SlideShare a Scribd company logo
1 of 21
Presented by
Kaivan Parikh
 Introduction
 ComputerSystemSecurity
– InternetSecurity
– RemoteSharing
– Software Installation
 OperatingSystemSecurity
– AccessControl
– Supervision
– ResourceAllocation
 World Population roughly 6 billion
 Computers in this world roughly 2.25
billion
 Internet user roughly 2 billion
 Millions of computer are tied together via
communication network (mostly
telephone system)
WORLDINTERNET USAGE AND POPULATION STATISTICS
World Regions
Population Internet Users Internet Users
( 2009 Est.) Dec. 31, 2000 Latest Data
Penetration
(%
Population)
Growth
2000-2009
Users %
of Table
Africa 991,002,342 4,514,400 86,217,900 8.7 % 1,809.8 % 4.8 %
Asia 3,808,070,503 114,304,000 764,435,900 20.1 % 568.8 % 42.4 %
Europe 803,850,858 105,096,093 425,773,571 53.0 % 305.1 % 23.6 %
Middle East 202,687,005 3,284,800 58,309,546 28.8 % 1,675.1 % 3.2 %
North America 340,831,831 108,096,800 259,561,000 76.2 % 140.1 % 14.4 %
Latin
America/Caribbean
586,662,468 18,068,919 186,922,050 31.9 % 934.5 % 10.4 %
Oceania / Australia 34,700,201 7,620,480 21,110,490 60.8 % 177.0 % 1.2 %
WORLD TOTAL 6,767,805,208 360,985,492 1,802,330,457 26.6 % 399.3 % 100.0 %
 ExternalSecurity (InterfaceSecurity)
– PhysicalSecurity
– Operational Security
• Classifications
• Division of Responsibilities
 InternalSecurity
 Surveillance
(mean: close observation, especially of a suspected spy or criminal)
– Authentication
 Threat Monitoring
– No DirectAccess
– Surveillance Programs like supervisor
 Amplification
– Example:Taxpayers information
 Password Protection
– Weaknesses
– Solutions
 Auditing
– AuditOccasionally
– Audit Log
 AccessControls
– Access based onClassifications
 Security Kernels
– Beginning rather than retrofitted
 HardwareSecurity
– IncorporateOperating System Functions
 Fault-TolerantSystems
– Hardware rather than Software
• Major Portion ofOperatingSystem
• Fault Detection
– Multiple I/O subsystems
 What isCryptography?
 A cryptographic PrivacySystem
– Sender
– EncryptionUnit
– Ciphertext or cryptogram
– DecryptionUnit
– Receiver
* Decryption Key
 Cryptanalysis
A process of attempting to regenerate
plaintext from ciphertext but without knowing
the decryption key
 Public KeySystems
– Different Keys
 DigitalSignature
 What areViruses?
 How they affect the system?
 What areAntiviruses?
– Detect Infections
– Prevent Infections
– Recover Infections
 Antiviruses are watchdogs
 Sweeper Programs
 ComputerWorms
– Network based objects
– Virus/Worms
 Trojan horse
– Allows a hacker remote access to a target
computer system
 Spyware
– What is spyware?
– What are adware?
– Adwares andSpyware
– Spyware,Viruses andWorms
 CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities.
The package directs traffic to advertisements on Web sites including coolwebsearch.com. It
displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts
file to direct DNS lookups to these sites.
 HuntBar, aka WinTools or Adware.Websearch, was installed by an ActiveX drive-by download
at affiliate Web sites, or by advertisements displayed by other spyware programs—an example
of how spyware can install more spyware. These programs add toolbars to IE, track aggregate
browsing behavior, redirect affiliate references, and display advertisements.
 MyWebSearch (of Fun Web Products) has a plugin that displays a search toolbar near the top of
a browser window, and it spies to report user search-habits. MyWebSearch is notable for
installing over 210 computer settings, such as over 210 MS Windows registry
keys/values.[39][40] Beyond the browser plugin, it has settings to affect Outlook, email, HTML,
XML, etc. Although tools exist to remove MyWebSearch, it can be hand-deleted in 1 hour, by
users familiar with using Regedit to find and delete keys/values (named with "MyWebSearch").
After reboot, the browser returns to the prior display appearance.
 WeatherStudio has a plugin that displays a window-panel near the bottom of a browser
window. The official website notes that it is easy to remove (uninstall) WeatherStudio from a
computer, using its own uninstall-program, such as under C:Program FilesWeatherStudio.
Once WeatherStudio is removed, a browser returns to the prior display appearance, without
the need to modify the browser settings.
 Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to
advertising. When users follow a broken link or enter an erroneous URL, they see a page of
advertisements. However, because password-protected Web sites (HTTP Basic authentication)
use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to
access password-protected sites.
 Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web
sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a
Web site, so that the advertisements make unearned profit for the 180 Solutions company. It
opens pop-up ads that cover over the Web sites of competing companies (as seen in their
[ZangoEndUser LicenseAgreement]).
 Zlob trojan, or just Zlob, downloads itself to a computer via an ActiveX codec and reports
information back to Control Server[citation needed]. Some information can be the search-
history, the Websites visited, and even keystrokes.[citation needed] More recently, Zlob has
been known to hijack routers set to defaults.
 avast! InternetSecurity 5.0
– http://www.pcmag.com/article2/0,2817,2358467,00.asp
 AVG InternetSecurity 9.0
– http://www.pcmag.com/article2/0,2817,2355028,00.asp
 BitDefenderTotalSecurity 2010
– http://www.pcmag.com/article2/0,2817,2351546,00.asp
 Kaspersky InternetSecurity 2010
– http://www.pcmag.com/article2/0,2817,2351568,00.asp
 McAfeeTotal Protection 2010
– http://www.pcmag.com/article2/0,2817,2358902,00.asp
 What is Firewall?
 Hardware Firewall
– Broadband Routers
 Software Firewall
– Norton 360
– Norton InternetSecurity
– ESETSecuritySmart
– Kaspersky InternetSecurity
 What is phishing?
 Five steps to avoid phishing
1. SecureWebsites (https)
2. Authenticity of aWebsite (embedded
links)
3. Thoroughly Investigate before submitting
4. Keep track of your online accounts
5. Have proper computer protection
software
 Day by day usage of computer systems
 Hacking risks
 Need of protection software
 And after that, keep you eyes open when
using internet or transmitting something
on the network
 http://howstuffworks.com/
 http://pcmag.com/
 http://net-security.org/
 http://wikipedia.org/
 OperatingSystems by HM Deitel
 OperatingSystemsConcepts by Abraham
Silberschatz, Peter B.Galvin

