User:Zarzuelazen/Books/Reality Theory: Operating Systems&Architecture

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Gestionnaire de mémoire.png
This user book is a user-generated collection of Wikipedia articles that can be easily saved, rendered electronically, and ordered as a printed book. If you are the creator of this book and need help, see Help:Books (general tips) and WikiProject Wikipedia-Books (questions and assistance).

Edit this book: Book Creator · Wikitext
Select format to download:

PDF (A4) · PDF (Letter)

Order a printed copy from these publishers: PediaPress
About ] [ Advanced ] [ FAQ ] [ Feedback ] [ Help ] [ WikiProject ] Recent Changes ]


Reality Theory: Operating Systems&Architecture[edit]

Abstract syntax tree
Access control
Access control list
Access token
Adaptive optimization
Address space
Addressing mode
Adware
Ahead-of-time compilation
Ambient authority
Amdahl's law
Android (operating system)
Anomaly-based intrusion detection system
Antivirus software
Application binary interface
Arabic numerals
Arithmetic logic unit
ASCII
Assembly language
Asynchronous I/O
Authentication
Authorization
Backdoor (computing)
Barrier (computer science)
Basic block
Batch processing
Baudot code
Binary file
Binary number
BIOS
Bit field
Bit numbering
Bit-level parallelism
Bitwise operation
Blocking (computing)
Blue Screen of Death
Booting
Bootstrapping (compilers)
Branch (computer science)
Branch predictor
Branch table
Bubble (computing)
Buffer over-read
Buffer overflow
Buffer overflow protection
Busy waiting
Bytecode
Cache (computing)
Cache coherence
Call stack
Calling convention
Capability-based operating system
Capability-based security
CCSID
Central processing unit
Channel (programming)
Character encoding
Chrome OS
Classic RISC pipeline
Clustered file system
Code generation (compiler)
Code injection
Code page
Code point
Command-line interface
Comparison of instruction set architectures
Compile time
Compiler
Complex instruction set computer
Computer architecture
Computer code
Computer file
Computer multitasking
Computer security
Computer virus
Computer worm
Concurrency (computer science)
Concurrent computing
Configuration file
Confused deputy problem
Context (computing)
Context switch
Control character
Control flow analysis
Control flow graph
Control register
Control unit
Cooperative multitasking
Copy-on-write
Core dump
Coscheduling
CPU cache
CPU modes
CPU time
CPU-bound
Crash (computing)
Critical section
Cross compiler
Cycles per instruction
Daemon (computing)
Dangling pointer
Data
Data buffer
Data dependency
Data parallelism
Data-flow analysis
Deadlock
Decimal
Decompiler
Delay slot
Demand paging
Device driver
Device file
Directory (computing)
Directory structure
Disassembler
Discretionary access control
Disk partitioning
Distributed memory
Distributed operating system
DLL Hell
Dominator (graph theory)
Dynamic linker
Dynamic recompilation
Dynamic-link library
Earliest deadline first scheduling
EBCDIC
Embedded operating system
Endianness
Environment variable
Executable
Executable space protection
Execution (computing)
Execution model
Exokernel
Explicitly parallel instruction computing
Exploit (computer security)
Extended ASCII
Extended basic block
Extended file attributes
Extended Unix Code
Fiber (computer science)
FIFO (computing and electronics)
File attribute
File descriptor
File format
File manager
File sequence
File system
File system permissions
Filename
Filename extension
Filter (software)
Firmware
Fixed-priority pre-emptive scheduling
Floating-point unit
Flynn's taxonomy
Foreign function interface
Fork (file system)
Fork (system call)
Fragmentation (computing)
Garbage collection (computer science)
General protection fault
Graphical user interface
Hardware performance counter
Hardware register
Hardware virtualization
Hazard (computer architecture)
Heap overflow
Hexadecimal
Hindu–Arabic numeral system
Honeypot (computing)
Hooking
Hybrid kernel
Hyper-threading
Hypervisor
I/O bound
Indirect branch
Init
Inode
Inode pointer structure
Input/output
Instruction cycle
Instruction path length
Instruction pipelining
Instruction register
Instruction scheduling
Instruction selection
Instruction set architecture
Instruction window
Instruction-level parallelism
Instructions per cycle
Integer overflow
Inter-process communication
Intermediate representation
Interpreter (computing)
