Angebote zu "Column" (87 Treffer)

Kategorien

Shops

Sphinx of Naxos
106,67 € *
ggf. zzgl. Versand

Naxian Sphinx of Delfi 4C.T. bc.Travellers can find sour handmade product in about 1 hour from Athens at Killix workshop. The Sphinx of Naxos, also Sphinx of the Naxians, now in the Archaeological Museum of Delphi, is a colossal 2.22 meter tall marble statue of a sphinx, a mythical creature with the head of a woman, the chest and wings composed of the impressive feathers of a prey bird turned upward, and the body of a lioness. The Sphinx stood on a 10 meters column that culminated in one of the first Ionic capitals, and was erected next to the Temple of Apollo in Delphi, the religious center of Ancient Greece, in 560 BCE.The first fragments were excavated from the sanctuary of the Temple of Apollo in Delphi, in 1860. The remainder was found in 1893. It was originally set up on a stele around 560 BC as an offering to the Temple of Apollo by Naxos, one of the richest Cycladic islands at the time. The overall height of the statue, the column and its base topped 12.5 meters.

Anbieter: Viator – Ein Trip...
Stand: 06.06.2020
Zum Angebot
Dubrovnik Combo: Old Town and Ancient City Wall...
36,99 € *
ggf. zzgl. Versand

2 tours at a discount!Discover the best of Dubrovnik on a combined tour of Dubrovnik's Old Town and ancient city walls. With your local guide, explore Dubrovnik's Old Town, a UNESCO World Heritage Site, and see Orlando's Column, the City Bell Tower, the Rector's Palace and the Church of St Blaise. Then, explore the city ancient walls and see Fort Revelin and Minceta Tower. As you wander around Dubrovnik, learn the interesting history of this walled city from your knowledgeable local guide. Enjoy two bestselling product at a discounted price! P.S. Please keep in mind the schedule of the tours, they don't necessarily run one after the other.

Anbieter: Viator – Ein Trip...
Stand: 06.06.2020
Zum Angebot
Ostuni private tour: Beautiful old white town
190,00 € *
ggf. zzgl. Versand

Ostuni is one of the main tourist destinations of Puglia, called "White City" for the houses painted with white lime in the historical center.The guided tour of Ostuni will start from Libertà square, where there is the grand palace of the municipality and where stands the baroque column of Sant'Oronzo, almost 21 meters high.In Libertà Square you will also visit the archaeological excavations of the ancient walls and the defensive tower before taking Cattedrale street, full of local craft shops, commercial activities and typical local food product. You will then reach the cathedral dedicated to Santa Maria Assunta built in the fifteenth century. The façade is characterized by three elegant ogival portals and a large rose window of 24 rays.Following the tour will continue along the Aragonese walls where you can admire a beautiful landscape of the Valle d'Itria until you reach the Porta Nova gate, one of the ancient gate of the town.

Anbieter: Viator – Ein Trip...
Stand: 06.06.2020
Zum Angebot
Optimal Design of Three Product Divided Wall Co...
54,90 € *
ggf. zzgl. Versand

Optimal Design of Three Product Divided Wall Column ab 54.9 € als Taschenbuch: . Aus dem Bereich: Bücher, Wissenschaft, Technik,

Anbieter: hugendubel
Stand: 06.06.2020
Zum Angebot
Laddering: Unlocking the Potential of Consumer ...
9,95 € *
ggf. zzgl. Versand

Marketing and product development best practices for a fragmented economy. The rules for marketing and product development have changed forever. You no longer control where and how consumers receive marketing messages. The consumer is in charge, with ever-growing choices and a shrinking decision window. Therefore, it is crucial to understand what drives customer behavior to design products, marketing, and experiences that will succeed. Laddering explains how to better understand your customers' core values. Learn to ask the right questions from your customers, use it to analyze your data, and unlock the true potential of your product or service. Use Laddering techniques to map your customer's DNA and understand why consumers buy from you. Helps you look at your customers in a new way and as a result maximize your profits and reduce your support costs. Provides a framework for evaluating what marketing messages, campaigns and experiences are appropriate. Author Eric V. Holtzclaw is CEO and founder of User Insight, a user experience research firm and Laddering Works, a marketing strategy and consulting firm. His weekly radio show, The 'Better You' Project, shines a spotlight on entrepreneurs' business journeys, his column Lean Forward appears weekly on INC.com and he is regularly contributor to CMO.com. You must understand what is truly important in order to build relationships with consumers and to market for success in the new many-to-many economy. Laddering offers the tools and knowledge you need to thrive. 1. Language: English. Narrator: Eric V. Holtzclaw. Audio sample: http://samples.audible.de/bk/adbl/015642/bk_adbl_015642_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 06.06.2020
Zum Angebot
No-Hype Copywriting: The Keys to Lively, Appeal...
9,95 € *
ggf. zzgl. Versand

