Books: 7

Theory

CoverTitleYear
2015
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical more » concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book. * Covers digital forensic investigations of the three major operating systems, including Windows, Linux, and Mac OS * Presents the technical details of each operating system, allowing users to find artifacts that might be missed using automated tools * Hands-on exercises drive home key concepts covered in the book. * Includes discussions of cloud, Internet, and major mobile operating systems such as Android and iOS « less
2015
Over the past two decades, there has been a huge amount of innovation in both the principles and practice of operating systems Over the same period, the core ideas in a modern operating system - protection, concurrency, virtualization, resource allocation, and reliable storage - have become widely applied more » throughout computer science. Whether you get a job at Facebook, Google, Microsoft, or any other leading-edge technology company, it is impossible to build resilient, secure, and flexible computer systems without the ability to apply operating systems concepts in a variety of settings. This book examines the both the principles and practice of modern operating systems, taking important, high-level concepts all the way down to the level of working code. Because operating systems concepts are among the most difficult in computer science, this top to bottom approach is the only way to really understand and master this important material. « less
2012
This revised and updated Second Edition presents a practical introduction to operating systems and illustrates these principles through a hands-on approach using accompanying simulation models developed in Java and C++. This text is appropriate for upper-level undergraduate courses in computer science. more » Case studies throughout the text feature the implementation of Java and C++ simulation models, giving students a thorough look at both the theoretical and the practical concepts discussed in modern OS courses. This pedagogical approach is designed to present a clearer, more practical look at OS concepts, techniques, and methods without sacrificing the theoretical rigor that is necessary at this level. It is an ideal choice for those interested in gaining comprehensive, hands-on experience using the modern techniques and methods necessary for working with these complex systems. Every new printed copy is accompanied with a CD-ROM containing simulations (eBook version does not include CD-ROM). New material added to the Second Edition: - Chapter 11 (Security) has been revised to include the most up-to-date information - Chapter 12 (Firewalls and Network Security) has been updated to include material on middleware that allows applications on separate machines to communicate (e.g. RMI, COM+, and Object Broker) - Includes a new chapter dedicated to Virtual Machines - Provides introductions to various types of scams - Updated to include information on Windows 7 and Mac OS X throughout the text - Contains new material on basic hardware architecture that operating systems depend on - Includes new material on handling multi-core CPU Instructor Resources: -Answers to the end of chapter questions -PowerPoint Lecture Outlines « less
2011
Includes hands-on activities for students for building a foundation for IT success through a fundamental understanding of desktop operating systems, including Windows 7, Mac OS X, and Linux.
2011
Now in its Sixth Edition, UNDERSTANDING OPERATING SYSTEMS continues to provide a clear and straightforward explanation of operating theory and practice. As in previous editions, the book's highly-regarded structure begins with a discussion of fundamentals before moving on to specific operating systems. more » This edition has been updated and modernized; now included are enhanced discussions of the latest innovation evolutions (multi-core processing, wireless technologies, PDA and telephone operating systems, and Blu-ray optical storage) and how they affect operating systems. Revised Research Topics in the exercise section encourage independent research among students. Content in the final four chapters has been updated to include information about a few of the latest versions of UNIX (including specific mention of the latest Macintosh OS), Linux, and Windows « less
2010
The award-winning team of Abraham Silberschatz, Peter Galvin, and Greg Gagne gets system administrators right up to speed on all the key concepts of computer operating systems. This new edition gives them a thorough theoretical foundation that they can apply to a wide variety of systems as they progress more » to the next level of their computer work. It presents several new Java example programs including features in Java 7. Increased coverage is offered on user perspective, OS design, security, and distributed programming. New exercises are also provided to reinforce the concepts and enable system administrators to design with confidence. « less
2009