About the Authors |
|
iii | |
About the Contributors |
|
iii | |
Acknowledgments |
|
iv | |
About this Book |
|
v | |
New to Survey of Operating Systems, Fifth Edition |
|
vii | |
Introduction |
|
xiii | |
|
1 Introduction to Operating Systems |
|
|
1 | (38) |
|
An Overview of Microcomputer Operating Systems |
|
|
2 | (9) |
|
|
2 | (3) |
|
Functions of Microcomputer Operating Systems |
|
|
5 | (6) |
|
Yesterday's Operating Systems |
|
|
11 | (15) |
|
UNIX---The Operating System for All Platforms |
|
|
12 | (1) |
|
The Evolution of Desktop Operating Systems |
|
|
13 | (13) |
|
Today's Desktop Operating Systems |
|
|
26 | (4) |
|
Today's Windows for the Desktop |
|
|
26 | (3) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Today's Mobile Operating Systems |
|
|
30 | (9) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Mobile Operating System Features |
|
|
32 | (2) |
|
|
34 | (5) |
|
2 Computer Security Basics |
|
|
39 | (46) |
|
Threats to Computers and Users |
|
|
40 | (14) |
|
Malicious Tools and Methods |
|
|
40 | (12) |
|
Accidents, Mistakes, and Disasters |
|
|
52 | (1) |
|
Keeping Track of New Threats |
|
|
52 | (1) |
|
The People Behind the Threats |
|
|
53 | (1) |
|
|
54 | (20) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (3) |
|
|
59 | (5) |
|
Authentication and Authorization |
|
|
64 | (2) |
|
|
66 | (1) |
|
|
66 | (3) |
|
Best Practices When Assigning Permissions |
|
|
69 | (1) |
|
Best Practices with User Names and Passwords |
|
|
70 | (2) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
Security for Mobile Computing |
|
|
74 | (1) |
|
Troubleshooting Common Security Problems |
|
|
74 | (11) |
|
Troubleshooting Log-On Problems |
|
|
75 | (1) |
|
Using the Administrator Account in Troubleshooting |
|
|
76 | (1) |
|
Troubleshooting a Suspected Malware Attack |
|
|
76 | (4) |
|
|
80 | (5) |
|
|
85 | (30) |
|
|
86 | (4) |
|
Virtualization Is Everywhere |
|
|
86 | (1) |
|
Your (Great?) Grandparent's Virtual Machines |
|
|
87 | (1) |
|
|
87 | (3) |
|
Virtual Machines on Windows Desktops |
|
|
90 | (13) |
|
Windows XP Mode and Windows Virtual PC on Windows 7 |
|
|
90 | (10) |
|
Client Hyper-V on Windows 8.x and Windows 10 |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
103 | (12) |
|
Apple Boot Camp---A Dual-Boot Option |
|
|
103 | (1) |
|
|
104 | (7) |
|
|
111 | (4) |
|
|
115 | (48) |
|
|
115 | (12) |
|
|
116 | (1) |
|
Recommended System Requirements |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
Preparing to Install Windows 7 |
|
|
118 | (3) |
|
|
121 | (4) |
|
|
125 | (2) |
|
|
127 | (10) |
|
|
128 | (5) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Customizing and Managing Windows 7 |
|
|
137 | (13) |
|
|
137 | (1) |
|
Preparing the Desktop for Users |
|
|
138 | (5) |
|
Installing and Removing Applications |
|
|
143 | (1) |
|
Managing Windows Components |
|
|
144 | (1) |
|
|
144 | (6) |
|
Managing Local Security in Windows 7 |
|
|
150 | (13) |
|
Administering Local User Accounts |
|
|
150 | (3) |
|
Local Security for Files and Folders |
|
|
153 | (2) |
|
BitLocker Drive Encryption |
|
|
155 | (2) |
|
|
157 | (1) |
|
Microsoft Security Essentials |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (5) |
|
|
163 | (44) |
|
|
