Operating Systems Design and Implementation (3rd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

D space 2nd 3rd 4th

Daemon 2nd 3rd

Data confidentiality

Data integrity

Data loss, accidental

Data segment

DDOS attack [See Distributed Denial Of Service attack]

Deadlock 2nd

     banker's algorithm 2nd

     condition

     definition

     detection and recovery

     ostrich algorithm

     resource

     safe state

Deadlock avoidance

Deadlock handling, MINIX 3

Deadlock modeling

Deadlock prevention

Deadly embrace [See Deadlock]

Debug dump

Dedicated device

Degree of multiprogramming

Dekker's algorithm

Demand paging

Denial of service attack

Descriptor table

Design principles, security

Detection, deadlock

Device controller

Device driver 2nd 3rd 4th

     MINIX 3 2nd 3rd 4th

Device independence

Device register

Device-independent I/O, MINIX 3

Dining philosophers problem

Direct memory access

Directory 2nd 3rd

     hierarchical

     implementation

     NTFS

     UNIX

     Windows 2nd

Directory management

Directory operation

Dirty bit

Disk

     floppy 2nd 3rd

     hard

Disk arm scheduling

Disk block size

Disk block, managing free blocks

Disk hardware

Disk operating system

Disk optimization

Disk partition

Disk software

Disk space management

Diskette [See floppy disk]

Diskless workstation

Display driver, MINIX 3

Display software

Distributed denial of service attack

Distributed operating system

Distributed shared memory

Distributed system

DMA [See Direct Memory Access]

Domain, protection

DOS [See Disk Operating System]

DOS attack [See Denial of Service attack]

Double indirect block

Dump

     incremental

     logical

     physical

Категории