UNIX/Linux vs. Mac vs. Windows Prince Young, Robert Evans, Stephanie Wilburn, Tiana Veale, Verne Weikle, Wendy Lile POS/355 University of Phoenix July 8, 2013 Jeff Rugg
Introduction
Memory management
Process management
File management
Security
Graphic References
Conclusion
References • Department of Homeland Security. (n.d.).Security Tip (ST04-003). Retrieved from https://www.us-cert.gov/ncas/tips/ST04-003 • Developer.apple.com (June 28, 2013).Memory Usage Performance Guidelines. Retrieved from: https://developer.apple.com/library/mac/#documentation/Perform ance/Conceptual/ManagingMemory/Articles/AboutMemory.html • Hacker. (2013). In Merriam-Webster. Retrieved from http://www.Merriam-webster.com/dictionary/hacker • Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ:Wiley & Sons. • Stallings, W. (2012). Operating Systems Internal and Design Principles (7th ed.). Retrieved from The University of Phoenix eBook Collection database. • Types of Threats. (2013). Retrieved from http://www.zbshareware.com/threats/types_threats.html

Unix linux vmacvwindowspptx2

  • 1.
    UNIX/Linux vs. Macvs. Windows Prince Young, Robert Evans, Stephanie Wilburn, Tiana Veale, Verne Weikle, Wendy Lile POS/355 University of Phoenix July 8, 2013 Jeff Rugg
  • 2.
  • 3.
  • 5.
  • 7.
  • 9.
  • 11.
  • 12.
  • 13.
    References • Department ofHomeland Security. (n.d.).Security Tip (ST04-003). Retrieved from https://www.us-cert.gov/ncas/tips/ST04-003 • Developer.apple.com (June 28, 2013).Memory Usage Performance Guidelines. Retrieved from: https://developer.apple.com/library/mac/#documentation/Perform ance/Conceptual/ManagingMemory/Articles/AboutMemory.html • Hacker. (2013). In Merriam-Webster. Retrieved from http://www.Merriam-webster.com/dictionary/hacker • Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts: Update (8th ed.). Hoboken, NJ:Wiley & Sons. • Stallings, W. (2012). Operating Systems Internal and Design Principles (7th ed.). Retrieved from The University of Phoenix eBook Collection database. • Types of Threats. (2013). Retrieved from http://www.zbshareware.com/threats/types_threats.html