164 | (14) |
|
|
164 | (1) |
|
Windows 8 and 8.1 Editions |
|
|
164 | (1) |
|
|
165 | (1) |
|
Preparing to Install Windows 8.1 |
|
|
165 | (8) |
|
|
173 | (5) |
|
|
178 | (7) |
|
|
178 | (1) |
|
|
179 | (3) |
|
Virtual Machine Guest Additions |
|
|
182 | (1) |
|
Remove Unnecessary Software |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
Shutting Down Windows 8.1 |
|
|
183 | (2) |
|
Navigating and Configuring Windows 8.1 |
|
|
185 | (13) |
|
A GUI Optimized for Touch Devices |
|
|
185 | (2) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (4) |
|
|
191 | (4) |
|
|
195 | (3) |
|
|
198 | (9) |
|
|
198 | (1) |
|
Administering Local User Accounts |
|
|
199 | (2) |
|
|
201 | (1) |
|
A Windows 8.1 Computer in a Kiosk |
|
|
202 | (1) |
|
|
203 | (4) |
|
|
207 | (56) |
|
|
207 | (17) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (5) |
|
Preparing to Install Windows 10 |
|
|
214 | (3) |
|
|
217 | (7) |
|
|
224 | (17) |
|
Get Acquainted with the New GUI |
|
|
224 | (3) |
|
Install and Troubleshoot Drivers |
|
|
227 | (6) |
|
|
233 | (3) |
|
|
236 | (3) |
|
Make Windows 10 Run Better in a Virtual Machine |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
Back Up Data and the System |
|
|
240 | (1) |
|
Working with Windows 10 Features |
|
|
241 | (13) |
|
|
242 | (6) |
|
Getting Started with Cortana |
|
|
248 | (1) |
|
|
249 | (5) |
|
|
254 | (9) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (6) |
|
7 Supporting and Troubleshooting Windows |
|
|
263 | (42) |
|
Understanding the Registry |
|
|
264 | (8) |
|
|
264 | (1) |
|
Automatic Registry Changes |
|
|
264 | (1) |
|
|
264 | (3) |
|
The Temporary Portion of the Registry |
|
|
267 | (1) |
|
Viewing and Editing the Registry |
|
|
267 | (1) |
|
|
268 | (4) |
|
Windows User and Power Options |
|
|
272 | (9) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (2) |
|
Windows Secure Boot and Fast Boot |
|
|
276 | (1) |
|
|
277 | (4) |
|
Installing and Managing Device Drivers |
|
|
281 | (6) |
|
Installing Device Drivers |
|
|
281 | (1) |
|
Managing Installed Devices |
|
|
282 | (5) |
|
Using Windows Troubleshooting and Recovery Tools |
|
|
287 | (18) |
|
For Startup Failures: The Windows Recovery Environment |
|
|
287 | (1) |
|
Troubleshooting with Modified Startups |
|
|
288 | (10) |
|
Troubleshooting Device Problems |
|
|
298 | (2) |
|
|
300 | (5) |
|
8 Apple OS X on the Desktop |
|
|
305 | (44) |
|
OS X History and Versions |
|
|
305 | (4) |
|
A Brief History of the Apple Operating Systems |
|
|
305 | (1) |
|
|
306 | (3) |
|
Installing and Upgrading OS X |
|
|
309 | (7) |
|
|
309 | (1) |
|
Preparing to Install OS X |
|
|
309 | (3) |
|
|
312 | (3) |
|
|
315 | (1) |
|
Navigating and Managing the OS X Desktop |
|
|
316 | (14) |
|
|
316 | (1) |
|
File Management in Finder |
|
|
317 | (7) |
|
Changing Settings in OS X |
|
|
324 | (1) |
|
Launching and Switching between Apps with the Dock |
|
|
325 | (1) |
|
Using the Heads-Up Program Switcher |
|
|
326 | (1) |
|
View and Manage All Programs in Launchpad |
|
|
326 | (1) |
|
Declutter the Desktop with Mission Control |
|
|
327 | (2) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
Managing Local Security in OS X |
|
|
330 | (7) |
|
