タネンバウム・現代オペレーティングシステム(第3版)<br>Modern Operating Systems -- Paperback (3 Internat)

個数:
  • ポイントキャンペーン

タネンバウム・現代オペレーティングシステム(第3版)
Modern Operating Systems -- Paperback (3 Internat)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • ≪洋書のご注文について≫ 「海外取次在庫あり」「国内在庫僅少」および「国内仕入れ先からお取り寄せいたします」表示の商品でもクリスマス前(12/20~12/25)および年末年始までにお届けできないことがございます。あらかじめご了承ください。

  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 1104 p.
  • 商品コード 9780138134594

基本説明

タネンバウムのベストセラーテキスト。マルチメディアオペレーティングシステム、マルチプロセッサ、仮想マシン、アンチウィルスソフトウェアなどの項目をアップデート。Windows Vistaの内部の働きに関する章を新たに追加(第11章)するなど、最新の技術開発を踏まえた、6年ぶり待望の改訂新版。

Full Description


For Introductory Courses in Operating Systems in Computer Science, Computer Engineering, and Electrical Engineering programs. The widely anticipated revision of this worldwide best-seller incorporates the latest developments in operating systems (OS)technologies. The Third Edition includes up-to-date materials on relevant. OS such as Linux, Windows, and embedded real-time and multimedia systems. Tanenbaum also provides information on current research based on his experience as an operating systems researcher. Student Resources?Include:Online Exercises - Provide hands-on experience with building as well as analyzing the performance of OS. In particular, these exercises have been designed to provide experience with analyzing the resource consumptions in Windows and Linux. Simulation Exercises - Designed to provide experience with building some key components of an OS, including process scheduling, main memory allocation, paging algorithms and virtual memory, and file systems. Lab Experiments Please note, GOAL is no longer available with this book.Password-Protected Instructor Resources (Select the Resources Tab to View Downloadable Files):Power Point Lecture Slides Figures in both .jpeg and .eps file format Solutions to Exercises Please note, GOAL is no longer available with this book.Modern Operating Systems, 3e is the recipient of the Text and Authors Association (TAA) 2010 McGuffey Longevity Award. The McGuffey Longevity Award recognizes textbooks whose excellence has been demonstrated over time.

