Network security essentials : applications and standards / / William Stallings ; contributions by B. R. Chandavarkar |
Autore | Stallings William |
Edizione | [Fifth edition, international edition.] |
Pubbl/distr/stampa | Boston, [Massachusetts] : , : Pearson, , 2014 |
Descrizione fisica | 1 online resource (447 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN | 0-273-79380-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Contents -- Online Resources -- Preface -- About the Author -- Chapter 1 Introduction -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network Security -- 1.7 Standards -- 1.8 Outline of This Book -- 1.9 Recommended Reading -- 1.10 Internet and Web Resources -- 1.11 Key Terms, Review Questions, and Problems -- PART ONE: CRYPTOGRAPHY -- Chapter 2 Symmetric Encryption and Message Confidentiality -- 2.1 Symmetric Encryption Principles -- 2.2 Symmetric Block Encryption Algorithms -- 2.3 Random and Pseudorandom Numbers -- 2.4 Stream Ciphers and RC4 -- 2.5 Cipher Block Modes of Operation -- 2.6 Recommended Reading -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Public-Key Cryptography and Message Authentication -- 3.1 Approaches to Message Authentication -- 3.2 Secure Hash Functions -- 3.3 Message Authentication Codes -- 3.4 Public-Key Cryptography Principles -- 3.5 Public-Key Cryptography Algorithms -- 3.6 Digital Signatures -- 3.7 Recommended Reading -- 3.8 Key Terms, Review Questions, and Problems -- PART TWO: NETWORK SECURITY APPLICATIONS -- Chapter 4 Key Distribution and User Authentication -- 4.1 Symmetric Key Distribution Using Symmetric Encryption -- 4.2 Kerberos -- 4.3 Key Distribution Using Asymmetric Encryption -- 4.4 X.509 Certificates -- 4.5 Public-Key Infrastructure -- 4.6 Federated Identity Management -- 4.7 Recommended Reading -- 4.8 Key Terms, Review Questions, and Problems -- Chapter 5 Network Access Control and Cloud Security -- 5.1 Network Access Control -- 5.2 Extensible Authentication Protocol -- 5.3 IEEE 802.1X Port-Based Network Access Control -- 5.4 Cloud Computing -- 5.5 Cloud Security Risks and Countermeasures -- 5.6 Data Protection in the Cloud -- 5.7 Cloud Security as a Service.
5.8 Recommended Reading -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Transport-Level Security -- 6.1 Web Security Considerations -- 6.2 Secure Sockets Layer (SSL) -- 6.3 Transport Layer Security (TLS) -- 6.4 HTTPS -- 6.5 Secure Shell (SSH) -- 6.6 Recommended Reading -- 6.7 Key Terms, Review Questions, and Problems -- Chapter 7 Wireless Network Security -- 7.1 Wireless Security -- 7.2 Mobile Device Security -- 7.3 IEEE 802.11 Wireless LAN Overview -- 7.4 IEEE 802.11i Wireless LAN Security -- 7.5 Recommended Reading -- 7.6 Key Terms, Review Questions, and Problems -- Chapter 8 Electronic Mail Security -- 8.1 Pretty Good Privacy (PGP) -- 8.2 S/MIME -- 8.3 DomainKeys Identified Mail (DKIM) -- 8.4 Recommended Reading -- 8.5 Key Terms, Review Questions, and Problems -- Chapter 9 IP Security -- 9.1 IP Security Overview -- 9.2 IP Security Policy -- 9.3 Encapsulating Security Payload -- 9.4 Combining Security Associations -- 9.5 Internet Key Exchange -- 9.6 Cryptographic Suites -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- PART THREE: SYSTEM SECURITY -- Chapter 10 Malicious Software -- 10.1 Types of Malicious Software (Malware) -- 10.2 Propagation-Infected Content-Viruses -- 10.3 Propagation-Vulnerability Exploit-Worms -- 10.4 Propagation-Social Engineering-SPAM E-mail, Trojans -- 10.5 Payload-System Corruption -- 10.6 Payload-Attack Agent-Zombie, Bots -- 10.7 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 10.8 Payload-Stealthing-Backdoors, Rootkits -- 10.9 Countermeasures -- 10.10 Distributed Denial of Service Attacks -- 10.11 Recommended Reading -- 10.12 Key Terms, Review Questions, and Problems -- Chapter 11 Intruders -- 11.1 Intruders -- 11.2 Intrusion Detection -- 11.3 Password Management -- 11.4 Recommended Reading -- 11.5 Key Terms, Review Questions, and Problems -- Chapter 12 Firewalls. 12.1 The Need for Firewalls -- 12.2 Firewall Characteristics -- 12.3 Types of Firewalls -- 12.4 Firewall Basing -- 12.5 Firewall Location and Configurations -- 12.6 Recommended Reading -- 12.7 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A: Some Aspects of Number Theory -- A.1 Prime and Relatively Prime Numbers -- A.2 Modular Arithmetic -- Appendix B: Projects for Teaching Network Security -- B.1 Research Projects -- B.2 Hacking Project -- B.3 Programming Projects -- B.4 Laboratory Exercises -- B.5 Practical Security Assessments -- B.6 Firewall Projects -- B.7 Case Studies -- B.8 Writing Assignments -- B.9 Reading/Report Assignments -- References -- Credits -- Index. |