Interrupt
Interrupt handler
Interrupt latency
Interrupt request (PC architecture)
Intrusion detection system
IOS
Just-in-time compilation
Kernel (operating system)
Kernel panic
Keystroke logging
Lexical analysis
Library (computing)
Light-weight process
Linearizability
Link time
Linker (computing)
Linux
List of file formats
List of instruction sets
List of mathematical symbols
List of numeral systems
List of Unicode characters
Live variable analysis
Loadable kernel module
Loader (computing)
Locality of reference
Lock (computer science)
Logic bomb
Logic synthesis
Logical partition
Login
Login session
Loop optimization
Low-level programming language
Machine code
MacOS
Malware
Mandatory access control
Manual memory management
Mask (computing)
Master boot record
Memory access pattern
Memory address
Memory address register
Memory buffer register
Memory corruption
Memory debugger
Memory hierarchy
Memory leak
Memory management
Memory management (operating systems)
Memory protection
Memory safety
Memory segmentation
Memory-mapped file
Message passing
Microarchitecture
Microcode
Microkernel
Microsoft Edge
Microsoft Windows
Mobile operating system
Monolithic kernel
MS-DOS
Multi-factor authentication
Multi-pass compiler
Multi-user
Multilevel queue
Multithreading (computer architecture)
Mutual exclusion
Non-blocking algorithm
Null pointer
Numeral system
Object code
Object file
Octal
One-pass compiler
Opcode
Operand forwarding
Operating system
Operating-system-level virtualization
Optimizing compiler
Out-of-order execution
Page (computer memory)
Page fault
Page replacement algorithm
Page table
Paging
Parallel computing
Parity flag
Parsing
Path (computing)
Payload (computing)
Peephole optimization
Physical address
Pipeline (computing)
Pipeline (software)
Polling (computer science)
Portable Executable
Positional notation
POSIX
Power-on self-test
Predication (computer architecture)
Preemption (computing)
Preprocessor
Principle of least privilege
Priority inversion
Privilege (computing)
Privilege escalation
Privilege separation
Process (computing)
Process control block
Process identifier
Process management (computing)
Process migration
Process state
Processor register
Profile-guided optimization
Program counter
Programmable interrupt controller
Protected mode
Protection ring
Quarantine (computing)
Race condition
Radix
Ransomware
Reaching definition
Real mode
Real-time operating system
Reboot (computing)
Reduced instruction set computer
Reentrancy (computing)
Register allocation
Relocation (computing)
Rematerialization
Remote procedure call
Reset (computing)
Resource contention
Resource leak
Resource management (computing)
Role-based access control
Roman numerals
Root directory
Rootkit
Round-robin scheduling
Run time (program lifecycle phase)
Runlevel
Runtime library
Runtime system
Sandbox (computer security)
Scareware
Scheduling (computing)
Script (Unicode)
Security-focused operating system
Segmentation fault
Semantic analysis (compilers)
Semaphore (programming)
Shared memory
Shell (computing)
Shortest remaining time
Signal (IPC)
Simultaneous multithreading
Single user mode
Software lockout
Source code
Source-to-source compiler
Speculative execution
Spinlock
Spyware
Stack (abstract data type)
Stack buffer overflow
Stack overflow
Starvation (computer science)
Static library
Static single assignment form
Status register
Stream (computing)
Superuser
Symbol table
Symmetric multiprocessing
Synchronization (computer science)
Syntax-directed translation
System call
System programming
System resource
System software
Systems design
Task (computing)
Task parallelism
Task state segment
Temporal multithreading
Text file
Thrashing (computer science)
Thread (computing)
Thread safety
Thread-local storage
Time-sharing
Tracing just-in-time compilation
Translation lookaside buffer
Translator (computing)
Trojan horse (computing)
Unicode
Unikernel
Universal Character Set characters
Universal Coded Character Set
Unix
Unix File System
User (computing)
User identifier
User space
Very long instruction word
Virtual address space
Virtual file system
Virtual machine
Virtual memory
Virtualization
Volume (computing)
Von Neumann architecture
Vulnerability (computing)
Windows API
Windows Registry
Word (computer architecture)
Work-conserving scheduler
Working directory
Working set
X86
X86 calling conventions
Zero-day (computing)