7.6 Deadlock Detection

7.7 Recovery from Deadlock

7.8 Summary

Exercises

Bibliographical Notes

PART THREE MEMORY MANAGEMENT

Chapter 8 Main Memory

8.1 Background

8.2 Swapping

8.3 Contiguous Memory Allocation

8.4 Paging

8.5 Structure of the Page Table

8.6 Segmentation

8.7 Example:The Intel Pentium

8.8 Summary

Exercises

Bibliographical Notes

Chapter 9 Virtual Memory

9.1 Background

9.2 Demand Paging

9.3 Copy-on-Write

9.4 Page Replacement

9.5 Allocation of Frames

9.6 Thrashing

9.7 Memory-Mapped Files

9.8 Allocating Kernel Memory

9.9 Other Considerations

9.10 Operating-System Examples

9.11 Summary

Exercises

Bibliographical Notes

PART FOUR STORAGE MANAGEMENT

Chapter 10 File'System Interface

10.1 The Concept of a File

10.2 Access Methods

10.3 Directory Structure

10.4 File-System Mounting

10.5 File Sharing

10.6 Protection

10.7 Summary

Exercises

Bibliographical Notes

Chapter 11 File-System Implementation

11.1 File-System Structure

11.2 File-System Implementation

11.3 Directory Implementation

11.4 Allocation Methods

11.5 Free-Space Management

11.6 Efficiency and Performance

11.7 Recovery

11.8 Log-Structured File Systems

11.9 NFS

11.10 Example:The WAFL File System

11.11 Summary

Exercises

Bibliographical Notes

Chapter 12 Mass-Storage Structure

12.1 Overview of Mass-Storage Structure

12.2 Disk Structure

12.3 Disk Attachment

12.4 Disk Scheduling

12.5 Disk Management

12.6 Swap-Space Management

12.7 RAID Structure

12.8 Stable-Storage Implementation

12.9 Tertiary-Storage Structure

12.10 Summary

Exercises

Bibliographical Notes

Chapter 13 I/O Systems

13.1 Overview

13.2 I/O Hardware

13.3 Application I/O Interface

13.4 Kernel I/O Subsystem

13.5 Transforming I/O Requests to Hardware Operations

13.6 STREAMS

13.7 Performance

13.8 Summary

Exercises

Bibliographical Notes

PART FIVE PROTECTION AND SECURITY

Chapter 14 Protection

14.1 Goals of Protection

14.2 Principles of Protection

14.3 Domain of Protection

14.4 Access Matrix

14.5 Implementation of Access Matrix

14.6 Access Control

14.7 Revocation of Access Rights

14.8 Capability-Based Systems

14.9 Language-Based Protection

14.10 Summary

Exercises

Bibliographical Notes

Chapter 15 Security

15.1 The Security Problem

15.2 Program Threats

15.3 System and Network Threats

15.4 Cryptography as a Security Tool

15.5 User Authentication

15.6 Implementing Security Defenses

15.7 Firewalling to Protect Systems and Networks

15.8 Computer-Security Classifications

15.9 An Example:W'mdows XP

15.10 Summary

Exercises

Bibliographical Notes

PART SIX DISTRIBUTED SYSTEMS

Chapter 16 Distributed System Structures

16.1 Motivation

16.2 Types of Network- based Operating Systems

16.3 Network Structure

16.4 Network Topology

16.5 Communication Structure

16.6 Communication Protocols

16.7 Robustness

16.8 Design Issues

16.9 An Example:Networking

16.10 Summary

Exercises

Bibliographical Notes

Chapter 17 Distributed File Systems

17.1 Background

17.2 Naming and Transparency

17.3 Remote File Access

17.4 Stateful Versus Stateless Service

17.5 File Replication

17.6 An Example:AFS

17.7 Summary

Exercises

Bibliographical Notes

Chapter 18 Distributed Coordination

18.1 Event Ordering

18.2 Mutual Exclusion

18.3 Atomicity

18.4 Concurrency Control

18.5 Deadlock Handling

18.6 Election Algorithms

18.7 Reaching Agreement

18.8 Summary

Exercises

Bibliographical Notes

PART SEVEN SPECIAL PURPOSE SYSTEMS

Chapter 19 Real-Time Systems

19.1 Overview

19.2 System Characteristics

19.3 Features of Real-Time Kernels

19.4 Implementing Real-Time Operating Systems

19.5 Real-Tune CPU Scheduling

19.6 VxWorks 5.x

19.7 Summary

Exercises

Bibliographical Notes

Chapter 20 Multimedia Systems

20.1 What Is Multimedia?

20.2 Compression

20.3 Requirements of Multimedia Kernels

20.4 CPU Scheduling

20.5 Disk Scheduling

20.6 Network Management

20.7 An Example:CineBlitz

20.8 Summary

Exercises

Bibliographical Notes

PART EIGHT CASE STUDIES

Chapter 21 The Linux System

21.1 Linux History

21.2 Design Principles

21.3 Kernel Modules

21.4 Process Management

21.5 Scheduling

21.6 Memory Management

21.7 File Systems

21.8 Input and Output

21.9 Interprocess Communication

21.10 Network Structure

21.11 Security

21.12 Summary

Exercises

Bibliographical Notes

Chapter 22 Windows XP

22.1 History

22.2 Design Principles

22.3 System Components

22.4 Environmental Subsystems

22.5 File System

22.6 Networking

22.7 Programmer Interface

22.8 Summary

Exercises

Bibliographical Notes

Chapter 23 Influential Operating Systems

23.1 Early Systems

23.2 Atlas

23.3 XDS-940

23.4 THE

23.5 RC 4000

23.6 CTSS

23.7 MULTICS

23.8 IBM OS/360

23.9 Mach

23.10 Other Systems Exercises

PARTE-IGHT APPENDICES

Appendix A BSD UNIX (contents,online)

A.1 UNIX History

A.2 Design Principles

A.3 Programmer Interface

A.4 User Interface

A.5 Process Management

A.6 Memory Management

A.7 File System

A.8 I/O System

A.9 Interprocess Communication

A.10 Summary

Exercises

Bibliographical Notes

Appendix B The Mach System(contents online)

B.1 History of the Mach System

B.2 Design Principles

B.3 System Components

B.4 Process Management

B.5 Interprocess Communication

B.6 Memory Management

B.7 Programmer Interface

B.8 Summary

Exercises

Bibliographical Notes

Credits

Appendix C Windows 2000 (contents online)

C.1 History

C.2 Design Principles

C.3 System Components

C.4 Environmental Subsystems

C.5 File System

C.6 Networking

C.7 Programmer Interface

C.8 Summary

Exercises

Bibliographical Notes

Appendix D Distributed Communication (contents online)

D.1 Sockets

D.2 UDP Sockets

D.3 Remote Method Invocation

D.4 Other Aspects of Distributed Communication

D.5 Web Services

D.6 Summary

Exercises

Bibliographical Notes

Appendix E Java Primer (contents online)

E.1 Basics

E.2 Inheritance

E.3 Interfaces and Abstract Classes

E.4 Exception Handling

E.5 Applications and Applets

E.6 Summary Bibliographical Notes

Bibliography

Credits

Index

……[看更多目录]

 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
>>返回首頁<<
 
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有