Record Nr. | UNINA-9910151655103321 |
Stallings William | ||
Boston, [Massachusetts] : , : Pearson, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network security essentials : applications and standards / William Stallings |
Autore | Stallings, William |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Upper Saddle River : Pearson Education, c2007 |
Descrizione fisica | xvi, 413 p. : ill. ; 24 cm |
Disciplina | 005.8 |
Soggetto non controllato |
Reti di computer
Sistemi di sicurezza Crittografia |
ISBN | 0-13-238033-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990008475170403321 |
Stallings, William | ||
Upper Saddle River : Pearson Education, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network security essentials : applications and standards / William Stallings |
Autore | Stallings, William |
Pubbl/distr/stampa | Upper Saddle River [N.J.] : Prentice Hall, c2000 |
Descrizione fisica | xiii, 366 p. : ill. ; 24 cm |
Disciplina | 005.8 |
Soggetto non controllato |
Reti di computer
Sistemi di sicurezza Crittografia |
ISBN | 0-13-016093-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990001493910403321 |
Stallings, William | ||
Upper Saddle River [N.J.] : Prentice Hall, c2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Networking standards : a guide to OSI, ISDN, LAN, and MANstandards / William Stallings |
Autore | STALLINGS, William |
Pubbl/distr/stampa | Reading (Mass.) [etc.] : Addison-Wesley, copyr. 1993 |
Disciplina | 004.62 |
Soggetto topico |
Reti di elaboratori - Programmazione
Sistemi di trasmissione dati |
ISBN | 0-201-56357-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000164480203316 |
STALLINGS, William | ||
Reading (Mass.) [etc.] : Addison-Wesley, copyr. 1993 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Operating systems : internal and design principles / William Stallings |
Autore | Stallings, William |
Edizione | [9th ed.] |
Pubbl/distr/stampa | England : Pearson, 2018 |
Descrizione fisica | 732 p. : ill. ; 23 cm |
Disciplina | 005.4 |
Soggetto non controllato | Sistemi operativi |
ISBN | 978-1-292-21429-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910284736103321 |
Stallings, William | ||
England : Pearson, 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Operating systems : internals and design principles / / William Stallings |
Autore | Stallings William |
Edizione | [Eighth edition, Global edition.] |
Pubbl/distr/stampa | Harlow, England : , : Pearson, , 2014 |
Descrizione fisica | 1 online resource (804 pages) |
Disciplina | 005.43 |
Collana | Always Learning |
Soggetto topico | Operating systems (Computers) |
ISBN | 1292061944 (ebk.) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Contents -- Online Resources -- VideoNotes -- Preface -- About the Author -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of this Book -- 0.2 Example Systems -- 0.3 A Roadmap for Readers and Instructors -- 0.4 Internet and Web Resources -- Part 1 Background -- Chapter 1 Computer System Overview -- 1.1 Basic Elements -- 1.2 Evolution of the Microprocessor -- 1.3 Instruction Execution -- 1.4 Interrupts -- 1.5 The Memory Hierarchy -- 1.6 Cache Memory -- 1.7 Direct Memory Access -- 1.8 Multiprocessor and Multicore Organization -- 1.9 Recommended Reading -- 1.10 Key Terms, Review Questions, and Problems -- 1A Performance Characteristics of Two-Level -- Chapter 2 Operating System Overview -- 2.1 Operating System Objectives and Functions -- 2.2 The Evolution of Operating Systems -- 2.3 Major Achievements -- 2.4 Developments Leading to Modern Operating Systems -- 2.5 Fault Tolerance -- 2.6 OS Design Considerations for Multiprocessor and Multicore -- 2.7 Microsoft Windows Overview -- 2.8 Traditional UNIX Systems -- 2.9 Modern UNIX Systems -- 2.10 Linux -- 2.11 Android -- 2.12 Recommended Reading and Animations -- 2.13 Key Terms, Review Questions, and Problems -- Part 2 Processes -- Chapter 3 Process Description and Control -- 3.1 What Is a Process? -- 3.2 Process States -- 3.3 Process Description -- 3.4 Process Control -- 3.5 Execution of the Operating System -- 3.6 UNIX SVR4 Process Management -- 3.7 Summary -- 3.8 Recommended Reading and Animations -- 3.9 Key Terms, Review Questions, and Problems -- Chapter 4 Threads -- 4.1 Processes and Threads -- 4.2 Types of Threads -- 4.3 Multicore and Multithreading -- 4.4 Windows 8 Process and Thread Management -- 4.5 Solaris Thread and SMP Management -- 4.6 Linux Process and Thread Management -- 4.7 Android Process and Thread Management -- 4.8 Mac OS X Grand Central Dispatch.