Contents

1 INTRODUCTION1.1 WHAT IS AN OPERATING SYSTEM?1.1.1 The Operating System as an Extended Machine1.1.2 The Operating System as a Resource Manager1.2 Generation1.2.3 The Third Generation1.2.4 The Fourth Generation1.3 COMPUTER HARDWARE REVIEW1.3.1 Processors1.3.2 Memory1.3.3 Disks1.3.4 Tapes1.3.5 I/O Devices1.3.6 Buses1.3.7 Booting the Computer1.4 THE OPERATING SYSTEM ZOO1.4.1 Mainframe Operating Systems1.4.2 Server Operating Systems1.4.3 Multiprocessor Operating Systems1.4.4 Personal Computer Operating Systems1.4.5 Handheld Computer Operating Systems1.4.6 Embedded Operating Systems.1.4.7 Sensor Node Operating Systems1.4.8 Real-Time Operating Systems1.4.9 Smart Card Operating Systems1.5 OPERATING SYSTEM CONCEPTS1.5.1 Processes1.5.2 Address Spaces1.5.3 Files1.5.4 Input/Output1.5.5 Protection1.5.6 The Shell1.5.7 Ontogeny Recapitulates Phylogeny1.6 SYSTEM CALLS1.6.1 System Calls for Process Management1.6.2 System Calls for File Management1.6.3 System Calls for Directory Management1.6.4 Miscellaneous System Calls1.6.5 The Windows Win32 API1.7 OPERATING SYSTEM STRUCTURE1.7.1 Monolithic Systems1.7.2 Layered Systems1.7.3 Microkernels1.7.4 Client-Server Model1.7.5 Virtual Machines1.7.6 Exokernels1.8 THE WORLD ACCORDING TO C1.8.1 The C Language1.8.2 Header Files1.8.3 Large Programming Projects1.8.4 The Model of Run Time1.9 RESEARCH UNITS1.12 SUMMARY2 PROCESSES AND THREADS2.1 PROCESSES2.1.1 The Process Model2.1.2 Process Creation2.1.3 Process Termination2.1.4 Process Hierarchies2.1.5 Process States2.1.6 Implementation of Processes2.1.7 Modeling Multiprogramming2.2 THREADS2.2.1 Thread Usage2.2.2 The Classical Thread Model2.2.3 POSIX Threads2.2.4 Implementing Threads in User Space2.2.5 Implementing Threads in the Kernel2.2.6 Hybrid Implementations2.2.7 Scheduler Activations2.2.8 Pop-Up Threads2.2.9 Making Single-Threaded Code Multithreaded2.3 INTERPROCESS COMMUNICATION2.3.1 Race Conditions2.3.2 Critical Regions2.3.3 Mutual Exclusion with Busy Waiting2.3.4 Sleep and Wakeup2.3.5 Semaphores2.3.6 Mutexes2.3.7 Monitors2.3.8 Message Passing2.3.9 Barriers2.4 SCHEDULING2.4.1 Introduction to Scheduling2.4.2 Scheduling in Batch Systems2.4.3 Scheduling in Interactive Systems2.4.4 Scheduling in Real-Time Systems2.4.5 Policy versus Mechanism2.4.6 Thread Scheduling2.5 CLASSICAL IPC PROBLEMS2.5.1 The Dining Philosophers Problem2.5.2 The Readers MANAGEMENT3.1 NO MEMORY ABSTRACTION3.2 A MEMORY ABSTRACTION: ADDRESS SPACES3.2.1 The Notion of an Address Space3.2.2 Swapping3.2.3 Managing Free Memory3.3 VIRTUAL MEMORY3.3.1 Paging3.3.2 Page Tables3.3.3 Speeding Up Paging3.3.4 Page Tables for Large Memories3.4 PAGE LACEMENT ALGORITHMS3.4.1 The Optimal Page Replacement Algorithm3.4.2 The Not Recently Used Page Replacement Algorithm3.4.3 The First-In, First-Out3.4.4 The Second Chance Page Replacement Algorithm3.4.5 The Clock Page Replacement Algorithm3.4.6 The Least Recently Used3.4.7 Simulating LRU in Software3.4.8 The Working Set Page Replacement Algorithm3.4.9 The WSClock Page Replacement Algorithm3.4.10 Summary of Page Replacement Algorithms3.5 DESIGN ISSUES FOR