If screaming headlines and over-the-top phrasing make you want to hide your head in a bushel, get this guide to writing attention-getting yet honest and helpful sales copy. Whether you're a coach, author, financial advisor, B-to-B product manager or simply a professional who values trust, dignity and respect for clients, you'll find a framework for setting down a solid first draft and tweaking it into an effective selling tool. This concise handbook from a copywriting expert known for creative marketing leads beginning and intermediate writers through a three-step process of collecting the needed information, jazzing it up responsibly and then polishing it so it appeals to ideal customers. Discover: The five inescapable components of a complete marketing presentation and another element that adds oomph whenever it's appropriate. Why it's essential to provide more information for shoppers, rather than less - and how to identify the facts customers need. 10 ways to make yourself and what you're selling more credible. 21 no-hype writing techniques that make dull items much more desirable. Dozens of illuminating examples (many structured as "before" and "after"). 11 kinds of unethical or disreputable marketing tactics to avoid so you maintain self-respect and buyers' trust. 12 methods of fine-tuning your headline for greater reader intrigue and curiosity. How and why to tinker with your tone. 8 techniques for making whatever you wrote more direct, clear and powerful. This is a resource you'll want to consult again and again to transform a boring, weak promotion into one that sings you honorably into the profit column. Marcia Yudkin is the author of Meatier Marketing Copy, Persuading on Paper, 6 Steps to Free Publicity, and 13 other traditionally published books, including a Book of the Month Club selection and another featured on 1. Language: English. Narrator: Marcia Yudkin. Audio sample: http://samples.audible.de/bk/bigh/000565/bk_bigh_000565_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 06.06.2020
Zum Angebot
T-SQL Querying
50,99 € *
ggf. zzgl. Versand