4.9 Summary -- 4.10 Recommended Reading -- 4.11 Key Terms, Review Questions, and Problems -- Chapter 5 Concurrency: Mutual Exclusion -- 5.1 Principles of Concurrency -- 5.2 Mutual Exclusion: Hardware Support -- 5.3 Semaphores -- 5.4 Monitors -- 5.5 Message Passing -- 5.6 Readers/Writers Problem -- 5.7 Summary -- 5.8 Recommended Reading and Animations -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Concurrency: Deadlock and Starvation -- 6.1 Principles of Deadlock -- 6.2 Deadlock Prevention -- 6.3 Deadlock Avoidance -- 6.4 Deadlock Detection -- 6.5 An Integrated Deadlock Strategy -- 6.6 Dining Philosophers Problem -- 6.7 UNIX Concurrency Mechanisms -- 6.8 Linux Kernel Concurrency Mechanisms -- 6.9 Solaris Thread Synchronization Primitives -- 6.10 Windows 7 Concurrency Mechanisms -- 6.11 Android Interprocess Communication -- 6.12 Summary -- 6.13 Recommended Reading and Animations -- 6.14 Key Terms, Review Questions, and Problems -- Part 3 Memory -- Chapter 7 Memory Management -- 7.1 Memory Management Requirements -- 7.2 Memory Partitioning -- 7.3 Paging -- 7.4 Segmentation -- 7.5 Summary -- 7.6 Recommended Reading and Animations -- 7.7 Key Terms, Review Questions, and Problems -- 7A Loading and Linking -- Chapter 8 Virtual Memory -- 8.1 Hardware and Control Structures -- 8.2 Operating System Software -- 8.3 UNIX and Solaris Memory Management -- 8.4 Linux Memory Management -- 8.5 Windows Memory Management -- 8.6 Android Memory Management -- 8.7 Summary -- 8.8 Recommended Reading and Animations -- 8.9 Key Terms, Review Questions, and Problems -- Part 4 Scheduling -- Chapter 9 Uniprocessor Scheduling -- 9.1 Types of Processor Scheduling -- 9.2 Scheduling Algorithms -- 9.3 Traditional UNIX Scheduling -- 9.4 Summary -- 9.5 Recommended Reading and Animations -- 9.6 Key Terms, Review Questions, and Problems. Chapter 10 Multiprocessor, Multicore, and Real-Time -- 10.1 Multiprocessor and Multicore Scheduling -- 10.2 Real-Time Scheduling -- 10.3 Linux Scheduling -- 10.4 UNIX SVR4 Scheduling -- 10.5 UNIX FreeBSD Scheduling -- 10.6 Windows Scheduling -- 10.7 Summary -- 10.8 Recommended Reading -- 10.9 Key Terms, Review Questions, and Problems -- Part 5 Input/Output and Files -- Chapter 11 I/O Management and Disk Scheduling -- 11.1 I/O Devices -- 11.2 Organization of the I/O Function -- 11.3 Operating System Design Issues -- 11.4 I/O Buffering -- 11.5 Disk Scheduling -- 11.6 RAID -- 11.7 Disk Cache -- 11.8 UNIX SVR4 I/O -- 11.9 Linux I/O -- 11.10 Windows I/O -- 11.11 Summary -- 11.12 Recommended Reading and Animations -- 11.13 Key Terms, Review Questions, and Problems -- Chapter 12 File Management -- 12.1 Overview -- 12.2 File Organization and Access -- 12.3 B-Trees -- 12.4 File Directories -- 12.5 File Sharing -- 12.6 Record Blocking -- 12.7 Secondary Storage Management -- 12.8 UNIX File Management -- 12.9 Linux Virtual File System -- 12.10 Windows File System -- 12.11 Android File Management -- 12.12 Summary -- 12.13 Recommended Reading -- 12.14 Key Terms, Review Questions, and Problems -- Part 6 Embedded Systems -- Chapter 13 Embedded Operating Systems -- 13.1 Embedded Systems -- 13.2 Characteristics of Embedded Operating Systems -- 13.3 Embedded Linux -- 13.4 TinyOS -- 13.5 Recommended Reading -- 13.6 Key Terms, Review Questions, and Problems -- Chapter 14 Virtual Machines -- 14.1 Approaches to Virtualization -- 14.2 Processor Issues -- 14.3 Memory Management -- 