More Related Content

Similar to operatingsystemsecurity-130717170639-phpapp01.pptx

TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Aditya K Sood
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
SC Leung
 
Browser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliBrowser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1Outli
VannaSchrader3
 
Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...
UltraUploader
 

Similar to operatingsystemsecurity-130717170639-phpapp01.pptx (20)

Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul Hobbs
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Spyware report
Spyware reportSpyware report
Spyware report
 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
How To Remove Browser Hijacker
How To Remove Browser HijackerHow To Remove Browser Hijacker
How To Remove Browser Hijacker
 
Browser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliBrowser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1Outli
 
Ch21 system administration
Ch21 system administration Ch21 system administration
Ch21 system administration
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...Automated web patrol with strider honey monkeys finding web sites that exploi...
Automated web patrol with strider honey monkeys finding web sites that exploi...
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS Publications
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 

operatingsystemsecurity-130717170639-phpapp01.pptx

  • 2.  Introduction  ComputerSystemSecurity – InternetSecurity – RemoteSharing – Software Installation  OperatingSystemSecurity – AccessControl – Supervision – ResourceAllocation
  • 3.  World Population roughly 6 billion  Computers in this world roughly 2.25 billion  Internet user roughly 2 billion  Millions of computer are tied together via communication network (mostly telephone system)
  • 4. WORLDINTERNET USAGE AND POPULATION STATISTICS World Regions Population Internet Users Internet Users ( 2009 Est.) Dec. 31, 2000 Latest Data Penetration (% Population) Growth 2000-2009 Users % of Table Africa 991,002,342 4,514,400 86,217,900 8.7 % 1,809.8 % 4.8 % Asia 3,808,070,503 114,304,000 764,435,900 20.1 % 568.8 % 42.4 % Europe 803,850,858 105,096,093 425,773,571 53.0 % 305.1 % 23.6 % Middle East 202,687,005 3,284,800 58,309,546 28.8 % 1,675.1 % 3.2 % North America 340,831,831 108,096,800 259,561,000 76.2 % 140.1 % 14.4 % Latin America/Caribbean 586,662,468 18,068,919 186,922,050 31.9 % 934.5 % 10.4 % Oceania / Australia 34,700,201 7,620,480 21,110,490 60.8 % 177.0 % 1.2 % WORLD TOTAL 6,767,805,208 360,985,492 1,802,330,457 26.6 % 399.3 % 100.0 %
  • 5.  ExternalSecurity (InterfaceSecurity) – PhysicalSecurity – Operational Security • Classifications • Division of Responsibilities  InternalSecurity
  • 6.  Surveillance (mean: close observation, especially of a suspected spy or criminal) – Authentication  Threat Monitoring – No DirectAccess – Surveillance Programs like supervisor  Amplification – Example:Taxpayers information
  • 7.  Password Protection – Weaknesses – Solutions  Auditing – AuditOccasionally – Audit Log
  • 8.  AccessControls – Access based onClassifications  Security Kernels – Beginning rather than retrofitted  HardwareSecurity – IncorporateOperating System Functions
  • 9.  Fault-TolerantSystems – Hardware rather than Software • Major Portion ofOperatingSystem • Fault Detection – Multiple I/O subsystems
  • 10.  What isCryptography?  A cryptographic PrivacySystem – Sender – EncryptionUnit – Ciphertext or cryptogram – DecryptionUnit – Receiver * Decryption Key
