Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Intro to the Course | Download |
2 | Introduction to OS | Download |
3 | PC Hardware | Download |
4 | From Programs to Processes | Download |
5 | Sharing the CPU | Download |
6 | Introduction | Download |
7 | Virtual Memory | Download |
8 | MMU Mapping | Download |
9 | Segmentation | Download |
10 | Memory Management in xv6 | Download |
11 | PC Booting | Download |
12 | Week 3 Introduction | Download |
13 | Create Execute and Exit from Processes | Download |
14 | System Calls for Process Management | Download |
15 | Interrupts | Download |
16 | Interrupt Handling | Download |
17 | Software Interrupts and System calls | Download |
18 | CPU Context switching | Download |
19 | CPU Scheduling | Download |
20 | Priority Based Scheduling Algorithms | Download |
21 | Multi-Processor Scheduling | Download |
22 | Scheduling in Linux | Download |
23 | Completely Fair Scheduling | Download |
24 | Inter Process Communication | Download |
25 | Synchronization | Download |
26 | Software solutions for critical sections | Download |
27 | Bakery Algorithm | Download |
28 | Hardware Locks | Download |
29 | Mutexes | Download |
30 | Semaphores | Download |
31 | Dining Philosophers Problem | Download |
32 | Deadlocks | Download |
33 | Dealing with Deadlocks | Download |
34 | Threads Part 1 | Download |
35 | Threads Part 2 | Download |
36 | Operating system security | Download |
37 | Information Flow policies | Download |
38 | Buffer Overflows | Download |
39 | Preventing Buffer Overflow Attacks | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Intro to the Course | Download Verified |
2 | Introduction to OS | Download Verified |
3 | PC Hardware | Download Verified |
4 | From Programs to Processes | Download Verified |
5 | Sharing the CPU | Download Verified |
6 | Introduction | Download Verified |
7 | Virtual Memory | Download Verified |
8 | MMU Mapping | Download Verified |
9 | Segmentation | Download Verified |
10 | Memory Management in xv6 | Download Verified |
11 | PC Booting | Download Verified |
12 | Week 3 Introduction | Download Verified |
13 | Create Execute and Exit from Processes | Download Verified |
14 | System Calls for Process Management | Download Verified |
15 | Interrupts | Download Verified |
16 | Interrupt Handling | Download Verified |
17 | Software Interrupts and System calls | Download Verified |
18 | CPU Context switching | Download Verified |
19 | CPU Scheduling | Download Verified |
20 | Priority Based Scheduling Algorithms | Download Verified |
21 | Multi-Processor Scheduling | Download Verified |
22 | Scheduling in Linux | Download Verified |
23 | Completely Fair Scheduling | Download Verified |
24 | Inter Process Communication | Download Verified |
25 | Synchronization | Download Verified |
26 | Software solutions for critical sections | Download Verified |
27 | Bakery Algorithm | Download Verified |
28 | Hardware Locks | Download Verified |
29 | Mutexes | Download Verified |
30 | Semaphores | Download Verified |
31 | Dining Philosophers Problem | Download Verified |
32 | Deadlocks | Download Verified |
33 | Dealing with Deadlocks | Download Verified |
34 | Threads Part 1 | Download Verified |
35 | Threads Part 2 | Download Verified |
36 | Operating system security | Download Verified |
37 | Information Flow policies | Download Verified |
38 | Buffer Overflows | Download Verified |
39 | Preventing Buffer Overflow Attacks | Download Verified |
Sl.No | Chapter Name | Bengali |
---|---|---|
1 | Intro to the Course | Download |
2 | Introduction to OS | Download |
3 | PC Hardware | Download |
4 | From Programs to Processes | Download |
5 | Sharing the CPU | Download |
6 | Introduction | Download |
7 | Virtual Memory | Download |
8 | MMU Mapping | Download |
9 | Segmentation | Download |
10 | Memory Management in xv6 | Download |
11 | PC Booting | Download |
12 | Week 3 Introduction | Download |
13 | Create Execute and Exit from Processes | Download |
14 | System Calls for Process Management | Download |
15 | Interrupts | Download |
16 | Interrupt Handling | Download |
17 | Software Interrupts and System calls | Download |
18 | CPU Context switching | Download |
19 | CPU Scheduling | Download |
20 | Priority Based Scheduling Algorithms | Download |
21 | Multi-Processor Scheduling | Download |
22 | Scheduling in Linux | Download |
23 | Completely Fair Scheduling | Download |
24 | Inter Process Communication | Download |
25 | Synchronization | Download |
26 | Software solutions for critical sections | Download |
27 | Bakery Algorithm | Download |
28 | Hardware Locks | Download |
29 | Mutexes | Download |
30 | Semaphores | Download |
31 | Dining Philosophers Problem | Download |
32 | Deadlocks | Download |
33 | Dealing with Deadlocks | Download |
