Angebote zu "Size" (40 Treffer)

Kategorien

Shops

Eisbär - Corson OS Mütze Gr One Size schwarz/grau
Top-Produkt
44,95 € *
zzgl. 2,95 € Versand

- Farbe: Schwarz/Grau; Gr: One Size; geeignet für Freizeit; Material: Hauptmaterial: 50% Wolle, 50% Polyacryl; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
Dreambox DM920 UHD 4K 1x DVB-S2X MultiStream Re...
426,00 € *
zzgl. 5,95 € Versand

Technical Details Dreambox DM920 ultraHD: * Dreambox OS * Dreambox API * CPU: Dual-Core 12K DMIPS * 2 x HDMI 2.0 (input and output) * 2 Plug&Play tuner slots * 3" Color LC-Display * Touch on/off * MPEG-2/H.264 decoder (Full HD) * H.265 decoder (Ultra HD) * Smartcard reader * SD-Card reader * 2 Common Interface slots (CI) * FPGA technology * 2 GB RAM * 8 GB Flash (EMMC) * Gigabit Ethernet interface * USB 3.0 * Mini USB service port (Flash rescue) * S/PDIF digital bitstream out * Automatic service scan * 2,5" harddisk slot for optional HDD up to 15 mm height * WiFI support (optional) * Web interface for PC and smartphone * DiSeqC 1.0, 1.1, 1.2, USALS, Unicable * Multistream support * FBC technology * Size: 270 x 187 x 60 mm (W x D x H)

Anbieter: Computeruniverse
Stand: 22.11.2019
Zum Angebot
Eisbär - Corson OS Mütze Gr One Size schwarz
Highlight
44,95 € *
zzgl. 2,95 € Versand

- Farbe: Schwarz; Gr: One Size; geeignet für Freizeit; Material: Hauptmaterial: 50% Wolle, 50% Polyacryl; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
Dreambox DM920 UHD 4K 2x DVB-S2X FBC MultiStrea...
529,00 € *
zzgl. 5,95 € Versand

Technical Details Dreambox DM920 ultraHD: * Dreambox OS * Dreambox API * CPU: Dual-Core 12K DMIPS * 2 x HDMI 2.0 (input and output) * 2 Plug&Play tuner slots * 3" Color LC-Display * Touch on/off * MPEG-2/H.264 decoder (Full HD) * H.265 decoder (Ultra HD) * Smartcard reader * SD-Card reader * 2 Common Interface slots (CI) * FPGA technology * 2 GB RAM * 8 GB Flash (EMMC) * Gigabit Ethernet interface * USB 3.0 * Mini USB service port (Flash rescue) * S/PDIF digital bitstream out * Automatic service scan * 2,5" harddisk slot for optional HDD up to 15 mm height * WiFI support (optional) * Web interface for PC and smartphone * DiSeqC 1.0, 1.1, 1.2, USALS, Unicable * Multistream support * FBC technology * Size: 270 x 187 x 60 mm (W x D x H)

Anbieter: Computeruniverse
Stand: 22.11.2019
Zum Angebot
Eisbär - Women's Cullen OS MÜ - Mütze Gr One Si...
Aktuell
49,95 € *
zzgl. 2,95 € Versand

Schöne Mütze im Beanie-Design - Farbe: Lila/Rot; Gr: One Size; Material: Außenmaterial: 50% Wolle, 50% Polyacryl, Innenmaterial: 100% Polyester; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
DELOCK 42566 - externes mSATA SSD Gehäuse, USB ...
59,67 € *
zzgl. 5,95 € Versand