Updating both Inside Microsoft SQL Server 2008 T-SQL Programming (Microsoft Press, 2009) and Inside Microsoft SQL Server 2008 T-SQL Querying (Microsoft Press, 2009), the book gives database developers and administrators a detailed look at the internal architecture of T-SQL and a comprehensive programming reference. Tackle the toughest set-based querying and query tuning problems—guided by an author team with in-depth, inside knowledge of T-SQL. Deepen your understanding of architecture and internals—and gain practical approaches and advanced techniques to optimize your code’s performance. The book covers many unique techniques that were developed, improved, and polished by the authors over many years of experience, providing highly efficient solutions for common challenges. There’s a deep focus on the performance and efficiency of the techniques and solutions that are covered. The book emphasizes correct understanding of the language and its underlying mathematical foundations. Product Description T-SQL insiders help you tackle your toughest queries and query-tuning problemsSqueeze maximum performance and efficiency from every T-SQL query you write or tune. Four leading experts take an in-depth look at T-SQL’s internal architecture and offer advanced practical techniques for optimizing response time and resource usage. Emphasizing a correct understanding of the language and its foundations, the authors present unique solutions they have spent years developing and refining. All code and techniques are fully updated to reflect new T-SQL enhancements in Microsoft SQL Server 2014 and SQL Server 2012.Write faster, more efficient T-SQL code:Move from procedural programming to the language of sets and logic Master an efficient top-down tuning methodology Assess algorithmic complexity to predict performance Compare data aggregation techniques, including new grouping sets Efficiently perform data-analysis calculations Make the most of T-SQL’s optimized bulk import tools Avoid date/time pitfalls that lead to buggy, poorly performing code Create optimized BI statistical queries without additional software Use programmable objects to accelerate queries Unlock major performance improvements with In-Memory OLTP Master useful and elegant approaches to manipulating graphs About This BookFor experienced T-SQL practitioners Includes coverage updated from Inside Microsoft SQL Server 2008 T-SQL Querying and Inside Microsoft SQL Server 2008 T-SQL Programming Valuable to developers, DBAs, BI professionals, and data scientists Covers many MCSE 70-464 and MCSA/MCSE 70-461 exam topics Features + Benefits Covers moving from procedural programming to the language of sets and logic Shows how to optimize query tuning with a top-down methodology Assesses algorithmic complexity to predict performance Compares data-aggregation techniques, including new grouping sets Foreword xvIntroduction xviiChapter 1: Logical query processing 1Logical query-processing phases 3Logical query-processing phases in brief 4Sample query based on customers/orders scenario 6Logical query-processing phase details 8Step 1: The FROM phase 8Step 2: The WHERE phase 14Step 3: The GROUP BY phase 15Step 4: The HAVING phase 16Step 5: The SELECT phase 17Step 6: The ORDER BY phase 20Step 7: Apply the TOP or OFFSET-FETCH filter 22Further aspects of logical query processing 26Table operators 26Window functions 35The UNION, EXCEPT, and INTERSECT operators 38Conclusion 39Chapter 2: Query tuning 41Internals 41Pages and extents 42Table organization 43Tools to measure query performance 53Access methods 57Table scan/unordered clustered index scan 57Unordered covering nonclustered index scan 60Ordered clustered index scan 62Ordered covering nonclustered index scan 63The storage engine’s treatment of scans 65Nonclustered index seek + range scan + lookups 81Unordered nonclustered index scan + lookups 91Clustered index seek + range scan 93Covering nonclustered index seek + range scan 94Cardinality estimates 97Legacy estimator vs. 2014 cardinality estimator 98Implications of underestimations and overestimations 99Statistics 101Estimates for multiple predicates 104Ascending key problem 107Unknowns 110Indexing features 115Descending indexes 115Included non-key columns 119Filtered indexes and statistics 120Columnstore indexes 123Inline index definition 130Prioritizing queries for tuning with extended events 131Index and query information and statistics 134Temporary objects 