34 | Threads Part 1 | Download |
35 | Threads Part 2 | Download |
36 | Operating system security | Download |
37 | Information Flow policies | Download |
38 | Buffer Overflows | Download |
39 | Preventing Buffer Overflow Attacks | Download |
Sl.No | Chapter Name | Gujarati |
---|---|---|
1 | Intro to the Course | Download |
2 | Introduction to OS | Download |
3 | PC Hardware | Download |
4 | From Programs to Processes | Download |
5 | Sharing the CPU | Download |
6 | Introduction | Download |
7 | Virtual Memory | Download |
8 | MMU Mapping | Download |
9 | Segmentation | Download |
10 | Memory Management in xv6 | Download |
11 | PC Booting | Download |
12 | Week 3 Introduction | Download |
13 | Create Execute and Exit from Processes | Download |
14 | System Calls for Process Management | Download |
15 | Interrupts | Download |
16 | Interrupt Handling | Download |
17 | Software Interrupts and System calls | Download |
18 | CPU Context switching | Download |
19 | CPU Scheduling | Download |
20 | Priority Based Scheduling Algorithms | Download |
21 | Multi-Processor Scheduling | Download |
22 | Scheduling in Linux | Download |
23 | Completely Fair Scheduling | Download |
24 | Inter Process Communication | Download |
25 | Synchronization | Download |
26 | Software solutions for critical sections | Download |
27 | Bakery Algorithm | Download |
28 | Hardware Locks | Download |
29 | Mutexes | Download |
30 | Semaphores | Download |
31 | Dining Philosophers Problem | Download |
32 | Deadlocks | Download |
33 | Dealing with Deadlocks | Download |
34 | Threads Part 1 | Download |
35 | Threads Part 2 | Download |
36 | Operating system security | Download |
37 | Information Flow policies | Download |
38 | Buffer Overflows | Download |
39 | Preventing Buffer Overflow Attacks | Download |
Sl.No | Chapter Name | Hindi |
---|---|---|
1 | Intro to the Course | Download |
2 | Introduction to OS | Download |
3 | PC Hardware | Download |
4 | From Programs to Processes | Download |
5 | Sharing the CPU | Download |
6 | Introduction | Download |
7 | Virtual Memory | Download |
8 | MMU Mapping | Download |
9 | Segmentation | Download |
10 | Memory Management in xv6 | Download |
11 | PC Booting | Download |
12 | Week 3 Introduction | Download |
13 | Create Execute and Exit from Processes | Download |
14 | System Calls for Process Management | Download |
15 | Interrupts | Download |
16 | Interrupt Handling | Download |
17 | Software Interrupts and System calls | Download |
18 | CPU Context switching | Download |
19 | CPU Scheduling | Download |
20 | Priority Based Scheduling Algorithms | Download |
21 | Multi-Processor Scheduling | Download |
22 | Scheduling in Linux | Download |
23 | Completely Fair Scheduling | Download |
24 | Inter Process Communication | Download |
25 | Synchronization | Download |
26 | Software solutions for critical sections | Download |
27 | Bakery Algorithm | Download |
28 | Hardware Locks | Download |
29 | Mutexes | Download |
30 | Semaphores | Download |
31 | Dining Philosophers Problem | Download |
32 | Deadlocks | Download |
33 | Dealing with Deadlocks | Download |
34 | Threads Part 1 | Download |
35 | Threads Part 2 | Download |
36 | Operating system security | Download |
37 | Information Flow policies | Download |
38 | Buffer Overflows | Download |
39 | Preventing Buffer Overflow Attacks | Download |
Sl.No | Chapter Name | Malayalam |
---|---|---|
1 | Intro to the Course | Download |
2 | Introduction to OS | Download |
3 | PC Hardware | Download |
4 | From Programs to Processes | Download |
5 | Sharing the CPU | Download |
6 | Introduction | Download |
7 | Virtual Memory | Download |
8 | MMU Mapping | Download |
9 | Segmentation | Download |
10 | Memory Management in xv6 | Download |
11 | PC Booting | Download |
12 | Week 3 Introduction | Download |
13 | Create Execute and Exit from Processes | Download |
14 | System Calls for Process Management | Download |
15 | Interrupts | Download |
16 | Interrupt Handling | Download |
17 | Software Interrupts and System calls | Download |
18 | CPU Context switching | Download |
19 | CPU Scheduling | Download |
20 | Priority Based Scheduling Algorithms | Download |
21 | Multi-Processor Scheduling | Download |
22 | Scheduling in Linux | Download |
23 | Completely Fair Scheduling | Download |
24 | Inter Process Communication | Download |
25 | Synchronization | Download |
26 | Software solutions for critical sections | Download |
27 | Bakery Algorithm | Download |
28 | Hardware Locks | Download |
29 | Mutexes | Download |
30 | Semaphores | Download |
31 | Dining Philosophers Problem | Download |
32 | Deadlocks | Download |
33 | Dealing with Deadlocks | Download |
34 | Threads Part 1 | Download |
35 | Threads Part 2 | Download |
36 | Operating system security | Download |