  • 11.  Cryptanalysis A process of attempting to regenerate plaintext from ciphertext but without knowing the decryption key  Public KeySystems – Different Keys  DigitalSignature
  • 12.  What areViruses?  How they affect the system?  What areAntiviruses? – Detect Infections – Prevent Infections – Recover Infections  Antiviruses are watchdogs  Sweeper Programs
  • 13.  ComputerWorms – Network based objects – Virus/Worms  Trojan horse – Allows a hacker remote access to a target computer system
  • 14.  Spyware – What is spyware? – What are adware? – Adwares andSpyware – Spyware,Viruses andWorms
  • 15.  CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites.  HuntBar, aka WinTools or Adware.Websearch, was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.  MyWebSearch (of Fun Web Products) has a plugin that displays a search toolbar near the top of a browser window, and it spies to report user search-habits. MyWebSearch is notable for installing over 210 computer settings, such as over 210 MS Windows registry keys/values.[39][40] Beyond the browser plugin, it has settings to affect Outlook, email, HTML, XML, etc. Although tools exist to remove MyWebSearch, it can be hand-deleted in 1 hour, by users familiar with using Regedit to find and delete keys/values (named with "MyWebSearch"). After reboot, the browser returns to the prior display appearance.  WeatherStudio has a plugin that displays a window-panel near the bottom of a browser window. The official website notes that it is easy to remove (uninstall) WeatherStudio from a computer, using its own uninstall-program, such as under C:Program FilesWeatherStudio. Once WeatherStudio is removed, a browser returns to the prior display appearance, without the need to modify the browser settings.
  • 16.  Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.  Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions company. It opens pop-up ads that cover over the Web sites of competing companies (as seen in their [ZangoEndUser LicenseAgreement]).  Zlob trojan, or just Zlob, downloads itself to a computer via an ActiveX codec and reports information back to Control Server[citation needed]. Some information can be the search- history, the Websites visited, and even keystrokes.[citation needed] More recently, Zlob has been known to hijack routers set to defaults.
  • 17.  avast! InternetSecurity 5.0 – http://www.pcmag.com/article2/0,2817,2358467,00.asp  AVG InternetSecurity 9.0 – http://www.pcmag.com/article2/0,2817,2355028,00.asp  BitDefenderTotalSecurity 2010 – http://www.pcmag.com/article2/0,2817,2351546,00.asp  Kaspersky InternetSecurity 2010 – http://www.pcmag.com/article2/0,2817,2351568,00.asp  McAfeeTotal Protection 2010 – http://www.pcmag.com/article2/0,2817,2358902,00.asp
  • 18.  What is Firewall?  Hardware Firewall – Broadband Routers  Software Firewall – Norton 360 – Norton InternetSecurity – ESETSecuritySmart – Kaspersky InternetSecurity
  • 19.  What is phishing?  Five steps to avoid phishing 1. SecureWebsites (https) 2. Authenticity of aWebsite (embedded links) 3. Thoroughly Investigate before submitting 4. Keep track of your online accounts 5. Have proper computer protection software
  • 20.  Day by day usage of computer systems  Hacking risks  Need of protection software  And after that, keep you eyes open when using internet or transmitting something on the network
  • 21.  http://howstuffworks.com/  http://pcmag.com/  http://net-security.org/  http://wikipedia.org/  OperatingSystems by HM Deitel  OperatingSystemsConcepts by Abraham Silberschatz, Peter B.Galvin