SlideShare a Scribd company logo
UNIX/Linux vs. Mac vs. Windows
Prince Young,
Robert Evans,
Stephanie Wilburn,
Tiana Veale,
Verne Weikle,
Wendy Lile
POS/355
University of Phoenix
July 8, 2013
Jeff Rugg
Introduction
Memory management
Process management
File management
Security
Graphic References
Conclusion
References
• Department of Homeland Security. (n.d.).Security Tip (ST04-003).
Retrieved from https://www.us-cert.gov/ncas/tips/ST04-003
• Developer.apple.com (June 28, 2013).Memory Usage
Performance Guidelines. Retrieved from:
https://developer.apple.com/library/mac/#documentation/Perform
ance/Conceptual/ManagingMemory/Articles/AboutMemory.html
• Hacker. (2013). In Merriam-Webster. Retrieved from
http://www.Merriam-webster.com/dictionary/hacker
• Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating
system concepts: Update (8th ed.). Hoboken, NJ:Wiley & Sons.
• Stallings, W. (2012). Operating Systems Internal and Design
Principles (7th ed.). Retrieved from The University of Phoenix
eBook Collection database.
• Types of Threats. (2013). Retrieved from
http://www.zbshareware.com/threats/types_threats.html

More Related Content

Viewers also liked

Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Securitypankaj009
 
Difference between various operating systems on the basis of single user ,mul...
Difference between various operating systems on the basis of single user ,mul...Difference between various operating systems on the basis of single user ,mul...
Difference between various operating systems on the basis of single user ,mul...Anu Garg
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
Nicolas Demetriou
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
Vibhanshu Chaturvedi
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
sohaildanish
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
Kernel TLV
 
Chapter 10
Chapter 10Chapter 10
Chapter 10 Google
 
Unix Security
Unix SecurityUnix Security
Unix Security
Unix SecurityUnix Security
Unix Security
replay21
 
Features of windows operating system
Features of windows operating systemFeatures of windows operating system
Features of windows operating system
Mohammad Alig
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
Abou Bakr Ashraf
 
Unix operating system
Unix operating systemUnix operating system
Unix operating system
ABhay Panchal
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 

Viewers also liked (17)

Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Difference between various operating systems on the basis of single user ,mul...
Difference between various operating systems on the basis of single user ,mul...Difference between various operating systems on the basis of single user ,mul...
Difference between various operating systems on the basis of single user ,mul...
 
Mobile operating systems
Mobile operating systemsMobile operating systems
Mobile operating systems
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
Linux v/s Windows
Linux v/s WindowsLinux v/s Windows
Linux v/s Windows
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Unix Security
Unix SecurityUnix Security
Unix Security
 
Unix Security
Unix SecurityUnix Security
Unix Security
 
Features of windows operating system
Features of windows operating systemFeatures of windows operating system
Features of windows operating system
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Unix operating system
Unix operating systemUnix operating system
Unix operating system
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Unix linux vmacvwindowspptx2

Higher Education Testimonials from Splunk Customers
Higher Education Testimonials from Splunk CustomersHigher Education Testimonials from Splunk Customers
Higher Education Testimonials from Splunk Customers
Adam Tice
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Dr. Anish Cheriyan (PhD)
 
Advancing Foundation and Practice of Software Analytics
Advancing Foundation and Practice of Software AnalyticsAdvancing Foundation and Practice of Software Analytics
Advancing Foundation and Practice of Software Analytics
Tao Xie
 
Web crawlingchapter
Web crawlingchapterWeb crawlingchapter
Web crawlingchapter
Borseshweta
 
Preventing data loss
Preventing data lossPreventing data loss
Preventing data loss
IUPUI
 
Operating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdfOperating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdf
DrAmarNathDhebla
 
Responsible conduct of research: Data Management
Responsible conduct of research: Data ManagementResponsible conduct of research: Data Management
Responsible conduct of research: Data Management
C. Tobin Magle
 
Mining Sociotechnical Information From Software Repositories
Mining Sociotechnical Information From Software RepositoriesMining Sociotechnical Information From Software Repositories
Mining Sociotechnical Information From Software Repositories
Marco Aurelio Gerosa
 