PAGING SYSTEMS3.5.1 Local versus Global Allocation Policies3.5.2 Load Control3.5.3 Page Size3.5.4 Separate Instruction and Data Spaces3.5.5 Shared Pages3.5.6 Shared Libraries3.5.7 Mapped Files3.5.8 Cleaning Policy3.5.9 Virtual Memory Interface3.6 IMPLEMENTATION ISSUES3.6.1 Operating System Involvement with Paging3.6.2 Page Fault Handling3.6.3 Instruction Backup3.6.4 Locking Pages in Memory3.6.5 Backing Store3.6.6 Separation of Policy and Mechanism3.7 SEGMENTATION3.7.1 Implementation of Pure Segmentation3.7.2 Segmentation with Paging: MULTICS3.7.3 Segmentation with Paging: The Intel Pentium3.8 RESEARCH ON MEMORY MANAGEMENT3.9 SUMMARY4 FILE SYSTEMS4.1 FILES4.1.1 File Naming4.1.2 File Structure4.1.3 File Types4.1.4 File Access4.1.5 File Attributes4.1.6 File Operations4.1.7 An Example Program Using File System Calls4.2 DIRECTORIES4.2.1 Single-Level Directory Systems4.2.2 Hierarchical Directory Systems4.2.3 Path Names4.2.4 Directory Operations4.3 FILE SYSTEM IMPLEMENTATION4.3.1 File System Layout4.3.2 Implementing Files4.3.3 Implementing Directories4.3.4 Shared Files4.3.5 Log-Structured File Systems4.3.6 Journaling File Systems4.3.7 Virtual File Systems4.4 FILE SYSTEM MANAGEMENT AND OPTIMIZATION4.4.1 Disk Space Management4.4.2 File System Backups4.4.3 File System Consistency4.4.4 File System Performance4.4.5 Defragmenting Disks4.5 EXAMPLE FILE SYSTEMS4.5.1 CD-ROM File Systems4.5.2 The SYSTEMS4.7 SUMMARY5 INPUT/OUTPUT5.1 PRINCIPLES OF I/O HARDWARE5.1.1 I/O Devices5.1.2 Device Controllers5.1.3 Memory-Mapped I/O5.1.4 Direct Memory Access5.1.5 Interrupts Revisited5.2 PRINCIPLES OF I/O SOFTWARE5.2.1 Goals of the I/O Software5.2.2 Programmed I/O5.2.3 Interrupt-Driven I/O5.2.4 I/O Using DMA5.3 I/O SOFTWARE LAYERS5.3.1 Interrupt Handlers5.3.2 Device Drivers5.3.3 Device-Independent I/O Software5.3.4 User-Space I/O Software5.4 DISKS5.4.1 Disk Hardware5.4.2 Disk Formatting5.4.3 Disk Arm Scheduling Algorithms5.4.4 Error Handling5.4.5 Stable Storage5.5 CLOCKS5.5.1 Clock Hardware5.5.2 Clock Software5.5.3 Soft Timers5.6 USER INTERFACES: KEYBOARD, MOUSE, MONITOR5.6.1 Input Software5.6.2 Output Software5.7 THIN CLIENTS5.8 POWER MANAGEMENT5.8.1 Hardware Issues5.8.2 Operating System Issues:5.8.3 Application Program Preemptable and Nonpreemptable Resources6.1.2 Resource Acquisition6.2 Deadlock Modeling6.3 THE OSTRICH ALGORITHM6.4 DEADLOCK DETECTION AND RECOVERY6.4.1 Deadlock Detection with One Resource of Each Type6.4.2 Deadlock Detection with Multiple Resources of Each Type6.4.3 Recovery from Deadlock6.5 DEADLOCK AVOIDANCE6.5.1 Resource Trajectories6.5.2 Safe and Unsafe States6.5.3 The Bankerツ s Algorithm for a Single Resource6.5.4 The Bankerツ s Algorithm for Multiple Resources6.6 DEADLOCK PREVENTION6.6.1 Attacking the Mutual Exclusion Condition6.6.2 Attacking the Hold and Wait Condition6.6.3 Attacking the No Preemption Condition6.6.4 Attacking the Circular Wait Condition6.7 OTHER ISSUES6.7.1 Two-Phase Locking6.7.2 Communication FILES7.2.1 Video Encoding7.2.2 Audio Encoding7.3 VIDEO COMPRESSION7.3.1 The JPEG Standard7.3.2 The MPEG Standard7.4 AUDIO COMPRESSION7.5 