Unix linux vmacvwindowspptx2

Preview:

Citation preview

UNIX/Linux vs. Mac vs. Windows

Prince Young, Robert Evans,

Stephanie Wilburn,

Tiana Veale,

Verne Weikle,

Wendy Lile

POS/355

University of Phoenix

July 8, 2013

Jeff Rugg

Introduction

Memory management

Process management

File management

Security

Graphic References

Conclusion

References

• Department of Homeland Security. (n.d.).Security Tip (ST04-003). Retrieved from https://www.us-cert.gov/ncas/tips/ST04-003

• Developer.apple.com (June 28, 2013).Memory Usage Performance Guidelines. Retrieved from: https://developer.apple.com/library/mac/#documentation/Performance/Conceptual/ManagingMemory/Articles/AboutMemory.html

• Hacker. (2013). In Merriam-Webster. Retrieved from http://www.Merriam-webster.com/dictionary/hacker

• Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ:Wiley & Sons.

• Stallings, W. (2012). Operating Systems Internal and Design Principles (7th ed.). Retrieved from The University of Phoenix eBook Collection database.

• Types of Threats. (2013). Retrieved from http://www.zbshareware.com/threats/types_threats.html

Recommended