|
|
|
Modern Operating Systems by Herbert Bos and Andrew S. Tanenb...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf
Showing 17-19 out of 1137
Modern Operating Systems by Herbert Bos and Andrew...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf-M ODERN O PERATING S YSTEMS
Modern Operating Systems by Herbert...
Modern_Operating_Systems_by_Herbert_Bos_and_Andrew_S._Tanenbaum_4th_Ed.pdf-M ODERN O PERATING S YSTEMS
Page 17
xvi
CONTENTS
7.12.3 Challenges in Bringing Virtualization to the x86
500
7.12.4 VMware Workstation: Solution Overview
502
7.12.5 The Evolution of VMware Workstation
511
7.12.6 ESX Server: VMware’s type 1 Hypervisor
512
7.13
RESEARCH ON VIRTUALIZATION AND THE CLOUD
514
8
MULTIPLE PROCESSOR SYSTEMS
517
8.1
MULTIPROCESSORS 520
8.1.1 Multiprocessor Hardware 520
8.1.2 Multiprocessor Operating System Types
530
8.1.3 Multiprocessor Synchronization
534
8.1.4 Multiprocessor Scheduling
539
8.2
MULTICOMPUTERS 544
8.2.1 Multicomputer Hardware 545
8.2.2 Low-Level Communication Software 550
8.2.3 User-Level Communication Software 552
8.2.4 Remote Procedure Call
556
8.2.5 Distributed Shared Memory
558
8.2.6 Multicomputer Scheduling
563
8.2.7 Load Balancing
563
8.3
DISTRIBUTED SYSTEMS
566
8.3.1 Network Hardware 568
8.3.2 Network Services and Protocols
571
8.3.3 Document-Based Middleware 576
8.3.4 File-System-Based Middleware 577
8.3.5 Object-Based Middleware 582
8.3.6 Coordination-Based Middleware 584
8.4
RESEARCH ON MULTIPLE PROCESSOR SYSTEMS
587
8.5
SUMMARY
588
Page 18
CONTENTS
xvii
9
SECURITY
593
9.1
THE SECURITY ENVIRONMENT 595
9.1.1 Threats
596
9.1.2 Attackers 598
9.2
OPERATING SYSTEMS SECURITY
599
9.2.1 Can We Build Secure Systems?
600
9.2.2 Trusted Computing Base
601
9.3
CONTROLLING ACCESS TO RESOURCES 602
9.3.1 Protection Domains
602
9.3.2 Access Control Lists
605
9.3.3 Capabilities
608
9.4
FORMAL MODELS OF SECURE SYSTEMS
611
9.4.1 Multilevel Security 612
9.4.2 Covert Channels
615
9.5
BASICS OF CRYPTOGRAPHY 619
9.5.1 Secret-Key Cryptography
620
9.5.2 Public-Key Cryptography
621
9.5.3 One-Way Functions
622
9.5.4 Digital Signatures
622
9.5.5 Trusted Platform Modules
624
9.6
AUTHENTICATION 626
9.6.1 Authentication Using a Physical Object
633
9.6.2 Authentication Using Biometrics
636
9.7
EXPLOITING SOFTWARE 639
9.7.1 Buffer Over
fl
ow Attacks 640
9.7.2 Format String Attacks
649
9.7.3 Dangling Pointers
652
9.7.4 Null Pointer Dereference Attacks
653
9.7.5 Integer Over
fl
ow Attacks 654
9.7.6 Command Injection Attacks
655
9.7.7 Time of Check to Time of Use Attacks
656
9.8
INSIDER ATTA CKS 657
9.8.1 Logic Bombs
657
9.8.2 Back Doors
658
9.8.3 Login Spoo
fi
ng
659
Page 19
xviii
CONTENTS
9.9
MALWARE 660
9.9.1 Trojan Horses
662
9.9.2 Viruses 664
9.9.3 Worms 674
9.9.4 Spyware 676
9.9.5 Rootkits
680
9.10 DEFENSES
684
9.10.1 Firewalls 685
9.10.2 Antivirus and Anti-Antivirus Techniques
687
9.10.3 Code Signing
693
9.10.4 Jailing
694
9.10.5 Model-Based Intrusion Detection
695
9.10.6 Encapsulating Mobile Code
697
9.10.7 Java Security 701
9.11 RESEARCH ON SECURITY
703
9.12 SUMMARY
704
10
CASE STUDY 1: UNIX, LINUX, AND ANDROID
713
10.1
HISTORY OF UNIX AND LINUX
714
10.1.1 UNICS
714
10.1.2 PDP-11 UNIX
715
10.1.3 Portable UNIX
716
10.1.4 Berkeley UNIX 717
10.1.5 Standard UNIX
718
10.1.6 MINIX
719
10.1.7 Linux
720
10.2
OVERVIEW OF LINUX
723
10.2.1 Linux Goals
723
10.2.2 Interfaces to Linux
724
10.2.3 The Shell
725
10.2.4 Linux Utility Programs
728
10.2.5 Kernel Structure
730
10.3
PROCESSES IN LINUX
733
10.3.1 Fundamental Concepts
733
10.3.2 Process-Management System Calls in Linux
735
Ace your assessments! Get Better Grades
Browse thousands of Study Materials & Solutions from your Favorite Schools
Concordia University
Concordia_University
School:
Operating_Systems
Course:
Introducing Study Plan
Using AI Tools to Help you understand and remember your course concepts better and faster than any other resource.
Find the best videos to learn every concept in that course from Youtube and Tiktok without searching.
Save All Relavent Videos & Materials and access anytime and anywhere
Prepare Smart and Guarantee better grades
Students also viewed documents
lab 18.docx
lab_18.docx
Course
Course
3
Module5QuizSTA2023.d...
Module5QuizSTA2023.docx.docx
Course
Course
10
Week 7 Test Math302....
Week_7_Test_Math302.docx.docx
Course
Course
30
Chapter 1 Assigment ...
Chapter_1_Assigment_Questions.docx.docx
Course
Course
5
Week 4 tests.docx.do...
Week_4_tests.docx.docx
Course
Course
23
Week 6 tests.docx.do...
Week_6_tests.docx.docx
Course
Course
106