In das Aluminium-Gehäuse von Delock kann eine mSATA SSD einbaut werden. Das Gehäuse kann via USB Type-C™ an einen PC oder ein Notebook angeschlossen werden. Mit Hilfe optionaler Kabel ist es auch möglich, dieses Gehäuse an eine USB Typ-A, eSATA oder eSATAp Schnittstelle anzuschließen.SpezifikationAnschlüsse extern: 1 x Multiport SuperSpeed USB 10 Gbps (USB 3.1 Gen 2) + eSATAp 6 Gb/s, 1 x DC für Stromzufuhr beim Anschluss über eSATAAnschlüsse intern: 1 x mSATA Slot (half size / full size)für mSATA Speicher 1,5 Gb/s, 3 Gb/s und 6 Gb/s SSD mit half size oder full sizeChipsatz: Asmedia ASM1351Gehäuse mit VollplatineLED Anzeige für PowerFarbe: schwarzMaße (LxBxH): ca. 82,5 x 60 x 12 mmHot Swap, Plug & PlayDatentransferraten:SuperSpeed USB 10 Gbps,SuperSpeed USB 5 Gbps,Hi-Speed 480 Mbps,Full-Speed 12 Mbps,Low-Speed 1,5 Mbps,eSATA 6 GbpsNetzteilspezifikation5 V, Masse außen, Plus innenMaße: innen: ø ca. 1,35 mm, außen: ø ca. 3,5 mm, Länge: ca. 8,5 mmSystemvoraussetzungenWindows 7/7-64/8.1/8.1-64/10/10-64, Mac OS 10.11, Linux Kernel 3.16PC oder Notebook mit einem freien USB Type-C™ PortPackungsinhaltexternes Gehäuse mSATAKabel USB Typ-A Stecker zu USB-C™ Stecker, Länge ca. 50 cmSchraubendreher, SchraubenBedienungsanleitungVerpackungRetail Box

Anbieter: reichelt elektronik
Stand: 22.11.2019
Zum Angebot
Eisbär - Soft OS MÜ - Mütze Gr One Size blau/sc...
Empfehlung
39,95 € *
zzgl. 2,95 € Versand

Super bequeme Mütze mit Kashmir - Farbe: Blau/Schwarz; Gr: One Size; Material: Außenmaterial: 40% Wolle, 30% Viskose, 20% Polyamid, 10% Kaschmir; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
Modern Operating Systems: Global Edition
61,99 € *
ggf. zzgl. Versand

