当前位置: 首页 > news >正文

《Operating System Concepts》阅读笔记:p636-p666

《Operating System Concepts》学习第 58 天,p636-p666 总结,总计 31 页。

一、技术总结

1.system and network threats

(1)attack network traffic

(2)denial of service

(3)port scanning

2.symmetric/asymmetric encryption algorithm

(1)symmetric encryption algorithm

A cryptography algorithm in which the same keys are used to encrypt and decrypt the message or data.

(2)asymmetric encryption algorithm

A cipher algorithm in which different keys are used for encryption and decryption.

二、英语总结(生词:3)

1.masquerade

(1)masquerade: maschera(“mask”) + -ade(suffix that indicating an action or process)

c/u. behavior that is intended to prevent truth from being known(掩饰);vi. to pretend to be(伪装)。

(2)示例

Alternatively, an attacker can take a more active role, either masquerading as one of the parties (referred to as spoofing), or becoming a fully active man-in-the-middle, intercepting and possibly modifying transactions between two peers(《Operating System Concepts》第 636 页)。

2.defense

(1)defend: de-(“away, off”) + fendere(“to strike, hit, push”)

vi/vt. defend literally means to push away an attack(to protect from harm,保护,防卫,捍卫).

(2)defense

u. the act of pretect sth against attack。需要注意用法:defense of, defense against。

(3)示例

He published an essay in defense of the freedom of the press(新闻)。

There are many defenses against computer attacks, running the gamut from methodology to technology(《Operating System Concepts》第 637 页)。

3.ask

(1)be asking for it/trouble(自找麻烦)

However, for applications where security matters, we are asking for trouble if we assume that the source or destination address of a packet reliably determines who sent or received that packet(《Operating System Concepts》第 638 页)。

关于英语的注解同步更新汇总到 https://github.com/codists/English-In-CS-Books 仓库。

三、其它

第 16 章(security)简评:该章节对security领域提纲挈领地的进行了介绍,相对而言较简单,只是个入门。

四、参考资料

1. 编程

(1) Abraham Silberschatz,Peter Baer Galvin,Greg Gagne《Operating System Concepts》:https://book.douban.com/subject/30272539/

2. 英语

(1) Etymology Dictionary:https://www.etymonline.com

(2) Cambridge Dictionary:https://dictionary.cambridge.org

欢迎搜索及关注:编程人(a_codists)

相关文章:

  • OTA技术(一):原理与实现方案
  • AI日报 - 2025年4月13日
  • C++ 标准库中的 <algorithm> 头文件算法总结
  • 【C++】前向声明(Forward Declaration)
  • Interaction Toolkit 新版模拟器快捷键
  • [NOIP 2003 普及组] 栈 Java
  • OSM路网简化文档+实操视频讲解(道路中心线提取、拓扑检查,学术论文处理方式)11
  • 基于kitti格式纯点云数据的centerpoint目标检测模型的转换(.pth转.onnx和.plan,更新中)
  • SpringBoot日志
  • 代码训练day25回溯p4
  • 嵌入式程序设计英语
  • java: 需要‘)‘ java: 未结束的字符串文字,java: 不是语句,怎么解决
  • C++ (初始C++,命名空间,引用,函数增强)
  • Java-分布式锁tryLock(0, TimeUnit.SECONDS)中0的含义
  • 大模型中提到的分词器是什么
  • C++算法优化实战:破解性能瓶颈,提升程序效率
  • 【AI】使用 Hugging Face Transformers 进行文本摘要实现
  • (2)VTK C++开发示例 --- 绘制多面锥体
  • 预防WIFI攻击,保证网络安全
  • 《植物大战僵尸融合版v2.4.1》,塔防与创新融合的完美碰撞
  • 西湖大学独家回应本科招生走出浙江:经过三年试点,条件成熟
  • 商务部:一季度我国服务贸易较快增长,进出口总额同比增8.7%
  • 一季度我国服务进出口总额19741.8亿元,同比增长8.7%
  • 鄂湘赣“中三角”,能否走向文旅C位?
  • 央视曝光假进口保健品:警惕!保税仓发货不等于真进口
  • 高璞任中国一汽党委常委、副总经理