Check Out the OS X Firewall |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
Digitally Signed and Sandboxed Apps |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Managing Local User Accounts |
|
|
334 | (3) |
|
Troubleshooting Common Mac OS Problems |
|
|
337 | (12) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
Disappearing Sidebar Items |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (4) |
|
|
344 | (5) |
|
|
349 | (38) |
|
|
350 | (6) |
|
|
350 | (1) |
|
|
350 | (2) |
|
|
352 | (1) |
|
|
352 | (2) |
|
|
354 | (2) |
|
|
356 | (3) |
|
Acquiring Linux for the Desktop |
|
|
356 | (3) |
|
Installing Linux or Using a Live Image |
|
|
359 | (1) |
|
|
359 | (9) |
|
Logging In to Ubuntu Linux |
|
|
359 | (1) |
|
|
360 | (5) |
|
|
365 | (1) |
|
|
365 | (2) |
|
Ending a Linux Session from the GUI |
|
|
367 | (1) |
|
Linux Command-Line Interface |
|
|
368 | (8) |
|
The Terminal Window in Linux |
|
|
368 | (1) |
|
Using Linux Shell Commands |
|
|
369 | (7) |
|
|
376 | (11) |
|
|
376 | (4) |
|
File and Folder Permissions |
|
|
380 | (2) |
|
|
382 | (5) |
|
10 Connecting Desktops and Laptops to Networks |
|
|
387 | (50) |
|
Configuring a Network Connection |
|
|
388 | (12) |
|
Understanding the TCP/IP Protocol Suite |
|
|
388 | (1) |
|
Transmission Control Protocol |
|
|
388 | (1) |
|
|
388 | (12) |
|
Connecting to the Internet |
|
|
400 | (7) |
|
Internet Service Providers |
|
|
400 | (1) |
|
Computer-to-internet versus LAN-to-lnternet |
|
|
400 | (1) |
|
Wired Connectivity Technologies |
|
|
401 | (2) |
|
Wireless Connectivity Technologies |
|
|
403 | (3) |
|
Using a Virtual Private Network |
|
|
406 | (1) |
|
|
407 | (14) |
|
|
407 | (9) |
|
|
416 | (5) |
|
|
421 | (1) |
|
Sharing Files and Printers |
|
|
421 | (5) |
|
The Server Side of File and Printer Sharing |
|
|
422 | (1) |
|
The Client Side of File and Printer Sharing |
|
|
422 | (1) |
|
Sharing Files and Printers with Windows HomeGroups |
|
|
422 | (4) |
|
Troubleshooting Common Network Client Problems |
|
|
426 | (11) |
|
Built-in Network Diagnostics |
|
|
426 | (1) |
|
Testing IP Configurations and Connectivity |
|
|
426 | (4) |
|
Troubleshooting Connection Problems with tracert |
|
|
430 | (1) |
|
Troubleshooting DNS Errors Using ping, netstat, and nslookup |
|
|
430 | (2) |
|
|
432 | (5) |
|
11 Mobile Operating Systems |
|
|
437 | (28) |
|
|
438 | (3) |
|
Mobile Computing Then and Now |
|
|
438 | (1) |
|
|
439 | (2) |
|
Configuring Accounts and Wireless Connections on Mobile Devices |
|
|
441 | (7) |
|
Your Mobile Device Account |
|
|
442 | (2) |
|
Connecting to Cellular Networks |
|
|
444 | (1) |
|
Connecting to Wi-Fi Networks |
|
|
444 | (2) |
|
|
446 | (1) |
|
|
446 | (1) |
|
Connecting to Bluetooth Devices |
|
|
446 | (2) |
|
Connecting with Near Field Communications |
|
|
448 | (1) |
|
|
448 | (1) |
|
Email, Apps, and Synchronization |
|
|
448 | (7) |
|
|
448 | (3) |
|
|
451 | (1) |
|
|
452 | (3) |
|
|
455 | (10) |
|
Security Software for Mobile Devices |
|
|
455 | (1) |
|
|
455 | (1) |
|
Securing Lock Screens on Mobile Devices |
|
|
456 | (1) |
|
|
457 | (1) |
|
|
458 | (3) |
|
|
461 | (4) |
Appendix Windows Mouse and Keyboard Shortcuts |
|
465 | (4) |
Glossary |
|
469 | (14) |
Photo Credits |
|
483 | (2) |
Index |
|
485 | |