COMP 314 Unit 4 Chapter 14 (Protection)
Goals of Protection (532)
Mechanisms differ from policies.
Mechanisms determine how something will be done.
Policies determine what will be done.
Principles of Protection
Principle of Least Privilege
Dictates that p
COMP 314 Unit 2 Chapter 7 (Deadlocks)
Most current OS do not provide deadlock-prevention facilities. (245)
A system consists of a finite number of resources to be distributed among a number of competing processes.
The resources are partitione
COMP 314 Unit 2 Chapter 4
o A thread is a basic unit of CPU utilization; it comprises a thread ID, a program counter, a register set, and a stack.
It shares with other threads belonging to the same process its code section, data section, a
COMP 314 Unit 3 Chapter 8
The CPU fetches instructions from memory according to the value of the program counter.
These instructions may cause additional loading from and storing to specific memory
A typical instruction-exe
For your convenience Apress has placed some of the front
matter material after the index. Please use the Bookmarks
and Contents at a Glance links to access them.
Contents at a Glance
About the Authorxiii
About the Tec
B GIO DC V O TO
TRNG I HC M TP. H CH MINH
CNG HA X HI CH NGHA VIT NAM
c lp T do Hnh phc
CHNG TRNH O TO
(Ban hnh km theo Quyt nh s 1239/Q-HM ngy 29 thng 09 nm 2015 ca
Trng i hc M Tp. H Ch Minh)
Tn chng trnh:
Khoa hc my tnh
Trnh o to:
Ngnh o to:
Son tho vn bn
S dng Microsoft Word
MSSV H v tn
Cc ng dng dng son tho vn bn:
Microsoft Office Word
Chc nng chnh ca Microsoft Word:
To ti liu
Kim tra li chnh t
Son tho vn bn
1. To vn bn mi (new
COMP 361 Unit 1 (Notes)
o Maintains some local buffer storage and a set of special-purpose registers. (10)
Responsible for moving the data between the peripheral devices that it controls and its local buffer
o Typically, o
COMP 314 Unit 4 Chapter 15 (Security)
The Security Problem (559)
We say that a system is secure if its resources are used and accessed as intended under all circumstances.
A threat is the potential for a security violation, whereas attack is the attempt t
COMP 314 Chapter 12 (Mass Storage Structure)
Overview of Mass-Storage Structure (451)
These provide the bulk of secondary storage for modern computer systems.
Conceptually disks are simple:
Each disk platter has a flat circular shape, like
COMP 314 Unit 3 Chapter 11 (File System Implementation)
File System Structure (411)
Disks provide the bulk of secondary storage on which a file system is maintained. They have two characteristics:
A disk can be rewritten in place.
A disk can access direct
COMP 314 Unit 3 Chapter 10 (File-System Interface)
File Concepts (374)
A file is a named collection of related information that is recorded on secondary storage.
A name is usually a string of characters, with case sensitivity varying betwe
COMP 314 Unit 3 Chapter 9 (Virtual Memory)
Virtual memory is a technique that allows the execution of a process that is not completely in memory.
Virtual memory abstracts main memory into an extremely large, uniform array of storage, separating logical me
COMP 314 Unit 2, Section 2, Chapter 6
A cooperating process is one that can affect or be affected by other processes executing in the system. (191)
o It can either directly share a logical address space (both code and data) or be allowed to share data onl
COMP 314 Unit 2, Section 2, Chapter 5
Basic Concept (153)
o Objective is to have some process running at all times to maximize the CPU utilization.
o Several processes are kept in memory at one time, and when one process has to wait (e.g. for an I/O opera
COMP 314 - Unit 2 (Notes)
Process Concepts (81)
o A process is a unit of work in a modern time-sharing system.
A batch system executes jobs.
A time-sharing system has user programs, or tasks (processes).
o The Process
A process is more than just the pro