Principles of computer system design: an introduction
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Morgan Kaufmann
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXXIII, 526 S. Ill., graph. Darst. 24 cm |
ISBN: | 9780123749574 0123749573 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035693569 | ||
003 | DE-604 | ||
005 | 20241010 | ||
007 | t | ||
008 | 090825s2009 ad|| |||| 00||| eng d | ||
020 | |a 9780123749574 |c pbk |9 978-0-12-374957-4 | ||
020 | |a 0123749573 |c pbk |9 0-12-374957-3 | ||
035 | |a (OCoLC)436262009 | ||
035 | |a (DE-599)BSZ309729556 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-20 |a DE-824 |a DE-473 |a DE-Aug4 |a DE-706 |a DE-573 | ||
050 | 0 | |a QA76 QA76.9.S88 | |
082 | 0 | |a 005.1 |2 22 | |
084 | |a ST 150 |0 (DE-625)143594: |2 rvk | ||
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
100 | 1 | |a Saltzer, Jerome H. |d 1939- |e Verfasser |0 (DE-588)140630597 |4 aut | |
245 | 1 | 0 | |a Principles of computer system design |b an introduction |c Jerome H. Saltzer ; M. Frans Kaashoek |
264 | 1 | |a Amsterdam [u.a.] |b Morgan Kaufmann |c 2009 | |
300 | |a XXXIII, 526 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer architecture | |
650 | 4 | |a Computer organization | |
650 | 4 | |a Computer systems |x Design | |
650 | 4 | |a Software engineering | |
650 | 0 | 7 | |a Computerarchitektur |0 (DE-588)4048717-9 |2 gnd |9 rswk-swf |
653 | |a Computer systems / Design | ||
653 | |a Computer architecture | ||
653 | |a Computer organization | ||
653 | |a Software engineering | ||
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Computerarchitektur |0 (DE-588)4048717-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kaashoek, Frans |d 1965- |e Verfasser |0 (DE-588)124959490 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017747609&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017747609 |
Datensatz im Suchindex
_version_ | 1812513191098318848 |
---|---|
adam_text |
Contents
PARTI
_
List of Sidebars
.xv
Preface
.xix
Where to find
Partii
and other On-line Materials
.xxix
Acknowledgments
.xxxi
CHAPTER
1
Systems
.1
Overview
.2
1.1
Systems and Complexity
.3
1.1.1
Common Problems of Systems in Many Fields
.3
1.1.2
Systems, Components, Interfaces, and Environments
.8
1.1.3
Complexity
.10
1.2
Sources of Complexity
.13
1.2.1
Cascading and Interacting Requirements
.13
1.2.2
Maintaining High Utilization
.17
1.3
Coping with Complexity I
.19
1.3.1
Modularity
.19
1.3.2
Abstraction
.20
1.3-3
Layering
.24
1.3.4
Hierarchy
.25
1.3.5 Putting it Back Together: Names make Connections
.26
1.4
Computer Systems are the Same but Different
.27
1.4.1
Computer Systems have no Nearby Bounds on
Composition
.28
1.4.2
dCtechnologyVdt is Unprecedented
.31
1.5
Coping with Complexity II
.35
1.5.1
Why Modularity, Abstraction, Layering, and Hierarchy aren't
Enough
.36
1.5.2
Iteration
.
З6
1.5.3
Keep it Simple
.39
What the Rest of this Book is About
.40
Exercises
.41
CHAPTER
2
Elements of Computer System Organization
.43
Overview
.A4
2.1
The Three Fundamental Abstractions
.45
2.1.1
Memory
.45
vii
viii Contents
2.1.2 Interpreters.53
2.1.3 Communication Links.59
2.2
Naming in
Computer Systems.60
2.2.1
The Naming
Model.61
2.2.2
Default and Explicit Context References
.66
2.2.3
Path Names, Naming Networks, and Recursive Name
Resolution
.71
2.2.4
Multiple Lookup: Searching through Layered Contexts
.73
2.2.5
Comparing Names
.75
2.2.6
Name Discovery
.76
2.3
Organizing Computer Systems with Names and Layers
.78
2.3.1
A Hardware Layer: The Bus
.80
2.3.2
A Software Layer: The File Abstraction
.87
2.4
Looking Back andAhead
.90
2.5
Case Study: unix® File System Layering and Naming
.91
2.5.1
Application Programming Interface for the unix File System.
