1.2 Computer-System Organization
1.3 Computer-System Architecture
1.4 Operating-System Structure
1.5 Operating-System Operations
1.12 Open-Source Operating Systems
Chapter 2 Operating-System Structures
2.2 User and Operating-System Interface
2.6 Operating-System Design and Implementation
2.7 Operating-System Structure
2.8 Operating-System Debugging
2.9 Operating-System Generation
3.4 Interprocess Communication
3.6 Communication in Client–Server Systems
Chapter 5 Process Synchronization
5.2 The Critical-Section Problem
5.7 Classic Problems of Synchronization
6.5 Multiple-Processor Scheduling
7.3 Methods for Handling Deadlocks
8.3 Contiguous Memory Allocation
8.6 Structure of the Page Table
8.7 Example: Intel 32 and 64-bit Architectures
9.10 Operating-System Examples
Chapter 10 Mass-Storage Structure
10.1 Overview of Mass-Storage Structure
10.8 Stable-Storage Implementation
Chapter 11 File-System Interface
11.3 Directory and Disk Structure
Chapter 12 File-System Implementation
12.2 File-System Implementation
12.6 Efficiency and Performance
12.9 Example: The WAFL File System
13.3 Application I/O Interface
13.5 Transforming I/O Requests to Hardware Operations
PART FIVE PROTECTION AND SECURITY
14.5 Implementation of the Access Matrix
14.7 Revocation of Access Rights
14.9 Language-Based Protection
15.3 System and Network Threats
15.4 Cryptography as a Security Tool
15.6 Implementing Security Defenses
15.7 Firewalling to Protect Systems and Networks
15.8 Computer-Security Classifications
16.5 Types of Virtual Machines and Their Implementations
16.6 Virtualization and Operating-System Components
Chapter 17 Distributed Systems
17.1 Advantages of Distributed Systems
17.2 Types of Network-based Operating Systems
18.9 Interprocess Communication
19.4 Terminal Services and Fast User Switching
Chapter 20 Influential Operating Systems
18.221.163.13