UNIX/Linux vs. Mac vs. Windows
Prince Young, Robert Evans,
Stephanie Wilburn,
Tiana Veale,
Verne Weikle,
Wendy Lile
POS/355
University of Phoenix
July 8, 2013
Jeff Rugg
Introduction
Memory management
Process management
File management
Security
Graphic References
Conclusion
References
• Department of Homeland Security. (n.d.).Security Tip (ST04-003). Retrieved from https://www.us-cert.gov/ncas/tips/ST04-003
• Developer.apple.com (June 28, 2013).Memory Usage Performance Guidelines. Retrieved from: https://developer.apple.com/library/mac/#documentation/Performance/Conceptual/ManagingMemory/Articles/AboutMemory.html
• Hacker. (2013). In Merriam-Webster. Retrieved from http://www.Merriam-webster.com/dictionary/hacker
• Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ:Wiley & Sons.
• Stallings, W. (2012). Operating Systems Internal and Design Principles (7th ed.). Retrieved from The University of Phoenix eBook Collection database.
• Types of Threats. (2013). Retrieved from http://www.zbshareware.com/threats/types_threats.html