Modern Operating Systems, Fourth Edition, is intended for introductory courses in Operating Systems in Computer Science, Computer Engineering, and Electrical Engineering programs. The widely anticipated revision of this worldwide best-seller incorporates the latest developments in operating systems (OS) technologies. The Fourth Edition includes up-to-date materials on relevant OS. Tanenbaum also provides information on current research based on his experience as an operating systems researcher. Modern Operating Systems, Third Edition was the recipient of the 2010 McGuffey Longevity Award. The McGuffey Longevity Award recognizes textbooks whose excellence has been demonstrated over time. http://taaonline.net/index.html Teaching and Learning Experience This program will provide a better teaching and learning experience–for you and your students. It will help: Provide Practical Detail on the Big Picture Concepts: A clear and entertaining writing style outlines the concepts every OS designer needs to master. Keep Your Course Current: This edition includes information on the latest OS technologies and developments Enhance Learning with Student and Instructor Resources: Students will gain hands-on experience using the simulation exercises and lab experiments. Features + Benefits Provide Practical Detail on the Big Picture Concepts A clear and entertaining writing style outlines the concepts every OS designer needs to master. In-depth topic coverage includes processes, threads, memory management, file systems, I/O, deadlocks, interface design, multimedia, performance tradeoffs, and the newest trends in OS design. Multimedia file systems are covered–an important topic that most books miss. The chapter on Multimedia Operating Systems has been moved to the Web, primarily to make room for new material and keep the book from growing to a completely unmanageable size. A thorough treatment of computer security includes viruses, worms, malware and other digital pests. This chapter far exceeds anything written in any other book. It also discusses ways to combat them. Keep Your Course Current Coverage of multiprocessors, multicomputers, virtual machines, and distributed systems reflects that the field is rapidly moving from an era of single-processor systems to multicore systems, multiprocessors, and distributed systems. Case studies of popular operating systems: UNIX, Linux, Windows 8, and Android NEW: Chapter 10, on UNIX, Linux, and Android is a revision of the old Chapter 10. The focus is clearly on Linux now, with a great deal of new material about Android, which was not in the previous edition. NEW: Chapter 11 in the third edition was on Windows Vista. A chapter on Windows 8, specifically Windows 8.1, has replaced that. It brings the treatment of Windows completely up to date. NEW and UPDATED: Chapters 2—6 have been updated, with older material removed and some new material added. Chapter 2: Added information on the futex synchronization primitive, and a section about how to avoid locking altogether with Read-Copy-Update. Chapter 3: More focus on modern hardware and less emphasis on segmentation and Multics. Chapter 4: CD-Roms are removed, as they are no longer very common, and replaced with more modern solutions (like flash drives). Also, we added RAID level 6 to the section on RAID. Chapter 5: Older devices like CRT and CD-ROMs have been removed, while new technology, like touch screens have been added. The sections on current research in these chapters have been rewritten from scratch. New problems and programming exercises have been added. NEW: Chapter 7 is completely new. It covers the important topics of virtualization and the cloud. NEW and UPDATED: Chapter 8 is an updated version of the previous material on multiprocessor systems. There is more emphasis on multicore systems now, which have become so important in the past few years. A long section on VMware has been added. NEW and UPDATED: Chapter 9 has been heavily revised and reorganized, with considerable new material on exploiting code bugs, malware, and defenses against them. UPDATED: Chapter 12 is a revised version of Chap. 13 from the previous edition. A Research section in many chapters describes current research in the topic covered by the chapter. Enhance Learning with Student and Instructor Resources Online Exercises provide hands-on experience with building as well as analyzing the performance of OS. In particular, these exercises have been designed to provide experience with analyzing the resource consumptions in Windows and Linux. Simulation Exercises are designed to provide experience with building some key components of an OS, including process scheduling, main memory allocation, paging algorithms and virtual memory, and file systems. Student Tools and Lab Experiments allow students to download the tools and run the experiments to gain deeper knowledge of the subject. Password-Protected Instructor Resources (Select the Resources Tab to View Downloadable Files): Power Point Lecture Slides Figures in both .jpeg and .eps file format Solutions to Exercises CHAPTER 1 "INTRODUCTION"1.1 WHAT IS AN OPERATING SYSTEM? 