Atnaujinkite slapukų nuostatas

Looseleaf for Survey of Operating Systems, 5e 5th ed. [Kietas viršelis]

3.52/5 (27 ratings by Goodreads)
  • Formatas: Hardback, 512 pages, aukštis x plotis x storis: 274x211x18 mm, weight: 862 g, Illustrations, unspecified
  • Išleidimo metai: 21-Jul-2016
  • Leidėjas: McGraw-Hill Education
  • ISBN-10: 125991139X
  • ISBN-13: 9781259911392
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 512 pages, aukštis x plotis x storis: 274x211x18 mm, weight: 862 g, Illustrations, unspecified
  • Išleidimo metai: 21-Jul-2016
  • Leidėjas: McGraw-Hill Education
  • ISBN-10: 125991139X
  • ISBN-13: 9781259911392
Kitos knygos pagal šią temą:

McGraw-Hill Education is proud to introduce the fifth edition of Jane and Charles Holcombe's Survey of Operating Systems. This title provides an introduction to the most widely used desktop operating systems (including Windows, Apple OS X, and Linux) using numerous illustrations and hands-on activities to build a foundation for success in the IT field empowering students to adapt to different job situations and troubleshoot problems. The new edition features information on mobile operating systems, as well as chapters on subjects peripheral to operating systems, such as computer security, desktop virtualization, and connecting computers and mobile devices to networks.

About the Authors iii
About the Contributors iii
Acknowledgments iv
About this Book v
New to Survey of Operating Systems, Fifth Edition vii
Introduction xiii
1 Introduction to Operating Systems
1(38)
An Overview of Microcomputer Operating Systems
2(9)
About Microcomputers
2(3)
Functions of Microcomputer Operating Systems
5(6)
Yesterday's Operating Systems
11(15)
UNIX---The Operating System for All Platforms
12(1)
The Evolution of Desktop Operating Systems
13(13)
Today's Desktop Operating Systems
26(4)
Today's Windows for the Desktop
26(3)
Apple OS X
29(1)
Linux
30(1)
Today's Mobile Operating Systems
30(9)
Mobile Devices
31(1)
Connectivity
31(1)
Mobile Operating System Features
32(2)
Chapter 1 Review
34(5)
2 Computer Security Basics
39(46)
Threats to Computers and Users
40(14)
Malicious Tools and Methods
40(12)
Accidents, Mistakes, and Disasters
52(1)
Keeping Track of New Threats
52(1)
The People Behind the Threats
53(1)
Defense Against Threats
54(20)
Education
54(1)
Security Policies
55(1)
Firewalls
56(3)
Security Software
59(5)
Authentication and Authorization
64(2)
Passwords
66(1)
Security Account Basics
66(3)
Best Practices When Assigning Permissions
69(1)
Best Practices with User Names and Passwords
70(2)
Encryption
72(1)
Data Wiping
73(1)
Physical Security
74(1)
Security for Mobile Computing
74(1)
Troubleshooting Common Security Problems
74(11)
Troubleshooting Log-On Problems
75(1)
Using the Administrator Account in Troubleshooting
76(1)
Troubleshooting a Suspected Malware Attack
76(4)
Chapter 2 Review
80(5)
3 Desktop Visualization
85(30)
Virtualization Overview
86(4)
Virtualization Is Everywhere
86(1)
Your (Great?) Grandparent's Virtual Machines
87(1)
Today's Virtual Desktops
87(3)
Virtual Machines on Windows Desktops
90(13)
Windows XP Mode and Windows Virtual PC on Windows 7
90(10)
Client Hyper-V on Windows 8.x and Windows 10
100(2)
Oracle VirtualBox
102(1)
Virtual Machines on OS X
103(12)
Apple Boot Camp---A Dual-Boot Option
103(1)
Oracle VirtualBox
104(7)
Chapter 3 Review
111(4)
4 Windows 7
115(48)
Installing Windows 7
115(12)
The Windows 7 Lifecycle
116(1)
Recommended System Requirements
116(1)
Windows 7 Editions
116(1)
Upgrade Paths
117(1)
Preparing to Install Windows 7
118(3)
The Installation
121(4)
Postlnstallation Tasks
125(2)
Windows 7 Features
127(10)
The Windows 7 Desktop
128(5)
File System Support
133(2)
Security
135(1)
Program Compatibility
135(1)
Recovery Tools
136(1)
Customizing and Managing Windows 7
137(13)
Computer Management
137(1)
Preparing the Desktop for Users
138(5)
Installing and Removing Applications
143(1)
Managing Windows Components
144(1)
Simple File Management
144(6)
Managing Local Security in Windows 7