91
2.5.2
The Block Layer
.93
2.5.3
The File Layer
.95
2.5.4
The Inode Number Layer
.96
2.5.5
The File Name Layer
.96
2.5.6
The Path Name Layer
.98
2.5.7
Links
.99
2.5.8
Renaming
.101
2.5.9
The Absolute Path Name Layer
.102
2.5.10
The Symbolic Link Layer
.104
2.5.11
Implementing the File System API
.106
2.5.12
The Shell and Implied Contexts, Search Paths, and
Name Discovery
.110
2.5.13
Suggestions for Further Reading
.112
Exercises
.112
CHAPTER
3
The Design of Naming Schemes
.115
Overview
.115
3.1
Considerations in the Design of Naming Schemes
.116
3.1.1
Modular Sharing
.116
3.1.2
Metadata and Name Overloading
.120
3.1.3
Addresses: Names that Locate Objects
.122
3.1.4
Generating Unique Names
.124
3.15
Intended Audience and User-Friendly Names
.127
3.1-6
Relative Lifetimes of Names, Values, and Bindings
.129
3.1.7
Looking Back andAhead: Names are a Basic System
Component
.131
Contents ix
3.2
Case Study: The Uniform Resource Locator (URL)
.132
3.2.1
Surfing as a Referential Experience; Name Discovery
.132
3.2.2
Interpretation of the URL
.133
3.2.3
URL Case Sensitivity
.134
3.2.4
Wrong Context References for a Partial URL
.135
3.2.5
Overloading of Names in URLs
.137
3.3
War Stories: Pathologies in the Use of Names
.138
3-3.1
A Name Collision Eliminates Smiling Faces
.139
3.3-2
Fragile Names from Overloading, and a Market Solution
.139
3.3.3
More Fragile Names from Overloading, with Market
Disruption
.140
3-3-4
Case-Sensitivity in User-Friendly Names
.141
3.3.5
Running Out of Telephone Numbers
.142
Exercises
.144
CHAPTER
4
Enforcing Modularity with Clients and Services
.147
Overview
.148
4.1
Client/Service Organization
.149
4.1.1
From Soft Modularity to Enforced Modularity
.149
4.1.2
Client/Service Organization
.155
4.1.3
Multiple Clients and Services
.163
4.1.4
Trusted Intermediaries
.163
4.1.5
A Simple Example Service
.165
4.2
Communication Between Client and Service
.167
4.2.1
Remote Procedure Call (RPC)
.167
4.2.2
RPCs are not Identical to Procedure Calls
.169
4.2.3
Communicating through an Intermediary
.172
4.3
Summary and The RoadAhead
.173
4.4
Case Study: The Internet Domain Name System (DNS)
.175
4.4.1
Name Resolution in DNS
.176
4.4.2
Hierarchical Name Management
.180
4.4.3
Other Features of DNS
.181
4ÁÁ
Name Discovery in DNS
.183
4.4.5
Trustworthiness of DNS Responses
.184
4.5
Case Study: The Network File System (NFS)
.184
4.51
Naming Remote Files and Directories
.185
4.5.2
The NFS Remote Procedure Calls
.187
4.5.3
Extending the
unk
File System to Support NFS
.190
4.5.4
Coherence
.192
4.5.5
NFS Version
3
and Beyond
.194
Exercises
.195
χ
Contents
CHAPTER
5
Enforcing Modularity with Virtualization
.199
Overview
.200
5.1
Client/Server Organization within a Computer Using
Virtualization
.201
5.1.1
Abstractions forVirtualizing Computers
.203
5.1.2
Emulation and Virtual Machines
.208
5.1.3
Roadmap: Step-by-StepVirtualization
.208
5.2
Virtual Links Using send, receive, and a Bounded Buffer
.210
5.2.1
An Interface for send and receive with Bounded Buffers
.210
5.2.2
Sequence Coordination with a Bounded Buffer
.211
5.2.3
Race Conditions
.214
5.2.4
Locks and Before-or-After Actions
.218
5.2.5
Deadlock
.221
5.2.6
Implementing acquire and release
.222
5.2.7
Implementing a Before-or-After Action Using the
One-Writer Principle
.225
5.2.8
Coordination between Synchronous Islands with
Asynchronous Connections
.228
5.3
Enforcing Modularity in Memory
.230
5.3-1
Enforcing Modularity with Domains
.230
5.3-2
Controlled Sharing Using Several Domains
.231
5.3-3
More Enforced Modularity with Kernel and User Mode
.234
5.3-4
Gates and Changing Modes
.235
5-3-5
Enforcing Modularity for Bounded Buffers
.237
5.3-6
The Kernel
.238
5.4
Virtualizing Memory
.242
5.4.1
Virtualizing Addresses
.243
5.4.2
Translating Addresses Using a Page Map
.245
5.4.3
Virtual Address Spaces
.248
5.4.4
Hardware versus Software and the Translation Look-Aside
Buffer
.252
5.4.5
Segments (AdvancedTopic)
.253
5.5
Virtualizing Processors Using Threads
.255
5.5.1
Sharing a Processor Among Multiple Threads
.255
5.5.2
Implementing yield
.260
5.5.3
Creating and Terminating Threads
.264
5.5.4
Enforcing Modularity with Threads
:
Preemptive
Scheduling
.269
5.5.5
Enforcing Modularity with Threads and Address Spaces
.271
5.5.6
Layering Threads
.271
Contents xi
5.6
Thread
Primitives
for Sequence Coordination
.273
5.6.1
The Lost Notification Problem
.273
5.6.2
Avoiding the Lost Notification Problem with
Eventcounts and Sequencers
.275
5.6.3
Implementing await, advance, ticket, and read
(Advanced Topic)
.280
5.6.4
Polling, Interrupts, and Sequence Coordination
.282
5.7
Case Study: Evolution of Enforced Modularity in the Intel x86