14.4 I/O Management -- 14.5 VMware ESXi -- 14.6 Microsoft Hyper-V and Xen Variants -- 14.7 Java VM -- 14.8 Linux VServer Virtual Machine Architecture -- 14.9 Android Virtual Machine -- 14.10 Summary -- 14.11 Recommended Reading -- 14.12 Key Terms, Review Questions, and Problems. Chapter 15 Operating System Security -- 15.1 Intruders and Malicious Software -- 15.2 Buffer Overflow -- 15.3 Access Control -- 15.4 UNIX Access Control -- 15.5 Operating Systems Hardening -- 15.6 Security Maintenance -- 15.7 Windows Security -- 15.8 Summary -- 15.9 Recommended Reading -- 15.10 Key Terms, Review Questions, and Problems -- Chapter 16 Distributed Processing, Client/Server, and Clusters -- 16.1 Client/Server Computing -- 16.2 Distributed Message Passing -- 16.3 Remote Procedure Calls -- 16.4 Clusters -- 16.5 Windows Cluster Server -- 16.6 Beowulf and Linux Clusters -- 16.7 Summary -- 16.8 Recommended Reading -- 16.9 Key Terms, Review Questions, and Problems -- Appendix A Topics in Concurrency -- Appendix B Programming and Operating System Projects -- References -- Credits -- Index. |
Record Nr. | UNINA-9910153258703321 |
Stallings William | ||
Harlow, England : , : Pearson, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Operating systems : internals and design principles / / William Stallings |
Autore | Stallings William |
Edizione | [Seventh edition, International edition /] |
Pubbl/distr/stampa | Harlow, England ; ; Boston : , : Pearson Education, , [2012] |
Descrizione fisica | 1 online resource (788 pages) : illustrations |
Disciplina | 005.43 |
Soggetto topico | Operating systems (Computers) |
ISBN | 1-4479-3014-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Operating Systems -- Contents -- Online Resources -- Preface -- About the Author -- Reader's and Instructor's Guide -- Outline of this Book -- Example Systems -- A Roadmap for Readers and Instructors -- Internet and Web Resources -- Part 1 Background -- Computer System Overview -- Basic Elements -- Evolution of the Microprocessor -- Instruction Execution -- Interrupts -- The Memory Hierarchy -- Cache Memory -- Direct Memory Access -- Multiprocessor and Multicore Organization -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix 1A Performance Characteristics of Two-level Memories -- Operating System Overview -- Operating System Objectives and Functions -- The Evolution of Operating Systems -- Major Achievements -- Developments Leading to Modern Operating Systems -- Virtual Machines -- OS Design Considerations for Multiprocessor and Multicore -- Microsoft Windows Overview -- Traditional UNIX Systems -- Modern UNIX Systems -- Linux -- Linux Vserver Virtual Machine Architecture -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 2 Processes -- Process Description and Control -- What Is a Process? -- Process States -- Process Description -- Process Control -- Execution of the Operating System -- Security Issues -- UNIX SVR4 Process Management -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Threads -- Processes and Threads -- Types of Threads -- Multicore and Multithreading -- Windows 7 Thread and SMP Management -- Solaris Thread and SMP Management -- Linux Process and Thread Management -- Mac OS X Grand Central Dispatch -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Mutual Exclusion and Synchronization -- Principles of Concurrency -- Mutual Exclusion: Hardware Support -- Semaphores.
Monitors -- Message Passing -- Readers/Writers Problem -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Deadlock and Starvation -- Principles of Deadlock -- Deadlock Prevention -- Deadlock Avoidance -- Deadlock Detection -- An Integrated Deadlock Strategy -- Dining Philosophers Problem -- UNIX Concurrency Mechanisms -- Linux Kernel Concurrency Mechanisms -- Solaris Thread Synchronization Primitives -- Windows 7 Concurrency Mechanisms -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 3 Memory -- Memory Management -- Memory Management Requirements -- Memory Partitioning -- Paging -- Segmentation -- Security Issues -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Appendix 7A Loading and Linking -- Virtual Memory -- Hardware and Control Structures -- Operating System Software -- UNIX and Solaris Memory Management -- Linux Memory Management -- Windows Memory Management -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 4 Scheduling -- Uniprocessor Scheduling -- Types of Processor Scheduling -- Scheduling Algorithms -- Traditional UNIX Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Multiprocessor and Real-Time Scheduling -- Multiprocessor Scheduling -- Real-time Scheduling -- Linux Scheduling -- UNIX SVR4 Scheduling -- UNIX FreeBSD Scheduling -- Windows Scheduling -- Linux Virtual Machine Process Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 5 Input/Output and Files -- I/O Management and Disk Scheduling -- I/O Devices -- Organization of the I/O Function -- Operating System Design Issues -- I/O Buffering -- Disk Scheduling -- RAID -- Disk Cache -- UNIX SVR4 I/O -- Linux I/O -- Windows I/O. Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- File Management -- Overview -- File Organization and Access -- B-Trees -- File Directories -- File Sharing -- Record Blocking -- Secondary Storage Management -- File System Security -- UNIX File Management -- Linux Virtual File System -- Windows File System -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 6 Embedded Systems -- Embedded Operating Systems -- Embedded Systems -- Characteristics of Embedded Operating Systems -- eCos -- TinyOS -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 7 Computer Security -- Computer Security Threats -- Computer Security Concepts -- Threats, Attacks, and Assets -- Intruders -- Malicious Software Overview -- Viruses, Worms, and Bots -- Rootkits -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Computer Security Techniques -- Authentication -- Access Control -- Intrusion Detection -- Malware Defense -- Dealing with Buffer Overflow Attacks -- Windows 7 Security -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 8 Distributed Systems -- Distributed Processing, Client/Server, and Clusters -- Client/Server Computing -- Service-Oriented Architecture -- Distributed Message Passing -- Remote Procedure Calls -- Clusters -- Windows Cluster Server -- Beowulf and Linux Clusters -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix A Topics in Concurrency -- Mutual Exclusion: Software Approaches -- Race Conditions and Semaphores -- A Barbershop Problem -- Problems -- Appendix B Programming and Operating System Projects -- OS/161 -- Simulations -- Programming Projects -- Research Projects -- Reading/Report Assignments -- Writing Assignments. Discussion Topics -- BACI -- Glossary -- References -- Index. |
Record Nr. | UNINA-9910151651403321 |
Stallings William | ||
Harlow, England ; ; Boston : , : Pearson Education, , [2012] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Operating systems : internals and design principles / William Stallings |
Autore | Stallings, William |
Edizione | [4. edition] |
Pubbl/distr/stampa | Upple Saddle River : Prentice-Hall International, 2001c |
Descrizione fisica | XVIII, 779 p. : ill. ; 24 cm |
Disciplina | 005.43 |
Soggetto non controllato | Elaboratori elettroniciSistemi operativi |
ISBN | 0-13-032986-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNIPARTHENOPE-000004365 |
Stallings, William | ||
Upple Saddle River : Prentice-Hall International, 2001c | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Parthenope | ||
|
Operating systems : internals and design principles / Andrew S. Tanenbaum |
Autore | STALLINGS, William |
Pubbl/distr/stampa | New Jersey : Prentice-Hall, copyr. 2001 |
Descrizione fisica | XVIII, 779 p. : ill. ; 24 cm |
Disciplina | 004.22 |
Soggetto non controllato | Sistemi operativi - Progettazione |
ISBN | 0-13-031999-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000726770203316 |
STALLINGS, William | ||
New Jersey : Prentice-Hall, copyr. 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Operating systems : internals and design principles / William Stallings |
Autore | Stallings, William |
Edizione | [4. ed] |
Pubbl/distr/stampa | Upper Saddle River (NJ), : Prentice Hall, c2001 |
Descrizione fisica | XVIII, 779 p. : ill. ; 24 cm |
Disciplina |
005.4
005.43 |
Collana | Prentice-Hall international editions |
Soggetto topico | Sistemi operativi |
ISBN | 013032986X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISANNIO-RMS0155948 |
Stallings, William | ||
Upper Saddle River (NJ), : Prentice Hall, c2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. del Sannio | ||
|