150(13)
Administering Local User Accounts
150(3)
Local Security for Files and Folders
153(2)
BitLocker Drive Encryption
155(2)
Windows Defender
157(1)
Microsoft Security Essentials
157(1)
Windows Firewall
157(1)
Chapter 4 Review
158(5)
5 Windows 8.1
163(44)
Installing Windows 8.1
164(14)
System Requirements
164(1)
Windows 8 and 8.1 Editions
164(1)
Upgrade Paths
165(1)
Preparing to Install Windows 8.1
165(8)
The Installation
173(5)
Postinstallation Tasks
178(7)
Installing Drivers
178(1)
Installing Updates
179(3)
Virtual Machine Guest Additions
182(1)
Remove Unnecessary Software
182(1)
Create a Backup Image
182(1)
Turn on File History
183(1)
Shutting Down Windows 8.1
183(2)
Navigating and Configuring Windows 8.1
185(13)
A GUI Optimized for Touch Devices
185(2)
Keyboard Shortcuts
187(1)
The Lock Screen
187(1)
The Start Screen
187(4)
The Desktop
191(4)
Managing Apps
195(3)
Securing Windows 8.1
198(9)
Windows Defender
198(1)
Administering Local User Accounts
199(2)
Windows SmartScreen
201(1)
A Windows 8.1 Computer in a Kiosk
202(1)
Chapter 5 Review
203(4)
6 Windows 10
207(56)
Installing Windows 10
207(17)
Windows 10 Editions
208(1)
System Requirements
209(1)
Upgrading to Windows 10
209(5)
Preparing to Install Windows 10
214(3)
The Installation
217(7)
Postinstallation Tasks
224(17)
Get Acquainted with the New GUI
224(3)
Install and Troubleshoot Drivers
227(6)
Personalize Windows 10
233(3)
Configure Windows Update
236(3)
Make Windows 10 Run Better in a Virtual Machine
239(1)
Remove Unwanted Software
239(1)
Migrate or Restore Data
239(1)
Back Up Data and the System
240(1)
Working with Windows 10 Features
241(13)
Using the Start Menu
242(6)
Getting Started with Cortana
248(1)
Using Apps in Windows 10
249(5)
Securing Windows 10
254(9)
Privacy Settings
254(1)
Windows Hello
254(1)
Microsoft Passport
255(1)
Windows Defender
255(1)
Windows Firewall
256(1)
Chapter 6 Review
257(6)
7 Supporting and Troubleshooting Windows
263(42)
Understanding the Registry
264(8)
The Registry Defined
264(1)
Automatic Registry Changes
264(1)
Registry Files
264(3)
The Temporary Portion of the Registry
267(1)
Viewing and Editing the Registry
267(1)
Backing Up the Registry
268(4)
Windows User and Power Options
272(9)
User Options
272(1)
Power Options
273(1)
Windows 7 Startup Phases
274(2)
Windows Secure Boot and Fast Boot
276(1)
Modifying System Startup
277(4)
Installing and Managing Device Drivers
281(6)
Installing Device Drivers
281(1)
Managing Installed Devices
282(5)
Using Windows Troubleshooting and Recovery Tools
287(18)
For Startup Failures: The Windows Recovery Environment
287(1)
Troubleshooting with Modified Startups
288(10)
Troubleshooting Device Problems
298(2)
Chapter 7 Review
300(5)
8 Apple OS X on the Desktop
305(44)
OS X History and Versions
305(4)
A Brief History of the Apple Operating Systems
305(1)
OS X Versions
306(3)
Installing and Upgrading OS X
309(7)
Setting Up a New Mac
309(1)
Preparing to Install OS X
309(3)
The Installation
312(3)
Postinstallation Tasks
315(1)
Navigating and Managing the OS X Desktop
316(14)
The Desktop Menu Bar
316(1)
File Management in Finder
317(7)
Changing Settings in OS X
324(1)
Launching and Switching between Apps with the Dock
325(1)
Using the Heads-Up Program Switcher
326(1)
View and Manage All Programs in Launchpad
326(1)
Declutter the Desktop with Mission Control
327(2)
Notification Center
329(1)
Menu Extras
329(1)
Printing in OS X
329(1)
AirPlay
330(1)
Managing Local Security in OS X
330(7)
Check Out the OS X Firewall
331(1)
Gatekeeper
331(1)
Kernel ASLR
332(1)
Digitally Signed and Sandboxed Apps
332(1)
FileVault
332(1)
Secure Virtual Memory
332(1)
Keychain
333(1)
Managing Local User Accounts
334(3)
Troubleshooting Common Mac OS Problems
337(12)
Where to Find Help
337(1)
When to Quit
338(1)
OS X Failure to Quit
338(1)
Forgotten Password
338(1)
Disappearing Sidebar Items
339(1)
Useful System Utilities
339(1)
Using Terminal in OS X
340(4)
Chapter 8 Review
344(5)
9 Linux on the Desktop
349(38)
Linux Overview
350(6)
Why Learn Linux?