139Set-based vs. iterative solutions 149Query tuning with query revisions 153Parallel query execution 158How intraquery parallelism works 158Parallelism and query optimization 175The parallel APPLY query pattern 181Conclusion 186Chapter 3: Multi-table queries 187Subqueries 187Self-contained subqueries 187Correlated subqueries 189The EXISTS predicate 194Misbehaving subqueries 201Table expressions 204Derived tables 205CTEs 207Views 211Inline table-valued functions 215Generating numbers 215The APPLY operator 218The CROSS APPLY operator 219The OUTER APPLY operator 221Implicit APPLY 221Reuse of column aliases 222Joins 224Cross join 224Inner join 228Outer join 229Self join 230Equi and non-equi joins 230Multi-join queries 231Semi and anti semi joins 237Join algorithms 239Separating elements 245The UNION, EXCEPT, and INTERSECT operators 249The UNION ALL and UNION operators 250The INTERSECT operator 253The EXCEPT operator 255Conclusion 257Chapter 4: Grouping, pivoting, and windowing 259Window functions 259Aggregate window functions 260Ranking window functions 281Offset window functions 285Statistical window functions 288Gaps and islands 291Pivoting 299One-to-one pivot 300Many-to-one pivot 304Unpivoting 307Unpivoting with CROSS JOIN and VALUES 308Unpivoting with CROSS APPLY and VALUES 310Using the UNPIVOT operator 312Custom aggregations 313Using a cursor 314Using pivoting 315Specialized solutions 316Grouping sets 327GROUPING SETS subclause 328CUBE and ROLLUP clauses 331Grouping sets algebra 333Materializing grouping sets 334Sorting 337Conclusion 339Chapter 5: TOP and OFFSET-FETCH 341The TOP and OFFSET-FETCH filters 341The TOP filter 341The OFFSET-FETCH filter 345Optimization of filters demonstrated through paging 346Optimization of TOP 346Optimization of OFFSET-FETCH 354Optimization of ROW_NUMBER 358Using the TOP option with modifications 360TOP with modifications 360Modifying in chunks 361Top N per group 363Solution using ROW_NUMBER 364Solution using TOP and APPLY 365Solution using concatenation (a carry-along sort) 366Median 368Solution using PERCENTILE_CONT 369Solution using ROW_NUMBER 369Solution using OFFSET-FETCH and APPLY 370Conclusion 371Chapter 6: Data modification 373Inserting data 373SELECT INTO 373Bulk import 376Measuring the amount of logging 377BULK rowset provider 378Sequences 381Characteristics and inflexibilities of the identity property 381The sequence object 382Performance considerations 387Summarizing the comparison of identity with sequence 394Deleting data 395TRUNCATE TABLE 395Deleting duplicates 399Updating data 401Update using table expressions 402Update using variables 403Merging data 404MERGE examples 405Preventing MERGE conflicts 408ON isn't a filter 409USING is similar to FROM 410The OUTPUT clause 411Example with INSERT and identity 412Example for archiving deleted data 413Example with the MERGE statement 414Composable DML 417Conclusion 417Chapter 7: Working with date and time 419Date and time data types 419Date and time functions 422Challenges working with date and time 434Literals 434Identifying weekdays 436Handling date-only or time-only data with DATETIME and SMALLDATETIME 439First, last, previous, and next date calculations 440Search argument 445Rounding issues 447Querying date and time data 449Grouping by the week 449Intervals 450Conclusion 471Chapter 8: T-SQL for BI practitioners 473Data preparation 473Sales analysis view 474Frequencies 476Frequencies without window functions 476Frequencies with window functions 477Descriptive statistics for continuous variables 479Centers of a distribution 479Spread of a distribution 482Higher population moments 487Linear dependencies 495Two continuous variables 495Contingency tables and chi-squared 501Analysis of variance 505Definite integration 509Moving averages and entropy 512Moving averages 512Entropy 518Conclusion 522Chapter 9: Programmable objects 525Dynamic SQL 525Using the EXEC command 525Using the sp_execuThis book gives students a detailed look at the internal architecture of T-SQL and a comprehensive programming reference. Readers will tackle the toughest set-based querying and query tuning problems - guided by an author team with in-depth, inside knowledge of T-SQL. This book deepens student understanding of architecture and internals - and gives practical approaches and advanced techniques to optimize code performance. The book covers many unique techniques that provide highly efficient solutions for common challenges.