Software Mining and Software Datasets
Software Mining and Software DatasetsSoftware Mining and Software Datasets
Software Mining and Software Datasets
Tao Xie
 
UMLassure: An approach to model software security
UMLassure: An approach to model software securityUMLassure: An approach to model software security
UMLassure: An approach to model software security
manishthaper
 
A Multimodal Learning Analytics view of HTML5 APIs: technical benefits and pr...
A Multimodal Learning Analytics view of HTML5 APIs: technical benefits and pr...A Multimodal Learning Analytics view of HTML5 APIs: technical benefits and pr...
A Multimodal Learning Analytics view of HTML5 APIs: technical benefits and pr...
Technological Ecosystems for Enhancing Multiculturality
 
Gadgets in the Library: Part 2
Gadgets in the Library: Part 2Gadgets in the Library: Part 2
Gadgets in the Library: Part 2ALATechSource
 
EPrints and the Cloud
EPrints and the CloudEPrints and the Cloud
EPrints and the Cloud
Leslie Carr
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Dr. Anish Cheriyan (PhD)
 
Software Management Plans and Software as Data
Software Management Plans and Software as DataSoftware Management Plans and Software as Data
Software Management Plans and Software as Data
Sarah Anna Stewart
 
Success does not come so easy
Success does not come so easySuccess does not come so easy
Success does not come so easymandym3
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous Delivery
SeniorStoryteller
 
2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery
devopsdaysaustin
 

Similar to Unix linux vmacvwindowspptx2 (20)

Higher Education Testimonials from Splunk Customers
Higher Education Testimonials from Splunk CustomersHigher Education Testimonials from Splunk Customers
Higher Education Testimonials from Splunk Customers
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
Advancing Foundation and Practice of Software Analytics
Advancing Foundation and Practice of Software AnalyticsAdvancing Foundation and Practice of Software Analytics
Advancing Foundation and Practice of Software Analytics
 
Web crawlingchapter
Web crawlingchapterWeb crawlingchapter
Web crawlingchapter
 
Preventing data loss
Preventing data lossPreventing data loss
Preventing data loss
 
Operating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdfOperating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdf
 
Responsible conduct of research: Data Management
Responsible conduct of research: Data ManagementResponsible conduct of research: Data Management
Responsible conduct of research: Data Management
 
Luis_resume
Luis_resumeLuis_resume
Luis_resume
 
Mining Sociotechnical Information From Software Repositories
Mining Sociotechnical Information From Software RepositoriesMining Sociotechnical Information From Software Repositories
Mining Sociotechnical Information From Software Repositories
 
Software Mining and Software Datasets
Software Mining and Software DatasetsSoftware Mining and Software Datasets
Software Mining and Software Datasets
 
Allison Stanfield
Allison StanfieldAllison Stanfield
Allison Stanfield
 
UMLassure: An approach to model software security
UMLassure: An approach to model software securityUMLassure: An approach to model software security
UMLassure: An approach to model software security
 
A Multimodal Learning Analytics view of HTML5 APIs: technical benefits and pr...
A Multimodal Learning Analytics view of HTML5 APIs: technical benefits and pr...A Multimodal Learning Analytics view of HTML5 APIs: technical benefits and pr...
A Multimodal Learning Analytics view of HTML5 APIs: technical benefits and pr...
 
Gadgets in the Library: Part 2
Gadgets in the Library: Part 2Gadgets in the Library: Part 2
Gadgets in the Library: Part 2
 
EPrints and the Cloud
EPrints and the CloudEPrints and the Cloud
EPrints and the Cloud
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 
Software Management Plans and Software as Data
Software Management Plans and Software as DataSoftware Management Plans and Software as Data
Software Management Plans and Software as Data
 
Success does not come so easy
Success does not come so easySuccess does not come so easy
Success does not come so easy
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous Delivery
 
2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery
 

More from Wendy Lile

Computer Science
Computer ScienceComputer Science
Computer Science
Wendy Lile
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
Wendy Lile
 
Cleaning up Texas air
Cleaning up Texas airCleaning up Texas air
Cleaning up Texas air
Wendy Lile
 
Web 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWeb 2.0 Revisited - Final project
Web 2.0 Revisited - Final project
Wendy Lile
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual propertiesWendy Lile
 
