当前位置: 首页 > news >正文

《Operating System Concepts》阅读笔记:p636-p666

《Operating System Concepts》学习第 58 天,p636-p666 总结,总计 31 页。

一、技术总结

1.system and network threats

(1)attack network traffic

(2)denial of service

(3)port scanning

2.symmetric/asymmetric encryption algorithm

(1)symmetric encryption algorithm

A cryptography algorithm in which the same keys are used to encrypt and decrypt the message or data.

(2)asymmetric encryption algorithm

A cipher algorithm in which different keys are used for encryption and decryption.

二、英语总结(生词:3)

1.masquerade

(1)masquerade: maschera(“mask”) + -ade(suffix that indicating an action or process)

c/u. behavior that is intended to prevent truth from being known(掩饰);vi. to pretend to be(伪装)。

(2)示例

Alternatively, an attacker can take a more active role, either masquerading as one of the parties (referred to as spoofing), or becoming a fully active man-in-the-middle, intercepting and possibly modifying transactions between two peers(《Operating System Concepts》第 636 页)。

2.defense

(1)defend: de-(“away, off”) + fendere(“to strike, hit, push”)

vi/vt. defend literally means to push away an attack(to protect from harm,保护,防卫,捍卫).

(2)defense

u. the act of pretect sth against attack。需要注意用法:defense of, defense against。

(3)示例

He published an essay in defense of the freedom of the press(新闻)。

There are many defenses against computer attacks, running the gamut from methodology to technology(《Operating System Concepts》第 637 页)。

3.ask

(1)be asking for it/trouble(自找麻烦)

However, for applications where security matters, we are asking for trouble if we assume that the source or destination address of a packet reliably determines who sent or received that packet(《Operating System Concepts》第 638 页)。

关于英语的注解同步更新汇总到 https://github.com/codists/English-In-CS-Books 仓库。

三、其它

第 16 章(security)简评:该章节对security领域提纲挈领地的进行了介绍,相对而言较简单,只是个入门。

四、参考资料

1. 编程

(1) Abraham Silberschatz,Peter Baer Galvin,Greg Gagne《Operating System Concepts》:https://book.douban.com/subject/30272539/

2. 英语

(1) Etymology Dictionary:https://www.etymonline.com

(2) Cambridge Dictionary:https://dictionary.cambridge.org

欢迎搜索及关注:编程人(a_codists)

相关文章:

  • OTA技术(一):原理与实现方案
  • AI日报 - 2025年4月13日
  • C++ 标准库中的 <algorithm> 头文件算法总结
  • 【C++】前向声明(Forward Declaration)
  • Interaction Toolkit 新版模拟器快捷键
  • [NOIP 2003 普及组] 栈 Java
  • OSM路网简化文档+实操视频讲解(道路中心线提取、拓扑检查,学术论文处理方式)11
  • 基于kitti格式纯点云数据的centerpoint目标检测模型的转换(.pth转.onnx和.plan,更新中)
  • SpringBoot日志
  • 代码训练day25回溯p4
  • 嵌入式程序设计英语
  • java: 需要‘)‘ java: 未结束的字符串文字,java: 不是语句,怎么解决
  • C++ (初始C++,命名空间,引用,函数增强)
  • Java-分布式锁tryLock(0, TimeUnit.SECONDS)中0的含义
  • 大模型中提到的分词器是什么
  • C++算法优化实战:破解性能瓶颈,提升程序效率
  • 【AI】使用 Hugging Face Transformers 进行文本摘要实现
  • (2)VTK C++开发示例 --- 绘制多面锥体
  • 预防WIFI攻击,保证网络安全
  • 《植物大战僵尸融合版v2.4.1》,塔防与创新融合的完美碰撞
  • 澎湃思想周报|哈佛与特朗普政府之争;学习适应“混乱世”
  • 阿塞拜疆总统阿利耶夫将访华
  • 《“四有”好老师系列丛书》发布,由顾明远总主编
  • 海南一男子涨潮时赶海与同伴走散,警民协同3小时将其救上岸
  • 马上评|机器人马拉松,也是具身智能产业的加速跑
  • 文理医工“四轮驱动”,复旦六大新工科创新学院核心团队均亮相