350(1)
The Evolution of Linux
350(2)
Linux Distributions
352(1)
Benefits of Linux
352(2)
Drawbacks of Linux
354(2)
Linux on Your Desktop
356(3)
Acquiring Linux for the Desktop
356(3)
Installing Linux or Using a Live Image
359(1)
Exploring a Linux GUI
359(9)
Logging In to Ubuntu Linux
359(1)
The Ubuntu Unity Desktop
360(5)
System Settings
365(1)
Modify the Desktop
365(2)
Ending a Linux Session from the GUI
367(1)
Linux Command-Line Interface
368(8)
The Terminal Window in Linux
368(1)
Using Linux Shell Commands
369(7)
Securing a Linux Desktop
376(11)
Managing Users
376(4)
File and Folder Permissions
380(2)
Chapter 9 Review
382(5)
10 Connecting Desktops and Laptops to Networks
387(50)
Configuring a Network Connection
388(12)
Understanding the TCP/IP Protocol Suite
388(1)
Transmission Control Protocol
388(1)
Internet Protocol
388(12)
Connecting to the Internet
400(7)
Internet Service Providers
400(1)
Computer-to-internet versus LAN-to-lnternet
400(1)
Wired Connectivity Technologies
401(2)
Wireless Connectivity Technologies
403(3)
Using a Virtual Private Network
406(1)
Using Internet Clients
407(14)
Web Browsers
407(9)
Email Clients
416(5)
FTP Clients
421(1)
Sharing Files and Printers
421(5)
The Server Side of File and Printer Sharing
422(1)
The Client Side of File and Printer Sharing
422(1)
Sharing Files and Printers with Windows HomeGroups
422(4)
Troubleshooting Common Network Client Problems
426(11)
Built-in Network Diagnostics
426(1)
Testing IP Configurations and Connectivity
426(4)
Troubleshooting Connection Problems with tracert
430(1)
Troubleshooting DNS Errors Using ping, netstat, and nslookup
430(2)
Chapter 10 Review
432(5)
11 Mobile Operating Systems
437(28)
From Luggable to BYOD
438(3)
Mobile Computing Then and Now
438(1)
Mobile Devices and BYOD
439(2)
Configuring Accounts and Wireless Connections on Mobile Devices
441(7)
Your Mobile Device Account
442(2)
Connecting to Cellular Networks
444(1)
Connecting to Wi-Fi Networks
444(2)
Mobile Hotspots
446(1)
Tethering
446(1)
Connecting to Bluetooth Devices
446(2)
Connecting with Near Field Communications
448(1)
Airplane Mode
448(1)
Email, Apps, and Synchronization
448(7)
Configuring Email
448(3)
Mobile Apps
451(1)
Synchronization
452(3)
Securing Mobile Devices
455(10)
Security Software for Mobile Devices
455(1)
Patching and OS Updates
455(1)
Securing Lock Screens on Mobile Devices
456(1)
Location Settings
457(1)
Lost or Stolen Devices
458(3)
Chapter 11 Review
461(4)
Appendix Windows Mouse and Keyboard Shortcuts 465(4)
Glossary 469(14)
Photo Credits 483(2)
Index 485