Most books on operating systems deal with theory while ignoring practice. While the usual principles are covered in detail, the book describes a small, but real UNIX-like operating system: MINIX. The book demonstrates how it works while illustrating the principles behind it. Operating Systems: Design and Implementation Second Edition provides the MINIX source code. The relevant selections of the MINIX code are described in detail. When it first came out, MINIX caused something of a revolution. Within weeks, it had its own newsgroup on USENET, with 40,000 people. Most wanted to make MINIX bigger and fancier. Instead, Linux was created. That has become quite popular, very large, and complicated. MINIX, on the other hand, has remained small and suitable for instruction and example. The book has been revised to include updates in MINIX, which started out as a v 7 unix clone for a floppy-disk only 8088. It is now aimed at 386, 486, and pentium machines and is based on the international posix standard instead of on v7. There are now also versions of MINIX for the Macintosh and SPARC available. Professional programmers will find this book to be a valuable resource and reference book.
--This text refers to an out of print or unavailable edition of this title.
Book Info
Covers all the fundamental operating systems concepts such as processes, interprocess communication, input/output, virtual memory, file systems, and security. Describes MINIX code in detail. New revised edition contains updated material. CD ROM included. DLC: Operating systems (Computers) --This text refers to an out of print or unavailable edition of this title.
See all Editorial Reviews
Product Details
* Hardcover: 1080 pages
* Publisher: Prentice Hall; 3 edition (January 14, 2006)
* Language: English
* ISBN-10: 0131429388
* ISBN-13: 978-0131429383
http://rapidshare.com/files/103635901/I
- Anonymous Mass Mailers (1)
- bots (1)
- browser (1)
- cool links (1)
- cracking tools (3)
- dos commands (3)
- ebooks (104)
- Exploits (14)
- file upload (3)
- firefox (1)
- flash games (2)
- free space (2)
- gmail (1)
- google (7)
- google chrome Vulnerability (7)
- graphics (5)
- greasemonkey scripts (8)
- gtalk (4)
- hacking (12)
- hacking ebooks (45)
- hacking tools (42)
- hacking tutorials (22)
- haking tutorials (37)
- hosting (1)
- image hosting (1)
- information (11)
- invisible (2)
- IP Scanner (14)
- java (2)
- javascript (4)
- keygen (1)
- Keyloggers (3)
- magazine (1)
- Mail Bombers (1)
- mcse (1)
- muliti login (1)
- networking (2)
- news (9)
- orkut (15)
- Port Scanner (14)
- proxy (2)
- RapidShare Libraries (1)
- regedit (1)
- Sniffers (1)
- sniffing (1)
- sql injection (5)
- tips n trics (41)
- upload sites (3)
- virus (9)
- virus removal (6)
- visual c++ (2)
- Vulnerability Scanner (1)
- wallpapers (5)
- web based hackiing (1)
- web design (1)
- web templates (1)
- Wireless Hacking (5)
-
▼
2009
(127)
- ► August 2009 (33)
-
▼
March 2009
(40)
- Web Dragons: Inside the Myths of Search Engine
- Mathematics for Algorithm and Systems Analysis
- Javascript The Definitive Guide 5th Edition
- Brute Force: Cracking the Data Encryption Standard
- Operating Systems Design and Implementation
- Access Denied
- Exploiting Software: How to Break Code
- The Ethical Hack: A Framework for Business Value
- Create your own linux distribution
- Fuzzing: Brute Force Vulnerability Discovery
- Principles of Computer Science
- Pro Decrypting VBScript Viruses
- Learn-Key's Hacking Revealed
- Hacking Exposed Wireless
- Assembly Language Step-By-Step
- Professional JavaScript for Web Developers
- Network Security Assessment
- Advanced Linux Programming
- Introduction to Computing and Programming wit Java
- Hacking the Cable Modem
- Hacking the Cable Modem
- Java Cryptography Extensions:Practical Guide
- Internet and the World Wide Web: How to Program
- IPSec, 2nd Edition
- Understanding the Linux Kernel
- Software Piracy Exposed
- Computer Security Art And Science
- Network Security: A Beginner's Guide
- Code Reading: The Open Source Perspective
- 5 C Programming eBooks
- The Invisible Web
- MYSQL Books
- Reverse Engineering Code with IDA Pro
- Forensic Computing A Practitioner’s Guide
- Network Security Tools
- XML Books
- Internet Denial of Service: Attack and Defense
- Practical Internet Security
- Ankit Fadia ebooks
- Offensive Security Tutorial Videos...zone
- ► February 2009 (17)
-
►
2008
(211)
- ► November 2008 (13)
- ► September 2008 (198)
Blog Archive
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment