top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Network security essentials : applications and standards / / William Stallings ; contributions by B. R. Chandavarkar
Network security essentials : applications and standards / / William Stallings ; contributions by B. R. Chandavarkar
Autore Stallings William
Edizione [Fifth edition, international edition.]
Pubbl/distr/stampa Boston, [Massachusetts] : , : Pearson, , 2014
Descrizione fisica 1 online resource (447 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer networks - Security measures
Computer security
ISBN 0-273-79380-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Contents -- Online Resources -- Preface -- About the Author -- Chapter 1 Introduction -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network Security -- 1.7 Standards -- 1.8 Outline of This Book -- 1.9 Recommended Reading -- 1.10 Internet and Web Resources -- 1.11 Key Terms, Review Questions, and Problems -- PART ONE: CRYPTOGRAPHY -- Chapter 2 Symmetric Encryption and Message Confidentiality -- 2.1 Symmetric Encryption Principles -- 2.2 Symmetric Block Encryption Algorithms -- 2.3 Random and Pseudorandom Numbers -- 2.4 Stream Ciphers and RC4 -- 2.5 Cipher Block Modes of Operation -- 2.6 Recommended Reading -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Public-Key Cryptography and Message Authentication -- 3.1 Approaches to Message Authentication -- 3.2 Secure Hash Functions -- 3.3 Message Authentication Codes -- 3.4 Public-Key Cryptography Principles -- 3.5 Public-Key Cryptography Algorithms -- 3.6 Digital Signatures -- 3.7 Recommended Reading -- 3.8 Key Terms, Review Questions, and Problems -- PART TWO: NETWORK SECURITY APPLICATIONS -- Chapter 4 Key Distribution and User Authentication -- 4.1 Symmetric Key Distribution Using Symmetric Encryption -- 4.2 Kerberos -- 4.3 Key Distribution Using Asymmetric Encryption -- 4.4 X.509 Certificates -- 4.5 Public-Key Infrastructure -- 4.6 Federated Identity Management -- 4.7 Recommended Reading -- 4.8 Key Terms, Review Questions, and Problems -- Chapter 5 Network Access Control and Cloud Security -- 5.1 Network Access Control -- 5.2 Extensible Authentication Protocol -- 5.3 IEEE 802.1X Port-Based Network Access Control -- 5.4 Cloud Computing -- 5.5 Cloud Security Risks and Countermeasures -- 5.6 Data Protection in the Cloud -- 5.7 Cloud Security as a Service.
5.8 Recommended Reading -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Transport-Level Security -- 6.1 Web Security Considerations -- 6.2 Secure Sockets Layer (SSL) -- 6.3 Transport Layer Security (TLS) -- 6.4 HTTPS -- 6.5 Secure Shell (SSH) -- 6.6 Recommended Reading -- 6.7 Key Terms, Review Questions, and Problems -- Chapter 7 Wireless Network Security -- 7.1 Wireless Security -- 7.2 Mobile Device Security -- 7.3 IEEE 802.11 Wireless LAN Overview -- 7.4 IEEE 802.11i Wireless LAN Security -- 7.5 Recommended Reading -- 7.6 Key Terms, Review Questions, and Problems -- Chapter 8 Electronic Mail Security -- 8.1 Pretty Good Privacy (PGP) -- 8.2 S/MIME -- 8.3 DomainKeys Identified Mail (DKIM) -- 8.4 Recommended Reading -- 8.5 Key Terms, Review Questions, and Problems -- Chapter 9 IP Security -- 9.1 IP Security Overview -- 9.2 IP Security Policy -- 9.3 Encapsulating Security Payload -- 9.4 Combining Security Associations -- 9.5 Internet Key Exchange -- 9.6 Cryptographic Suites -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- PART THREE: SYSTEM SECURITY -- Chapter 10 Malicious Software -- 10.1 Types of Malicious Software (Malware) -- 10.2 Propagation-Infected Content-Viruses -- 10.3 Propagation-Vulnerability Exploit-Worms -- 10.4 Propagation-Social Engineering-SPAM E-mail, Trojans -- 10.5 Payload-System Corruption -- 10.6 Payload-Attack Agent-Zombie, Bots -- 10.7 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 10.8 Payload-Stealthing-Backdoors, Rootkits -- 10.9 Countermeasures -- 10.10 Distributed Denial of Service Attacks -- 10.11 Recommended Reading -- 10.12 Key Terms, Review Questions, and Problems -- Chapter 11 Intruders -- 11.1 Intruders -- 11.2 Intrusion Detection -- 11.3 Password Management -- 11.4 Recommended Reading -- 11.5 Key Terms, Review Questions, and Problems -- Chapter 12 Firewalls.
12.1 The Need for Firewalls -- 12.2 Firewall Characteristics -- 12.3 Types of Firewalls -- 12.4 Firewall Basing -- 12.5 Firewall Location and Configurations -- 12.6 Recommended Reading -- 12.7 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A: Some Aspects of Number Theory -- A.1 Prime and Relatively Prime Numbers -- A.2 Modular Arithmetic -- Appendix B: Projects for Teaching Network Security -- B.1 Research Projects -- B.2 Hacking Project -- B.3 Programming Projects -- B.4 Laboratory Exercises -- B.5 Practical Security Assessments -- B.6 Firewall Projects -- B.7 Case Studies -- B.8 Writing Assignments -- B.9 Reading/Report Assignments -- References -- Credits -- Index.
Record Nr. UNINA-9910151655103321
Stallings William  
Boston, [Massachusetts] : , : Pearson, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network security essentials : applications and standards / William Stallings
Network security essentials : applications and standards / William Stallings
Autore Stallings, William
Edizione [3rd ed.]
Pubbl/distr/stampa Upper Saddle River : Pearson Education, c2007
Descrizione fisica xvi, 413 p. : ill. ; 24 cm
Disciplina 005.8
Soggetto non controllato Reti di computer
Sistemi di sicurezza
Crittografia
ISBN 0-13-238033-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-990008475170403321
Stallings, William  
Upper Saddle River : Pearson Education, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network security essentials : applications and standards / William Stallings
Network security essentials : applications and standards / William Stallings
Autore Stallings, William
Pubbl/distr/stampa Upper Saddle River [N.J.] : Prentice Hall, c2000
Descrizione fisica xiii, 366 p. : ill. ; 24 cm
Disciplina 005.8
Soggetto non controllato Reti di computer
Sistemi di sicurezza
Crittografia
ISBN 0-13-016093-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-990001493910403321
Stallings, William  
Upper Saddle River [N.J.] : Prentice Hall, c2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Networking standards : a guide to OSI, ISDN, LAN, and MANstandards / William Stallings
Networking standards : a guide to OSI, ISDN, LAN, and MANstandards / William Stallings
Autore STALLINGS, William
Pubbl/distr/stampa Reading (Mass.) [etc.] : Addison-Wesley, copyr. 1993
Disciplina 004.62
Soggetto topico Reti di elaboratori - Programmazione
Sistemi di trasmissione dati
ISBN 0-201-56357-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990000164480203316
STALLINGS, William  
Reading (Mass.) [etc.] : Addison-Wesley, copyr. 1993
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Operating systems : internal and design principles / William Stallings
Operating systems : internal and design principles / William Stallings
Autore Stallings, William
Edizione [9th ed.]
Pubbl/distr/stampa England : Pearson, 2018
Descrizione fisica 732 p. : ill. ; 23 cm
Disciplina 005.4
Soggetto non controllato Sistemi operativi
ISBN 978-1-292-21429-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910284736103321
Stallings, William  
England : Pearson, 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Operating systems : internals and design principles / / William Stallings
Operating systems : internals and design principles / / William Stallings
Autore Stallings William
Edizione [Eighth edition, Global edition.]
Pubbl/distr/stampa Harlow, England : , : Pearson, , 2014
Descrizione fisica 1 online resource (804 pages)
Disciplina 005.43
Collana Always Learning
Soggetto topico Operating systems (Computers)
ISBN 1292061944 (ebk.)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Contents -- Online Resources -- VideoNotes -- Preface -- About the Author -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of this Book -- 0.2 Example Systems -- 0.3 A Roadmap for Readers and Instructors -- 0.4 Internet and Web Resources -- Part 1 Background -- Chapter 1 Computer System Overview -- 1.1 Basic Elements -- 1.2 Evolution of the Microprocessor -- 1.3 Instruction Execution -- 1.4 Interrupts -- 1.5 The Memory Hierarchy -- 1.6 Cache Memory -- 1.7 Direct Memory Access -- 1.8 Multiprocessor and Multicore Organization -- 1.9 Recommended Reading -- 1.10 Key Terms, Review Questions, and Problems -- 1A Performance Characteristics of Two-Level -- Chapter 2 Operating System Overview -- 2.1 Operating System Objectives and Functions -- 2.2 The Evolution of Operating Systems -- 2.3 Major Achievements -- 2.4 Developments Leading to Modern Operating Systems -- 2.5 Fault Tolerance -- 2.6 OS Design Considerations for Multiprocessor and Multicore -- 2.7 Microsoft Windows Overview -- 2.8 Traditional UNIX Systems -- 2.9 Modern UNIX Systems -- 2.10 Linux -- 2.11 Android -- 2.12 Recommended Reading and Animations -- 2.13 Key Terms, Review Questions, and Problems -- Part 2 Processes -- Chapter 3 Process Description and Control -- 3.1 What Is a Process? -- 3.2 Process States -- 3.3 Process Description -- 3.4 Process Control -- 3.5 Execution of the Operating System -- 3.6 UNIX SVR4 Process Management -- 3.7 Summary -- 3.8 Recommended Reading and Animations -- 3.9 Key Terms, Review Questions, and Problems -- Chapter 4 Threads -- 4.1 Processes and Threads -- 4.2 Types of Threads -- 4.3 Multicore and Multithreading -- 4.4 Windows 8 Process and Thread Management -- 4.5 Solaris Thread and SMP Management -- 4.6 Linux Process and Thread Management -- 4.7 Android Process and Thread Management -- 4.8 Mac OS X Grand Central Dispatch.
4.9 Summary -- 4.10 Recommended Reading -- 4.11 Key Terms, Review Questions, and Problems -- Chapter 5 Concurrency: Mutual Exclusion -- 5.1 Principles of Concurrency -- 5.2 Mutual Exclusion: Hardware Support -- 5.3 Semaphores -- 5.4 Monitors -- 5.5 Message Passing -- 5.6 Readers/Writers Problem -- 5.7 Summary -- 5.8 Recommended Reading and Animations -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Concurrency: Deadlock and Starvation -- 6.1 Principles of Deadlock -- 6.2 Deadlock Prevention -- 6.3 Deadlock Avoidance -- 6.4 Deadlock Detection -- 6.5 An Integrated Deadlock Strategy -- 6.6 Dining Philosophers Problem -- 6.7 UNIX Concurrency Mechanisms -- 6.8 Linux Kernel Concurrency Mechanisms -- 6.9 Solaris Thread Synchronization Primitives -- 6.10 Windows 7 Concurrency Mechanisms -- 6.11 Android Interprocess Communication -- 6.12 Summary -- 6.13 Recommended Reading and Animations -- 6.14 Key Terms, Review Questions, and Problems -- Part 3 Memory -- Chapter 7 Memory Management -- 7.1 Memory Management Requirements -- 7.2 Memory Partitioning -- 7.3 Paging -- 7.4 Segmentation -- 7.5 Summary -- 7.6 Recommended Reading and Animations -- 7.7 Key Terms, Review Questions, and Problems -- 7A Loading and Linking -- Chapter 8 Virtual Memory -- 8.1 Hardware and Control Structures -- 8.2 Operating System Software -- 8.3 UNIX and Solaris Memory Management -- 8.4 Linux Memory Management -- 8.5 Windows Memory Management -- 8.6 Android Memory Management -- 8.7 Summary -- 8.8 Recommended Reading and Animations -- 8.9 Key Terms, Review Questions, and Problems -- Part 4 Scheduling -- Chapter 9 Uniprocessor Scheduling -- 9.1 Types of Processor Scheduling -- 9.2 Scheduling Algorithms -- 9.3 Traditional UNIX Scheduling -- 9.4 Summary -- 9.5 Recommended Reading and Animations -- 9.6 Key Terms, Review Questions, and Problems.
Chapter 10 Multiprocessor, Multicore, and Real-Time -- 10.1 Multiprocessor and Multicore Scheduling -- 10.2 Real-Time Scheduling -- 10.3 Linux Scheduling -- 10.4 UNIX SVR4 Scheduling -- 10.5 UNIX FreeBSD Scheduling -- 10.6 Windows Scheduling -- 10.7 Summary -- 10.8 Recommended Reading -- 10.9 Key Terms, Review Questions, and Problems -- Part 5 Input/Output and Files -- Chapter 11 I/O Management and Disk Scheduling -- 11.1 I/O Devices -- 11.2 Organization of the I/O Function -- 11.3 Operating System Design Issues -- 11.4 I/O Buffering -- 11.5 Disk Scheduling -- 11.6 RAID -- 11.7 Disk Cache -- 11.8 UNIX SVR4 I/O -- 11.9 Linux I/O -- 11.10 Windows I/O -- 11.11 Summary -- 11.12 Recommended Reading and Animations -- 11.13 Key Terms, Review Questions, and Problems -- Chapter 12 File Management -- 12.1 Overview -- 12.2 File Organization and Access -- 12.3 B-Trees -- 12.4 File Directories -- 12.5 File Sharing -- 12.6 Record Blocking -- 12.7 Secondary Storage Management -- 12.8 UNIX File Management -- 12.9 Linux Virtual File System -- 12.10 Windows File System -- 12.11 Android File Management -- 12.12 Summary -- 12.13 Recommended Reading -- 12.14 Key Terms, Review Questions, and Problems -- Part 6 Embedded Systems -- Chapter 13 Embedded Operating Systems -- 13.1 Embedded Systems -- 13.2 Characteristics of Embedded Operating Systems -- 13.3 Embedded Linux -- 13.4 TinyOS -- 13.5 Recommended Reading -- 13.6 Key Terms, Review Questions, and Problems -- Chapter 14 Virtual Machines -- 14.1 Approaches to Virtualization -- 14.2 Processor Issues -- 14.3 Memory Management -- 14.4 I/O Management -- 14.5 VMware ESXi -- 14.6 Microsoft Hyper-V and Xen Variants -- 14.7 Java VM -- 14.8 Linux VServer Virtual Machine Architecture -- 14.9 Android Virtual Machine -- 14.10 Summary -- 14.11 Recommended Reading -- 14.12 Key Terms, Review Questions, and Problems.
Chapter 15 Operating System Security -- 15.1 Intruders and Malicious Software -- 15.2 Buffer Overflow -- 15.3 Access Control -- 15.4 UNIX Access Control -- 15.5 Operating Systems Hardening -- 15.6 Security Maintenance -- 15.7 Windows Security -- 15.8 Summary -- 15.9 Recommended Reading -- 15.10 Key Terms, Review Questions, and Problems -- Chapter 16 Distributed Processing, Client/Server, and Clusters -- 16.1 Client/Server Computing -- 16.2 Distributed Message Passing -- 16.3 Remote Procedure Calls -- 16.4 Clusters -- 16.5 Windows Cluster Server -- 16.6 Beowulf and Linux Clusters -- 16.7 Summary -- 16.8 Recommended Reading -- 16.9 Key Terms, Review Questions, and Problems -- Appendix A Topics in Concurrency -- Appendix B Programming and Operating System Projects -- References -- Credits -- Index.
Record Nr. UNINA-9910153258703321
Stallings William  
Harlow, England : , : Pearson, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Operating systems : internals and design principles / / William Stallings
Operating systems : internals and design principles / / William Stallings
Autore Stallings William
Edizione [Seventh edition, International edition /]
Pubbl/distr/stampa Harlow, England ; ; Boston : , : Pearson Education, , [2012]
Descrizione fisica 1 online resource (788 pages) : illustrations
Disciplina 005.43
Soggetto topico Operating systems (Computers)
ISBN 1-4479-3014-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Operating Systems -- Contents -- Online Resources -- Preface -- About the Author -- Reader's and Instructor's Guide -- Outline of this Book -- Example Systems -- A Roadmap for Readers and Instructors -- Internet and Web Resources -- Part 1 Background -- Computer System Overview -- Basic Elements -- Evolution of the Microprocessor -- Instruction Execution -- Interrupts -- The Memory Hierarchy -- Cache Memory -- Direct Memory Access -- Multiprocessor and Multicore Organization -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix 1A Performance Characteristics of Two-level Memories -- Operating System Overview -- Operating System Objectives and Functions -- The Evolution of Operating Systems -- Major Achievements -- Developments Leading to Modern Operating Systems -- Virtual Machines -- OS Design Considerations for Multiprocessor and Multicore -- Microsoft Windows Overview -- Traditional UNIX Systems -- Modern UNIX Systems -- Linux -- Linux Vserver Virtual Machine Architecture -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 2 Processes -- Process Description and Control -- What Is a Process? -- Process States -- Process Description -- Process Control -- Execution of the Operating System -- Security Issues -- UNIX SVR4 Process Management -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Threads -- Processes and Threads -- Types of Threads -- Multicore and Multithreading -- Windows 7 Thread and SMP Management -- Solaris Thread and SMP Management -- Linux Process and Thread Management -- Mac OS X Grand Central Dispatch -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Mutual Exclusion and Synchronization -- Principles of Concurrency -- Mutual Exclusion: Hardware Support -- Semaphores.
Monitors -- Message Passing -- Readers/Writers Problem -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Concurrency: Deadlock and Starvation -- Principles of Deadlock -- Deadlock Prevention -- Deadlock Avoidance -- Deadlock Detection -- An Integrated Deadlock Strategy -- Dining Philosophers Problem -- UNIX Concurrency Mechanisms -- Linux Kernel Concurrency Mechanisms -- Solaris Thread Synchronization Primitives -- Windows 7 Concurrency Mechanisms -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 3 Memory -- Memory Management -- Memory Management Requirements -- Memory Partitioning -- Paging -- Segmentation -- Security Issues -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Appendix 7A Loading and Linking -- Virtual Memory -- Hardware and Control Structures -- Operating System Software -- UNIX and Solaris Memory Management -- Linux Memory Management -- Windows Memory Management -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 4 Scheduling -- Uniprocessor Scheduling -- Types of Processor Scheduling -- Scheduling Algorithms -- Traditional UNIX Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Multiprocessor and Real-Time Scheduling -- Multiprocessor Scheduling -- Real-time Scheduling -- Linux Scheduling -- UNIX SVR4 Scheduling -- UNIX FreeBSD Scheduling -- Windows Scheduling -- Linux Virtual Machine Process Scheduling -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 5 Input/Output and Files -- I/O Management and Disk Scheduling -- I/O Devices -- Organization of the I/O Function -- Operating System Design Issues -- I/O Buffering -- Disk Scheduling -- RAID -- Disk Cache -- UNIX SVR4 I/O -- Linux I/O -- Windows I/O.
Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- File Management -- Overview -- File Organization and Access -- B-Trees -- File Directories -- File Sharing -- Record Blocking -- Secondary Storage Management -- File System Security -- UNIX File Management -- Linux Virtual File System -- Windows File System -- Summary -- Recommended Reading -- Key Terms, Review Questions, and Problems -- Part 6 Embedded Systems -- Embedded Operating Systems -- Embedded Systems -- Characteristics of Embedded Operating Systems -- eCos -- TinyOS -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 7 Computer Security -- Computer Security Threats -- Computer Security Concepts -- Threats, Attacks, and Assets -- Intruders -- Malicious Software Overview -- Viruses, Worms, and Bots -- Rootkits -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Computer Security Techniques -- Authentication -- Access Control -- Intrusion Detection -- Malware Defense -- Dealing with Buffer Overflow Attacks -- Windows 7 Security -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Part 8 Distributed Systems -- Distributed Processing, Client/Server, and Clusters -- Client/Server Computing -- Service-Oriented Architecture -- Distributed Message Passing -- Remote Procedure Calls -- Clusters -- Windows Cluster Server -- Beowulf and Linux Clusters -- Summary -- Recommended Reading and Web Sites -- Key Terms, Review Questions, and Problems -- Appendix A Topics in Concurrency -- Mutual Exclusion: Software Approaches -- Race Conditions and Semaphores -- A Barbershop Problem -- Problems -- Appendix B Programming and Operating System Projects -- OS/161 -- Simulations -- Programming Projects -- Research Projects -- Reading/Report Assignments -- Writing Assignments.
Discussion Topics -- BACI -- Glossary -- References -- Index.
Record Nr. UNINA-9910151651403321
Stallings William  
Harlow, England ; ; Boston : , : Pearson Education, , [2012]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Operating systems : internals and design principles / William Stallings
Operating systems : internals and design principles / William Stallings
Autore Stallings, William
Edizione [4. edition]
Pubbl/distr/stampa Upple Saddle River : Prentice-Hall International, 2001c
Descrizione fisica XVIII, 779 p. : ill. ; 24 cm
Disciplina 005.43
Soggetto non controllato Elaboratori elettroniciSistemi operativi
ISBN 0-13-032986-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNIPARTHENOPE-000004365
Stallings, William  
Upple Saddle River : Prentice-Hall International, 2001c
Materiale a stampa
Lo trovi qui: Univ. Parthenope
Opac: Controlla la disponibilità qui
Operating systems : internals and design principles / Andrew S. Tanenbaum
Operating systems : internals and design principles / Andrew S. Tanenbaum
Autore STALLINGS, William
Pubbl/distr/stampa New Jersey : Prentice-Hall, copyr. 2001
Descrizione fisica XVIII, 779 p. : ill. ; 24 cm
Disciplina 004.22
Soggetto non controllato Sistemi operativi - Progettazione
ISBN 0-13-031999-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990000726770203316
STALLINGS, William  
New Jersey : Prentice-Hall, copyr. 2001
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Operating systems : internals and design principles / William Stallings
Operating systems : internals and design principles / William Stallings
Autore Stallings, William
Edizione [4. ed]
Pubbl/distr/stampa Upper Saddle River (NJ), : Prentice Hall, c2001
Descrizione fisica XVIII, 779 p. : ill. ; 24 cm
Disciplina 005.4
005.43
Collana Prentice-Hall international editions
Soggetto topico Sistemi operativi
ISBN 013032986X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISANNIO-RMS0155948
Stallings, William  
Upper Saddle River (NJ), : Prentice Hall, c2001
Materiale a stampa
Lo trovi qui: Univ. del Sannio
Opac: Controlla la disponibilità qui