MULTIMEDIA PROCESS SCHEDULING7.5.1 Scheduling Homogeneous Processes7.5.2 General Real-Time Scheduling7.5.3 Rate Monotonic Scheduling7.5.4 Earliest Deadline First Scheduling7.6 MULTIMEDIA FILE SYSTEM PARAD6.1 VCR Control Functions7.6.2 Near Video on Demand7.6.3 Near Video on Demand with VCR Functions7.7 FILE PLACEMENT7.7.1 Placing a File on a Single Disk7.7.2 Two Alternative File Organization Strategies7.7.3 Placing Files for Near Video on Demand7.7.4 Placing Multiple Files on a Single Disk7.7.5 Placing Files on Multiple Disks7.8 CACHING7.8.1 Block Caching7.8.2 File Caching7.9 DISK SCHEDULING FOR MULTIMEDIA7.9.1 Static Disk Scheduling7.9.2 Dynamic Disk SYSTEMS8.1 MULTIPROCESSORS8.1.1 Multiprocessor Hardware8.1.2 Multiprocessor Operating System Types8.1.3 Multiprocessor Synchronization8.1.4 Multiprocessor Scheduling8.2 MULTICOMPUTERS8.2.1 Multicomputer Hardware8.2.2 Low-Level Communication Software8.2.3 User-Level Communication Software8.2.4 Remote Procedure Call8.2.5 Distributed Shared Memory8.2.6 Multicomputer Scheduling8.2.7 Load Balancing8.3 VIRTUALIZATION8.3.1 Requirements for Virtualization8.3.2 Type 1 Hypervisors8.3.3 Type 2 Hypervisors8.3.4 Paravirtualization8.3.5 Memory Virtualization8.3.6 I/O Virtualization8.3.7 Virtual Appliances8.3.8 Virtual Machines on Multicore CPUs8.3.9 Licensing Issues8.4 DISTRIBUTED SYSTEMS8.4.1 Network Hardware8.4.2 Network Services and Protocols8.4.3 Document-Based Middleware8.4.4 File System-Based Middleware8.4.5 Object-Based Middleware8.4.6 Coordination-Based Middleware8.5 ENVIRONMENT9.1.1 Threats9.1.2 Intruders9.1.3 Accidental Data Loss9.2 BASICS OF CRYPTOGRAPHY9.2.1 Secret-Key Cryptography9.2.2 Public-Key Cryptography9.2.3 One-Way Functions9.2.4 Digital Signatures9.2.5 Trusted Platform Module9.3 PROTECTION MECHANISMS9.3.1 Protection Domains9.3.2 Access Control Lists9.3.3 Capabilities9.3.4 Trusted systems9.3.5 Trusted Computing Base9.3.6 Formal Models of Secure Systems9.3.7 Multilevel Security9.3.8 Covert Channels9.4 AUTHENTICATION9.4.1 Authentication Using Passwords9.4.2 Authentication Using a Physical Object9.4.3 Authentication Using Biometrics9.5 INSIDER ATTACKS9.5.1 Logic Bombs9.5.2 Trap Doors9.5.3 Login Spoofing9.6 EXPLOITING CODE BUGS9.6.1 Buffer Overflow Attacks9.6.2 Format String Attacks9.6.3 Return to libc Attacks9.6.4 Integer Overflow Attacks9.6.5 Code Injection Attacks9.6.6 Privilege Escalation Attacks9.7 MALWARE9.7.1 Trojan Horses9.7.2 Viruses9.7.3 Worms9.7.4 Spyware9.7.5 Rootkits9.8 DEFENSES9.8.1 Firewalls9.8.2 Antivirus and Anti-Antivirus Techniques9.8.3 Code Signing9.8.4 Jailing9.8.5 Model-Based Intrusion Detection9.8.6 PDP-11 UNIX10.1.3 Portable UNIX10.1.4 Berkeley UNIX10.1.5 Standard UNIX10.1.6 Linux10.2.3 The Shell10.2.4 Linux Utility Programs10.2.5 Kernel Structure10.3 Calls in Linux10.3.3 Implementation of Processes and Threads in Linux10.3.4 Fundamental Concepts10.4.2 Memory Management System Calls in Linux10.4.3 Implementation of Memory Management in Linux10.4.4 Paging in Linux10.5 Input/Output System Calls in Linux10.5.4 Implementation of Input/Output in Linux10.5.5 Modules