.284
5.7.1
The Early Designs: No Support for Enforced Modularity
.285
5.7.2
Enforcing Modularity Using Segmentation
.286
5.7.3
Page-Based Virtual Address Spaces
.287
5.7.4
Summary: More Evolution
.288
5.8
Application: Enforcing Modularity Using Virtual Machines
.290
5.8.1
Virtual Machine Uses
.290
5.8.2
Implementing Virtual Machines
.291
5.8.3
Virtualizing Example
.293
Exercises
.294
CHAPTER
6
Performance
.299
Overview
.300
6.1
Designing for Performance
.300
6.1.1
Performance Metrics
.302
6.1.2
A Systems Approach to Designing for Performance
.304
6.1.3
Reducing Latency by Exploiting Workload
Properties
.306
6.1.4
Reducing Latency using Concurrency
.307
6.1.5
Improving Throughput: Concurrency
.309
6.1.6
Queuing and Overload
.311
6.1.7
Fighting Bottlenecks
.313
6.1.8
An Example: The I/O Bottleneck
.316
6.2
Multilevel Memories
.321
6.2.1
Memory Characterization
.322
6.2.2
Multilevel Memory Management using Virtual Memory
.323
6.2.3
Adding Multilevel Memory Management to a
Virtual Memory
.,.327
6.2.4
Analyzing Multilevel Memory Systems
.331
6.2.5
Locality of Reference and Working Sets
.333
6.2.6
Multilevel Memory Management Policies
.335
6.2.7
Comparative Analysis of Different Policies
.340
6.2.8
Other Page-Removal Algorithms
.344
6.2.9
Other Aspects of Multilevel Memory Management
.346
xii Contents
6.3
Scheduling
.347
6.31
Scheduling
Resources.348
6.32
Scheduling Metrics
.349
6.3.3
Scheduling Policies
.352
6.3.4
Case Study: Scheduling the Disk Arm
.
36О
Exercises
.362
About Part II
.369
Appendix A: The Binary Classification Trade-off
.371
Suggestions for Further Reading
.375
ProblemSets
.425
Glossary
.475
Index of Concepts
.513
PART II [ON-LINE]
_
Preface to Part II
CHAPTER
7
The Network as a System and as a System Component
Overview
7.1
Interesting Properties of Networks
7.2
Getting Organized: Layers
7.3
The Link Layer
7.4
The Network Layer
7.5
The End-to-end Layer
7.6
A Network System Design Issue: Congestion Control
7.7
Wrapping up Networks
7.8
Case Study: Mapping the Internet to the Ethernet
7.9
War Stories: Surprises in Protocol Design
Exercises
CHAPTER
8
Fault Tolerance: Reliable Systems from Unreliable Components
Overview
8.1
Faults, Failures, and Fault-Tolerant Design
8.2
Measures of Reliability and Failure Tolerance
8.3
Tolerating Active Faults
8.4
Systematically Applying Redundancy
Contents xiii
8.5
Applying Redundancy to Software and Data
8.6
Wrapping up Reliability
8.7
Application: A Fault Tolerance Model for RAM
8.8
War Stories: Fault-Tolerant Systems that Failed
Exercises
CHAPTER
9
Atomicity: All-or-nothing and Before-or-after
Overview
9.1
Atomicity
9.2
All-or-Nothing Atomicity I: Concepts
9.3
All-or-Nothing Atomicity II: Pragmatics
9.4
Before-or-After Atomicity I: Concepts
9.5
Before-or-After Atomicity II: Pragmatics
9.6
Atomicity across Layers and Multiple Sites
9.7
Case Studies: Machine Language Atomicity
9.8
A More Complete Model of Disk Failure (Advanced Topic)
Exercises
CHAPTER
10
Consistency
Overview
10.1
Constraints and Interface Consistency
10.2
Cache Coherence
10.3
Durable Storage Revisited: Geographically Separated Replicas
10.4
Reconciliation
10.5
Perspectives
Exercises
CHAPTER
11
Information Security
Overview
11.1
Introduction to Secure Systems
11.2
Authenticating Principals
11.3
Authenticating Messages
11.4
Message Confidentiality
11.5
Security Protocols
11.6
Authorization: Controlled Sharing
11.7
Reasoning about Authentication (Advanced Topic)
11.8
Summary
11.9
Cryptography as a Building Block (Advanced Topic)
11.10
Case Study: Transport Layer Security (TLS) for the Web
11.11
War Stories: Security System Breaches
Exercises
xiv Contents
Suggestions
for Further Reading
Problem Sets
Glossary
Complete Index to Parts I and II |
any_adam_object | 1 |
author | Saltzer, Jerome H. 1939- Kaashoek, Frans 1965- |
author_GND | (DE-588)140630597 (DE-588)124959490 |
author_facet | Saltzer, Jerome H. 1939- Kaashoek, Frans 1965- |
author_role | aut aut |
author_sort | Saltzer, Jerome H. 1939- |
author_variant | j h s jh jhs f k fk |
building | Verbundindex |
bvnumber | BV035693569 |
callnumber-first | Q - Science |
callnumber-label | QA76 QA76 |
callnumber-raw | QA76 QA76.9.S88 |
callnumber-search | QA76 QA76.9.S88 |
callnumber-sort | QA 276 _Q A76 19. S88 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 150 ST 230 |
ctrlnum | (OCoLC)436262009 (DE-599)BSZ309729556 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV035693569</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241010</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090825s2009 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123749574</subfield><subfield code="c">pbk</subfield><subfield code="9">978-0-12-374957-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123749573</subfield><subfield code="c">pbk</subfield><subfield code="9">0-12-374957-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)436262009</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ309729556</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76 QA76.9.S88</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 150</subfield><subfield code="0">(DE-625)143594:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Saltzer, Jerome H.</subfield><subfield code="d">1939-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)140630597</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of computer system design</subfield><subfield code="b">an introduction</subfield><subfield code="c">Jerome H. Saltzer ; M. Frans Kaashoek</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Morgan Kaufmann</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXIII, 526 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer systems</subfield><subfield code="x">Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerarchitektur</subfield><subfield code="0">(DE-588)4048717-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer systems / Design</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer architecture</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer organization</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software engineering</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerarchitektur</subfield><subfield code="0">(DE-588)4048717-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaashoek, Frans</subfield><subfield code="d">1965-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)124959490</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017747609&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017747609</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV035693569 |
illustrated | Illustrated |
indexdate | 2024-10-10T08:01:18Z |
institution | BVB |
isbn | 9780123749574 0123749573 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017747609 |
oclc_num | 436262009 |
open_access_boolean | |
owner | DE-20 DE-824 DE-473 DE-BY-UBG DE-Aug4 DE-706 DE-573 |
owner_facet | DE-20 DE-824 DE-473 DE-BY-UBG DE-Aug4 DE-706 DE-573 |
physical | XXXIII, 526 S. Ill., graph. Darst. 24 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Morgan Kaufmann |
record_format | marc |
spelling | Saltzer, Jerome H. 1939- Verfasser (DE-588)140630597 aut Principles of computer system design an introduction Jerome H. Saltzer ; M. Frans Kaashoek Amsterdam [u.a.] Morgan Kaufmann 2009 XXXIII, 526 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Computer architecture Computer organization Computer systems Design Software engineering Computerarchitektur (DE-588)4048717-9 gnd rswk-swf Computer systems / Design (DE-588)4151278-9 Einführung gnd-content Computerarchitektur (DE-588)4048717-9 s DE-604 Kaashoek, Frans 1965- Verfasser (DE-588)124959490 aut Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017747609&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Saltzer, Jerome H. 1939- Kaashoek, Frans 1965- Principles of computer system design an introduction Computer architecture Computer organization Computer systems Design Software engineering Computerarchitektur (DE-588)4048717-9 gnd |
subject_GND | (DE-588)4048717-9 (DE-588)4151278-9 |
title | Principles of computer system design an introduction |
title_auth | Principles of computer system design an introduction |
title_exact_search | Principles of computer system design an introduction |
title_full | Principles of computer system design an introduction Jerome H. Saltzer ; M. Frans Kaashoek |
title_fullStr | Principles of computer system design an introduction Jerome H. Saltzer ; M. Frans Kaashoek |
title_full_unstemmed | Principles of computer system design an introduction Jerome H. Saltzer ; M. Frans Kaashoek |
title_short | Principles of computer system design |
title_sort | principles of computer system design an introduction |
title_sub | an introduction |
topic | Computer architecture Computer organization Computer systems Design Software engineering Computerarchitektur (DE-588)4048717-9 gnd |
topic_facet | Computer architecture Computer organization Computer systems Design Software engineering Computerarchitektur Einführung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017747609&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT saltzerjeromeh principlesofcomputersystemdesignanintroduction AT kaashoekfrans principlesofcomputersystemdesignanintroduction |