Anbieter: buecher
Stand: 06.06.2020
Zum Angebot
T-SQL Querying
50,99 € *
ggf. zzgl. Versand

Updating both Inside Microsoft SQL Server 2008 T-SQL Programming (Microsoft Press, 2009) and Inside Microsoft SQL Server 2008 T-SQL Querying (Microsoft Press, 2009), the book gives database developers and administrators a detailed look at the internal architecture of T-SQL and a comprehensive programming reference. Tackle the toughest set-based querying and query tuning problems—guided by an author team with in-depth, inside knowledge of T-SQL. Deepen your understanding of architecture and internals—and gain practical approaches and advanced techniques to optimize your code’s performance. The book covers many unique techniques that were developed, improved, and polished by the authors over many years of experience, providing highly efficient solutions for common challenges. There’s a deep focus on the performance and efficiency of the techniques and solutions that are covered. The book emphasizes correct understanding of the language and its underlying mathematical foundations. Product Description T-SQL insiders help you tackle your toughest queries and query-tuning problemsSqueeze maximum performance and efficiency from every T-SQL query you write or tune. Four leading experts take an in-depth look at T-SQL’s internal architecture and offer advanced practical techniques for optimizing response time and resource usage. Emphasizing a correct understanding of the language and its foundations, the authors present unique solutions they have spent years developing and refining. All code and techniques are fully updated to reflect new T-SQL enhancements in Microsoft SQL Server 2014 and SQL Server 2012.Write faster, more efficient T-SQL code:Move from procedural programming to the language of sets and logic Master an efficient top-down tuning methodology Assess algorithmic complexity to predict performance Compare data aggregation techniques, including new grouping sets Efficiently perform data-analysis calculations Make the most of T-SQL’s optimized bulk import tools Avoid date/time pitfalls that lead to buggy, poorly performing code Create optimized BI statistical queries without additional software Use programmable objects to accelerate queries Unlock major performance improvements with In-Memory OLTP Master useful and elegant approaches to manipulating graphs About This BookFor experienced T-SQL practitioners Includes coverage updated from Inside Microsoft SQL Server 2008 T-SQL Querying and Inside Microsoft SQL Server 2008 T-SQL Programming Valuable to developers, DBAs, BI professionals, and data scientists Covers many MCSE 70-464 and MCSA/MCSE 70-461 exam topics Features + Benefits Covers moving from procedural programming to the language of sets and logic Shows how to optimize query tuning with a top-down methodology Assesses algorithmic complexity to predict performance Compares data-aggregation techniques, including new grouping sets Foreword xvIntroduction xviiChapter 1: Logical query processing 1Logical query-processing phases 3Logical query-processing phases in brief 4Sample query based on customers/orders scenario 6Logical query-processing phase details 8Step 1: The FROM phase 8Step 2: The WHERE phase 14Step 3: The GROUP BY phase 15Step 4: The HAVING phase 16Step 5: The SELECT phase 17Step 6: The ORDER BY phase 20Step 7: Apply the TOP or OFFSET-FETCH filter 22Further aspects of logical query processing 26Table operators 26Window functions 35The UNION, EXCEPT, and INTERSECT operators 38Conclusion 39Chapter 2: Query tuning 41Internals 41Pages and extents 42Table organization 43Tools to measure query performance 53Access methods 57Table scan/unordered clustered index scan 57Unordered covering nonclustered index scan 60Ordered clustered index scan 62Ordered covering nonclustered index scan 63The storage engine’s treatment of scans 65Nonclustered index seek + range scan + lookups 81Unordered nonclustered index scan + lookups 91Clustered index seek + range scan 93Covering nonclustered index seek + range scan 94Cardinality estimates 97Legacy estimator vs. 2014 cardinality estimator 98Implications of underestimations and overestimations 99Statistics 101Estimates for multiple predicates 104Ascending key problem 107Unknowns 110Indexing features 115Descending indexes 115Included non-key columns 119Filtered indexes and statistics 120Columnstore indexes 123Inline index definition 130Prioritizing queries for tuning with extended events 131Index and query