in Linux10.6 THE LINUX FILE SYSTEM10.6.1 Fundamental Concepts10.6.2 File System Calls in Linux10.6.3 Implementation of the Linux Fundamental Concepts10.7.2 Security System Calls in Linux10.7.3 Implementation of Security in Linux10.8 SUMMARY11 CASE STUDY 2: WINDOWS MS-DOS-based Windows11.1.3 2000s: NT-based Windows11.1.4 Windows Vista11.2 PROGRAMMING WINDOWS VISTA11.2.1 The Native NT Application Programming Interface11.2.2 The Win32 Application Programming Interface11.2.3 The Windows Registry11.3 SYSTEM STRUCTURE11.3.1 Operating System Structure11.3.2 Booting Windows Vista11.3.3 Implementation of the Object Manager11.3.4 Subsystems, Fundamental Concepts11.4.2 Job, Process, Thread and Fiber Management API Calls11.4.3 Implementation of Processes and Threads11.5 MEMORY MANAGEMENT11.5.1 Fundamental Concepts11.5.2 Memory Management System SYSTEM11.8.1 Fundamental Concepts11.8.2 Implementation of the NT File Security API Calls11.9.3 Implementation of Security11.10 SUMMARY12 CASE STUDY EPOC12.1.2 Symbian OS Version 612.1.3 Symbian OS Version 712.1.4 Symbian OS Microkernel Design12.2.3 The Symbian OS Nanokernel12.2.4 Client/Server Resource Access12.2.5 Features of a Larger Operating System12.2.6 Threads and Nanothreads12.3.2 Processes12.3.3 Active Objects12.3.4 Interprocess Communication12.4 MEMORY MANAGEMENT12.4.1 Systems with No Virtual Memory12.4.2 How Symbian OS Addresses Memory12.5 INPUT AND OUTPUT12.5.1 Device Drivers12.5.2 Kernel Extensions12.5.3 Direct Memory Access12.5.4 Special Case: Storage Media12.5.5 Blocking I/O12.5.6 Removable Media12.6 STORAGE SYSTEMS12.6.1 File systems for Mobile Devices12.6.2 Symbian OS File systems12.6.3 File system Security and Protection12.7 SECURITY IN Closer Look at the Infrastructure12.9 SUMMARY13 OPERATING SYSTEMS DESIGN13.1 an Operating System?13.2 INTERFACE DESIGN13.2.1 Guiding Principles13.2.2 Paradigms13.2.3 The System Call Interface13.3 IMPLEMENTATION13.3.1 System Structure13.3.2 Mechanism versus Policy13.3.3 Orthogonality13.3.4 Naming13.3.5 Binding Time13.3.6 Static versus Dynamic Structures13.3.7 Top-Down versus Bottom-Up Implementation13.3.8 Useful Techniques13.4 PERFORMANCE13.4.1 Why Are Operating Systems Slow?13.4.2 What Should Be Optimized?13.4.3 Space-Time Trade-offs13.4.4 Caching13.4.5 Hints13.4.6 Exploiting Locality13.4.7 Optimize the Common Case13.5 PROJECT MANAGEMENT13.5.1 The Mythical Man Month13.5.2 Team Structure13.5.3 The Role DESIGN13.6.1 Virtualization13.6.2 Multicore Chips13.6.3 Large Address Space Operating Systems13.6.4 Networking13.6.5 Parallel and Distributed Systems13.6.6 Multimedia13.6.7 Battery-Powered Computers13.6.8 Embedded Systems13.6.9 Sensor Nodes13.7 SUMMARY14 READING LIST AND BIBLIOGRAPHY14.1 SUGGESTIONS FOR FURTHER READING14.1.1 Introduction and General Works14.1.2 Processes and Threads14.1.3 Memory Management14.1.4 Input/Output14.1.5 File Systems14.1.6 eadlocks14.1.7 Multimedia Operating Systems14.1.8 Multiple Processor Systems14.1.9 ecurity14.1.10 Linux14.1.11 Windows Vista14.1.12 The Symbian OS14.1.13 Design Principles14.2 ALPHABETICAL BIBLIOGRAPHYINDEX

最近チェックした商品