37 | Information Flow policies | Download |
38 | Buffer Overflows | Download |
39 | Preventing Buffer Overflow Attacks | Download |
Sl.No | Chapter Name | Marathi |
---|---|---|
1 | Intro to the Course | Download |
2 | Introduction to OS | Download |
3 | PC Hardware | Download |
4 | From Programs to Processes | Download |
5 | Sharing the CPU | Download |
6 | Introduction | Download |
7 | Virtual Memory | Download |
8 | MMU Mapping | Download |
9 | Segmentation | Download |
10 | Memory Management in xv6 | Download |
11 | PC Booting | Download |
12 | Week 3 Introduction | Download |
13 | Create Execute and Exit from Processes | Download |
14 | System Calls for Process Management | Download |
15 | Interrupts | Download |
16 | Interrupt Handling | Download |
17 | Software Interrupts and System calls | Download |
18 | CPU Context switching | Download |
19 | CPU Scheduling | Download |
20 | Priority Based Scheduling Algorithms | Download |
21 | Multi-Processor Scheduling | Download |
22 | Scheduling in Linux | Download |
23 | Completely Fair Scheduling | Download |
24 | Inter Process Communication | Download |
25 | Synchronization | Download |
26 | Software solutions for critical sections | Download |
27 | Bakery Algorithm | Download |
28 | Hardware Locks | Download |
29 | Mutexes | Download |
30 | Semaphores | Download |
31 | Dining Philosophers Problem | Download |
32 | Deadlocks | Download |
33 | Dealing with Deadlocks | Download |
34 | Threads Part 1 | Download |
35 | Threads Part 2 | Download |
36 | Operating system security | Download |
37 | Information Flow policies | Download |
38 | Buffer Overflows | Download |
39 | Preventing Buffer Overflow Attacks | Download |
Sl.No | Chapter Name | Tamil |
---|---|---|
1 | Intro to the Course | Download |
2 | Introduction to OS | Download |
3 | PC Hardware | Download |
4 | From Programs to Processes | Download |
5 | Sharing the CPU | Download |
6 | Introduction | Download |
7 | Virtual Memory | Download |
8 | MMU Mapping | Download |
9 | Segmentation | Download |
10 | Memory Management in xv6 | Download |
11 | PC Booting | Download |
12 | Week 3 Introduction | Download |
13 | Create Execute and Exit from Processes | Download |
14 | System Calls for Process Management | Download |
15 | Interrupts | Download |
16 | Interrupt Handling | Download |
17 | Software Interrupts and System calls | Download |
18 | CPU Context switching | Download |
19 | CPU Scheduling | Download |
20 | Priority Based Scheduling Algorithms | Download |
21 | Multi-Processor Scheduling | Download |
22 | Scheduling in Linux | Download |
23 | Completely Fair Scheduling | Download |
24 | Inter Process Communication | Download |
25 | Synchronization | Download |
26 | Software solutions for critical sections | Download |
27 | Bakery Algorithm | Download |
28 | Hardware Locks | Download |
29 | Mutexes | Download |
30 | Semaphores | Download |
31 | Dining Philosophers Problem | Download |
32 | Deadlocks | Download |
33 | Dealing with Deadlocks | Download |
34 | Threads Part 1 | Download |
35 | Threads Part 2 | Download |
36 | Operating system security | Download |
37 | Information Flow policies | Download |
38 | Buffer Overflows | Download |
39 | Preventing Buffer Overflow Attacks | Download |
Sl.No | Chapter Name | Telugu |
---|---|---|
1 | Intro to the Course | Download |
2 | Introduction to OS | Download |
3 | PC Hardware | Download |
4 | From Programs to Processes | Download |
5 | Sharing the CPU | Download |
6 | Introduction | Download |
7 | Virtual Memory | Download |
8 | MMU Mapping | Download |
9 | Segmentation | Download |
10 | Memory Management in xv6 | Download |
11 | PC Booting | Download |
12 | Week 3 Introduction | Download |
13 | Create Execute and Exit from Processes | Download |
14 | System Calls for Process Management | Download |
15 | Interrupts | Download |
16 | Interrupt Handling | Download |
17 | Software Interrupts and System calls | Download |
18 | CPU Context switching | Download |
19 | CPU Scheduling | Download |
20 | Priority Based Scheduling Algorithms | Download |
21 | Multi-Processor Scheduling | Download |
22 | Scheduling in Linux | Download |
23 | Completely Fair Scheduling | Download |
24 | Inter Process Communication | Download |
25 | Synchronization | Download |
26 | Software solutions for critical sections | Download |
27 | Bakery Algorithm | Download |
28 | Hardware Locks | Download |
29 | Mutexes | Download |
30 | Semaphores | Download |
31 | Dining Philosophers Problem | Download |
32 | Deadlocks | Download |
33 | Dealing with Deadlocks | Download |
34 | Threads Part 1 | Download |
35 | Threads Part 2 | Download |
36 | Operating system security | Download |
37 | Information Flow policies | Download |
38 | Buffer Overflows | Download |
39 | Preventing Buffer Overflow Attacks | Download |