13
UNIX/Linux vs. Mac vs. Windows Prince Young, Robert Evans, Stephanie Wilburn, Tiana Veale, Verne Weikle, Wendy Lile POS/355 University of Phoenix July 8, 2013 Jeff Rugg

Unix linux vmacvwindowspptx2

Embed Size (px)

Citation preview

Page 1: Unix linux vmacvwindowspptx2

UNIX/Linux vs. Mac vs. Windows

Prince Young, Robert Evans,

Stephanie Wilburn,

Tiana Veale,

Verne Weikle,

Wendy Lile

POS/355

University of Phoenix

July 8, 2013

Jeff Rugg

Page 2: Unix linux vmacvwindowspptx2

Introduction

Page 3: Unix linux vmacvwindowspptx2

Memory management

Page 4: Unix linux vmacvwindowspptx2
Page 5: Unix linux vmacvwindowspptx2

Process management

Page 6: Unix linux vmacvwindowspptx2
Page 7: Unix linux vmacvwindowspptx2

File management

Page 8: Unix linux vmacvwindowspptx2
Page 9: Unix linux vmacvwindowspptx2

Security

Page 10: Unix linux vmacvwindowspptx2
Page 11: Unix linux vmacvwindowspptx2

Graphic References

Page 12: Unix linux vmacvwindowspptx2

Conclusion

Page 13: Unix linux vmacvwindowspptx2

References

• Department of Homeland Security. (n.d.).Security Tip (ST04-003). Retrieved from https://www.us-cert.gov/ncas/tips/ST04-003

• Developer.apple.com (June 28, 2013).Memory Usage Performance Guidelines. Retrieved from: https://developer.apple.com/library/mac/#documentation/Performance/Conceptual/ManagingMemory/Articles/AboutMemory.html

• Hacker. (2013). In Merriam-Webster. Retrieved from http://www.Merriam-webster.com/dictionary/hacker

• Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ:Wiley & Sons.

• Stallings, W. (2012). Operating Systems Internal and Design Principles (7th ed.). Retrieved from The University of Phoenix eBook Collection database.

• Types of Threats. (2013). Retrieved from http://www.zbshareware.com/threats/types_threats.html