information and statistics 134Temporary objects 139Set-based vs. iterative solutions 149Query tuning with query revisions 153Parallel query execution 158How intraquery parallelism works 158Parallelism and query optimization 175The parallel APPLY query pattern 181Conclusion 186Chapter 3: Multi-table queries 187Subqueries 187Self-contained subqueries 187Correlated subqueries 189The EXISTS predicate 194Misbehaving subqueries 201Table expressions 204Derived tables 205CTEs 207Views 211Inline table-valued functions 215Generating numbers 215The APPLY operator 218The CROSS APPLY operator 219The OUTER APPLY operator 221Implicit APPLY 221Reuse of column aliases 222Joins 224Cross join 224Inner join 228Outer join 229Self join 230Equi and non-equi joins 230Multi-join queries 231Semi and anti semi joins 237Join algorithms 239Separating elements 245The UNION, EXCEPT, and INTERSECT operators 249The UNION ALL and UNION operators 250The INTERSECT operator 253The EXCEPT operator 255Conclusion 257Chapter 4: Grouping, pivoting, and windowing 259Window functions 259Aggregate window functions 260Ranking window functions 281Offset window functions 285Statistical window functions 288Gaps and islands 291Pivoting 299One-to-one pivot 300Many-to-one pivot 304Unpivoting 307Unpivoting with CROSS JOIN and VALUES 308Unpivoting with CROSS APPLY and VALUES 310Using the UNPIVOT operator 312Custom aggregations 313Using a cursor 314Using pivoting 315Specialized solutions 316Grouping sets 327GROUPING SETS subclause 328CUBE and ROLLUP clauses 331Grouping sets algebra 333Materializing grouping sets 334Sorting 337Conclusion 339Chapter 5: TOP and OFFSET-FETCH 341The TOP and OFFSET-FETCH filters 341The TOP filter 341The OFFSET-FETCH filter 345Optimization of filters demonstrated through paging 346Optimization of TOP 346Optimization of OFFSET-FETCH 354Optimization of ROW_NUMBER 358Using the TOP option with modifications 360TOP with modifications 360Modifying in chunks 361Top N per group 363Solution using ROW_NUMBER 364Solution using TOP and APPLY 365Solution using concatenation (a carry-along sort) 366Median 368Solution using PERCENTILE_CONT 369Solution using ROW_NUMBER 369Solution using OFFSET-FETCH and APPLY 370Conclusion 371Chapter 6: Data modification 373Inserting data 373SELECT INTO 373Bulk import 376Measuring the amount of logging 377BULK rowset provider 378Sequences 381Characteristics and inflexibilities of the identity property 381The sequence object 382Performance considerations 387Summarizing the comparison of identity with sequence 394Deleting data 395TRUNCATE TABLE 395Deleting duplicates 399Updating data 401Update using table expressions 402Update using variables 403Merging data 404MERGE examples 405Preventing MERGE conflicts 408ON isn't a filter 409USING is similar to FROM 410The OUTPUT clause 411Example with INSERT and identity 412Example for archiving deleted data 413Example with the MERGE statement 414Composable DML 417Conclusion 417Chapter 7: Working with date and time 419Date and time data types 419Date and time functions 422Challenges working with date and time 434Literals 434Identifying weekdays 436Handling date-only or time-only data with DATETIME and SMALLDATETIME 439First, last, previous, and next date calculations 440Search argument 445Rounding issues 447Querying date and time data 449Grouping by the week 449Intervals 450Conclusion 471Chapter 8: T-SQL for BI practitioners 473Data preparation 473Sales analysis view 474Frequencies 476Frequencies without window functions 476Frequencies with window functions 477Descriptive statistics for continuous variables 479Centers of a distribution 479Spread of a distribution 482Higher population moments 487Linear dependencies 495Two continuous variables 495Contingency tables and chi-squared 501Analysis of variance 505Definite integration 509Moving averages and entropy 512Moving averages 512Entropy 518Conclusion 522Chapter 9: Programmable objects 525Dynamic SQL 525Using the EXEC command 525Using the sp_execuThis book gives students a detailed look at the internal architecture of T-SQL and a comprehensive programming reference. Readers will tackle the toughest set-based querying and query tuning problems - guided by an author team with in-depth, inside knowledge of T-SQL. This book deepens student understanding of architecture and internals - and gives practical approaches and advanced techniques to optimize code performance. The book covers many unique techniques that provide highly efficient solutions for common challenges.

