Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] D space 2nd 3rd 4th Daemon 2nd 3rd Data confidentiality Data integrity Data loss, accidental Data segment DDOS attack [See Distributed Denial Of Service attack] Deadlock 2nd banker's algorithm 2nd condition definition detection and recovery ostrich algorithm resource safe state Deadlock avoidance Deadlock handling, MINIX 3 Deadlock modeling Deadlock prevention Deadly embrace [See Deadlock] Debug dump Dedicated device Degree of multiprogramming Dekker's algorithm Demand paging Denial of service attack Descriptor table Design principles, security Detection, deadlock Device controller Device driver 2nd 3rd 4th MINIX 3 2nd 3rd 4th Device independence Device register Device-independent I/O, MINIX 3 Dining philosophers problem Direct memory access Directory 2nd 3rd hierarchical implementation NTFS UNIX Windows 2nd Directory management Directory operation Dirty bit Disk floppy 2nd 3rd hard Disk arm scheduling Disk block size Disk block, managing free blocks Disk hardware Disk operating system Disk optimization Disk partition Disk software Disk space management Diskette [See floppy disk] Diskless workstation Display driver, MINIX 3 Display software Distributed denial of service attack Distributed operating system Distributed shared memory Distributed system DMA [See Direct Memory Access] Domain, protection DOS [See Disk Operating System] DOS attack [See Denial of Service attack] Double indirect block Dump incremental logical physical |