Gas pump program final Pptx
Gas pump program final PptxGas pump program final Pptx
Gas pump program final PptxWendy Lile
 
Gas pump program final
Gas pump program finalGas pump program final
Gas pump program finalWendy Lile
 
Website design and development part 1
Website design and development part 1Website design and development part 1
Website design and development part 1Wendy Lile
 
Interactive features
Interactive featuresInteractive features
Interactive featuresWendy Lile
 
Elias sitereview
Elias sitereviewElias sitereview
Elias sitereviewWendy Lile
 
Website evaluationpaperfinal
Website evaluationpaperfinalWebsite evaluationpaperfinal
Website evaluationpaperfinalWendy Lile
 
Succession and natural selection
Succession and natural selectionSuccession and natural selection
Succession and natural selectionWendy Lile
 
Population size
Population sizePopulation size
Population sizeWendy Lile
 
Mitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationMitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationWendy Lile
 
Energy resource plan
Energy resource planEnergy resource plan
Energy resource planWendy Lile
 
Energy resource challanges
Energy resource challangesEnergy resource challanges
Energy resource challangesWendy Lile
 
Business communication trends
Business communication trendsBusiness communication trends
Business communication trendsWendy Lile
 
Oral presentation
Oral presentationOral presentation
Oral presentationWendy Lile
 
Management case study
Management case studyManagement case study
Management case studyWendy Lile
 

More from Wendy Lile (20)

Computer Science
Computer ScienceComputer Science
Computer Science
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
 
Cleaning up Texas air
Cleaning up Texas airCleaning up Texas air
Cleaning up Texas air
 
Web 2.0 Revisited - Final project
Web 2.0 Revisited - Final projectWeb 2.0 Revisited - Final project
Web 2.0 Revisited - Final project
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties"Innovations" of copyright and intellectual properties
"Innovations" of copyright and intellectual properties
 
Gas pump program final Pptx
Gas pump program final PptxGas pump program final Pptx
Gas pump program final Pptx
 
Gas pump program final
Gas pump program finalGas pump program final
Gas pump program final
 
Website design and development part 1
Website design and development part 1Website design and development part 1
Website design and development part 1
 
Interactive features
Interactive featuresInteractive features
Interactive features
 
Elias sitereview
Elias sitereviewElias sitereview
Elias sitereview
 
Website evaluationpaperfinal
Website evaluationpaperfinalWebsite evaluationpaperfinal
Website evaluationpaperfinal
 
Succession and natural selection
Succession and natural selectionSuccession and natural selection
Succession and natural selection
 
Population size
Population sizePopulation size
Population size
 
Mitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservationMitigation strategies and solutions for energy conservation
Mitigation strategies and solutions for energy conservation
 
Energy resource plan
Energy resource planEnergy resource plan
Energy resource plan
 
Energy resource challanges
Energy resource challangesEnergy resource challanges
Energy resource challanges
 
Business communication trends
Business communication trendsBusiness communication trends
Business communication trends
 
Oral presentation
Oral presentationOral presentation
Oral presentation
 
Management case study
Management case studyManagement case study
Management case study
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Unix linux vmacvwindowspptx2

  • 1. UNIX/Linux vs. Mac vs. Windows Prince Young, Robert Evans, Stephanie Wilburn, Tiana Veale, Verne Weikle, Wendy Lile POS/355 University of Phoenix July 8, 2013 Jeff Rugg
  • 4.
  • 6.
  • 8.
  • 10.
  • 13. References • Department of Homeland Security. (n.d.).Security Tip (ST04-003). Retrieved from https://www.us-cert.gov/ncas/tips/ST04-003 • Developer.apple.com (June 28, 2013).Memory Usage Performance Guidelines. Retrieved from: https://developer.apple.com/library/mac/#documentation/Perform ance/Conceptual/ManagingMemory/Articles/AboutMemory.html • Hacker. (2013). In Merriam-Webster. Retrieved from http://www.Merriam-webster.com/dictionary/hacker • Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ:Wiley & Sons. • Stallings, W. (2012). Operating Systems Internal and Design Principles (7th ed.). Retrieved from The University of Phoenix eBook Collection database. • Types of Threats. (2013). Retrieved from http://www.zbshareware.com/threats/types_threats.html