Anbieter: buecher
Stand: 06.06.2020
Zum Angebot
The Design and Implementation of the FreeBSD Op...
47,99 € *
ggf. zzgl. Versand

This book contains the most comprehensive, up-to-date, and authoritative technical information on the internal structure of the FreeBSD open-source operating system. Readers involved in technical and sales support can learn the capabilities of the system; applications developers can learn how to effectively and efficiently interface to the system; system administrators can learn how to maintain, tune, and configure the operating system; and systems programmers can learn how to extend and enhance the system. Appliance developers and systems integrators can learn how to best tailor FreeBSD, whose liberal open-source license is well matched to corporate use, to their own products. This book can be used in combination with a copy of the FreeBSD system for operating-systems courses. Product Description The most complete, authoritative technical guide to the FreeBSD kernel’s internal structure has now been extensively updated to cover all major improvements between Versions 5 and 11. Approximately one-third of this edition’s content is completely new, and another one-third has been extensively rewritten. Three long-time FreeBSD project leaders begin with a concise overview of the FreeBSD kernel’s current design and implementation. Next, they cover the FreeBSD kernel from the system-call level down–from the interface to the kernel to the hardware. Explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing each significant system facility, including process management, security, virtual memory, the I/O system, filesystems, socket IPC, and networking. This Second Edition • Explains highly scalable and lightweight virtualization using FreeBSD jails, and virtual-machine acceleration with Xen and Virtio device paravirtualization • Describes new security features such as Capsicum sandboxing and GELI cryptographic disk protection • Fully covers NFSv4 and Open Solaris ZFS support • Introduces FreeBSD’s enhanced volume management and new journaled soft updates • Explains DTrace’s fine-grained process debugging/profiling • Reflects major improvements to networking, wireless, and USB support Readers can use this guide as both a working reference and an in-depth study of a leading contemporary, portable, open source operating system. Technical and sales support professionals will discover both FreeBSD’s capabilities and its limitations. Applications developers will learn how to effectively and efficiently interface with it; system administrators will learn how to maintain, tune, and configure it; and systems programmers will learn how to extend, enhance, and interface with it. Marshall Kirk McKusick writes, consults, and teaches classes on UNIX- and BSD-related subjects. While at the University of California, Berkeley, he implemented the 4.2BSD fast filesystem. He was research computer scientist at the Berkeley Computer Systems Research Group (CSRG), overseeing development and release of 4.3BSD and 4.4BSD. He is a FreeBSD Foundation board member and a long-time FreeBSD committer. Twice president of the Usenix Association, he is also a member of ACM, IEEE, and AAAS. George V. Neville-Neil hacks, writes, teaches, and consults on security, networking, and operating systems. A FreeBSD Foundation board member, he served on the FreeBSD Core Team for four years. Since 2004, he has written the “Kode Vicious” column for Queue and Communications of the ACM. He is vice chair of ACM’s Practitioner Board and a member of Usenix Association, ACM, IEEE, and AAAS. Robert N.M. Watson is a University Lecturer in systems, security, and architecture in the Security Research Group at the University of Cambridge Computer Laboratory. He supervises advanced research in computer architecture, compilers, program analysis, operating systems, networking, and security. A FreeBSD Foundation board member, he served on the Core Team for ten years and has been a committer for fifteen years. He is a member of Usenix Association and ACM. Features + Benefits Adds a new chapter describing the Zettabyte filesystem Adds a new chapter on security including Capsicum security sandboxes Details the addition of super-page support in the virtual memory system Describes techniques for doing fine-grained symmetric-multiprocessing Updates information on networking, including virtual networks and¿new protocols such as SCTP This edition will feature a full line of instructor resources Preface xxi About the Authors xxix Part I: Over view 1 Chapter 1: History and Goals 3 1.1 History of the UNIX System 3 1.2 BSD and Other Systems 7 1.3 The Transition of BSD to Open Source 9 1.4 The FreeBSD Development Model 14 References 17 Chapter 2: Design Overview of FreeBSD 21 2.1 FreeBSD Facilities and the Kernel 21 2.2 Kernel Organization 23 2.3 Kernel Services 26 2.4 Process Management 26 2.5 Security 29 2.6 Memory Management 36 2.7 I/O System Overview 39 2.8 Devices 44 2.9 The Fast Filesystem 45 2.10 The Zettabyte Filesystem 49 2.11 The Network Filesystem 50 2.12 Interprocess Communication 50 2.13 Network-Layer Protocols 51 2.14 Transport-Layer Protocols 52 2.15 System Startup and Shutdown 52 Exercises 54 References 54 Chapter 3: Kernel Services 57 3.1 Kernel Organization 57 3.2 System Calls 62 3.3 Traps and Interrupts 64 3.4 Clock Interrupts 65 3.5 Memory-Management Services 69 3.6 Timing Services 73 3.7 Resource Services 75 3.8 Kernel Tracing Facilities 77 Exercises 84 References 85 Part II: Processes 87 Chapter 4: Process Management 89 4.1 Introduction to Process Management 89 4.2 Process State 92 4.3 Context Switching 99 4.4 Thread Scheduling 114 4.5 Process Creation 126 4.6 Process Termination 128 4.7 Signals 129 4.8 Process Groups and Sessions 136 4.9 Process Debugging 142 Exercises 144 References 146 Chapter 5: Security 147 5.1 Operating-System Security 148 5.2 Security Model 149 5.3 Process Credentials 151 5.4 Users and Groups 154 5.5 Privilege Model 157 5.6 Interprocess Access Control 159 5.7 Discretionary Access Control 161 5.8 Capsicum Capability Model 174 5.9 Jails 180 5.10 Mandatory Access-Control Framework 184 5.11 Security Event Auditing 200 5.12 Cryptographic Services 206 5.13 GELI Full-Disk Encryption 212 Exercises 217 References 217 Chapter 6: Memory Management 221 6.1 Terminology 221 6.2 Overview of the FreeBSD Virtual-Memory System 227 6.3 Kernel Memory Management 230 6.4 Per-Process Resources 244 6.5 Shared Memory 250 6.6 Creation of a New Process 258 6.7 Execution of a File 262 6.8 Process Manipulation of Its Address Space 263 6.9 Termination of a Process 266 6.10 The Pager Interface 267 6.11 Paging 276 6.12 Page Replacement 289 6.13 Portability 298 Exercises 308 References 310 Part III: I/OSystem 313 Chapter 7: I/O System Overview 315 7.1 Descriptor Management and Services 316 7.2 Local Interprocess Communication 333 7.3 The Virtual-Filesystem Interface 339 7.4 Filesystem-Independent Services 344 7.5 Stackable Filesystems 352 Exercises 358 References 359 Chapter 8: Devices 361 8.1 Device Overview 361 8.2 I/O Mapping from User to Device 367 8.3 Character Devices 370 8.4 Disk Devices 374 8.5 Network Devices 378 8.6 Terminal Handling 382 8.7 The GEOM Layer 391 8.8 The CAM Layer 399 8.9 Device Configuration 402 8.10 Device Virtualization 414 Exercises 428 References 429 Chapter 9: The Fast Filesystem 431 9.1 Hierarchical Filesystem Management 431 9.2 Structure of an Inode 433 9.3 Naming 443 9.4 Quotas 451 9.5 File Locking 454 9.6 Soft Updates 459 9.7 Filesystem Snapshots 480 9.8 Journaled Soft Updates 487 9.9 The Local Filestore 496 9.10 The Berkeley Fast Filesystem 501 Exercises 517 References 519 Chapter 10: The Zettabyte Filesystem 523 10.1 Introduction 523 10.2 ZFS Organization 527 10.3 ZFS Structure 532 10.4 ZFS Operation 535 10.5 ZFS Design Tradeoffs 547 Exercises 549 References 549 Chapter 11: The Network Filesystem 551 11.1 Overview 551 11.2 Structure and Operation 553 11.3 NFS Evolution 567 Exercises 586 References 587 Part IV: Interprocess Communication 591 Chapter 12: Interprocess Communication 593 12.1 Interprocess-Communication Model 593 12.2 Implementation Structure and Overview 599 12.3 Memory Management 601 12.4 IPC Data Structures 606 12.5 Connection Setup 612 12.6 Data Transfer 615 12.7 Socket Shutdown 620 12.8 Network-Communication Protocol Internal Structure 621 12.9 Socket-to-Protocol Interface 626 12.10 Protocol-to-Protocol Interface 631 12.11 Protocol-to-Network Interface 634 12.12 Buffering and Flow Control 643 12.13 Network Virtualization 644 Exercises 646 References 648 Chapter 13: Network-Layer Protocols 649 13.1 Internet Protocol Version 4 650 13.2 Internet Control Message Protocols (ICMP) 657 13.3 Internet Protocol Version 6 659 13.4 Internet Protocols Code Structure 670 13.5 Routing 675 13.6 Raw Sockets 686 13.7 Security 688 13.8 Packet-Processing Frameworks 700 Exercises 715 References 717 Chapter 14: Transport-Layer Protocols 721 14.1 Internet Ports and Associations 721 14.2 User Datagram Protocol (UDP) 723 14.3 Transmission Control Protocol (TCP) 725 14.4 TCP Algorithms 732 14.5 TCP Input Processing 741 14.6 TCP Output Processing 745 14.7 Stream Control Transmission Protocol (SCTP) 761 Exercises 768 References 770 Part V: System Operation 773 Chapter 15: System Startup and Shutdown 775 15.1 Firmware and BIOSes 776 15.2 Boot Loaders 777 15.3 Kernel Boot 782 15.4 User-Level Initialization 798 15.5 System Operation 800 Exercises 805 References 806 Glossary 807 Index 847This book contains comprehensive, up-to-date, and authoritative technical information on the internal structure of the FreeBSD open-source operating system. Coverage includes the capabilities of the system; how to effectively and efficiently interface to the system; how to maintain, tune, and configure the operating system; and how to extend and enhance the system. The authors provide a concise overview of FreeBSD's design and implementation. Then, while explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing the systems facilities. As a result, this book can be used as an operating systems textbook, a practical reference, or an in-depth study of a contemporary, portable, open-source operating system.

Anbieter: buecher
Stand: 06.06.2020
Zum Angebot