3 1.1.1 The Operating System as an Extended Machine 4 1.1.2 The Operating System as a Resource Manager 51.2 HISTORY OF OPERATING SYSTEMS 6 1.2.1 The First Generation (1945-55): Vacuum Tubes 7 1.2.2 The Second Generation (1955-65): Transistors and Batch Systems 8 1.2.3 The Third Generation (1965-1980): ICs and Multiprogramming 9 1.2.4 The Fourth Generation (1980-Present): Personal Computers 15 1.2.5 The Fifth Generation (1990-Present): Mobile Computers 191.3 COMPUTER HARDWARE REVIEW 20 1.3.1 Processors 21 1.3.2 Memory 24 1.3.3 Disks 27 1.3.4 I/O Devices 28 1.3.5 Buses 32 1.3.6 Booting the Computer 341.4 THE OPERATING SYSTEM ZOO 35 1.4.1 Mainframe Operating Systems 35 1.4.2 Server Operating Systems 35 1.4.3 Multiprocessor Operating Systems 36 1.4.4 Personal Computer Operating Systems 36 1.4.5 Handheld Computer Operating Systems 36 1.4.6 Embedded Operating Systems. 37 1.4.7 Sensor-Node Operating Systems 37 1.4.8 Real-Time Operating Systems 37 1.4.9 Smart Card Operating Systems 381.5 OPERATING SYSTEM CONCEPTS 38 1.5.1 Processes 39 1.5.2 Address Spaces 41 1.5.3 Files 41 1.5.4 Input/Output 45 1.5.5 Protection 45 1.5.6 The Shell 45 1.5.7 Ontogeny Recapitulates Phylogeny 471.6 SYSTEM CALLS 50 1.6.1 System Calls for Process Management 53 1.6.2 System Calls for File Management 56 1.6.3 System Calls for Directory Management 57 1.6.4 Miscellaneous System Calls 59 1.6.5 The Windows Win32 API 601.7 OPERATING SYSTEM STRUCTURE 62 1.7.1 Monolithic Systems 63 1.7.2 Layered Systems 64 1.7.3 Microkernels 65 1.7.4 Client-Server Model 68 1.7.5 Virtual Machines 69 1.7.6 Exokernels 731.8 THE WORLD ACCORDING TO C 73 1.8.1 The C Language 73 1.8.2 Header Files 74 1.8.3 Large Programming Projects 75 1.8.4 The Model of Run Time 761.9 RESEARCH ON OPERATING SYSTEMS 771.10 OUTLINE OF THE REST OF THIS BOOK 781.11 METRIC UNITS 791.12 SUMMARY 80CHAPTER 2 "PROCESSES AND THREADS"2.1 PROCESSES 85 2.1.1 The Process Model 86 2.1.2 Process Creation 88 2.1.3 Process Termination 90 2.1.4 Process Hierarchies 91 2.1.5 Process States 92 2.1.6 Implementation of Processes 94 2.1.7 Modeling Multiprogramming 952.2 THREADS 97 2.2.1 Thread Usage 97 2.2.2 The Classical Thread Model 102 2.2.3 POSIX Threads 106 2.2.4 Implementing Threads in User Space 108 2.2.5 Implementing Threads in the Kernel 111 2.2.6 Hybrid Implementations 112 2.2.7 Scheduler Activations 113 2.2.8 Pop-Up Threads 114 2.2.9 Making Single-Threaded Code Multithreaded 1162.3 INTERPROCESS COMMUNICATION 119 2.3.1 Race Conditions 119 2.3.2 Critical Regions 121 2.3.3 Mutual Exclusion with Busy Waiting 122 2.3.4 Sleep and Wakeup 127 2.3.5 Semaphores 130 2.3.6 Mutexes 132 2.3.7 Monitors 137 2.3.8 Message Passing 144 2.3.9 Barriers 146 2.3.10 Avoiding Locks: Read-Copy-Update 1482.4 SCHEDULING 149 2.4.1 Introduction to Scheduling 150 2.4.2 Scheduling in Batch Systems 156 2.4.3 Scheduling in Interactive Systems 158 2.4.4 Scheduling in Real-Time Systems 164 2.4.5 Policy Versus Mechanism 165 2.4.6 Thread Scheduling 1662.5 CLASSICAL IPC PROBLEMS 167 2.5.1 The Dining Philosophers Problem 167 2.5.2 The Readers and Writers Problem 1712.6 RESEARCH ON PROCESSES AND THREADS 1722.7 SUMMARY 173CHAPTER 3 "MEMORY MANAGEMENT"3.1 NO MEMORY ABSTRACTION 1823.2 A MEMORY ABSTRACTION: ADDRESS SPACES 185 3.2.1 The Notion of an Address Space 186 3.2.2 Swapping 187 3.2.3 Managing Free Memory 190Modern Operating Systems, Fourth Edition, is intended for introductory courses in Operating Systems in Computer Science, Computer Engineering, and Electrical Engineering programs. The widely anticipated revision of this worldwide best-seller incorporates the latest developments in operating systems (OS) technologies. The Fourth Edition includes up-to-date materials on relevant OS. Tanenbaum also provides information on current research based on his experience as an operating systems researcher. Modern Operating Systems, Third Edition was the recipient of the 2010 McGuffey Longevity Award. The McGuffey Longevity Award recognizes textbooks whose excellence has been demonstrated over time. Teaching and Learning Experience This program will provide a better teaching and learning experience - for you and your students. It will help: Provide Practical Detail on the Big Picture Concepts: A clear and entertaining writing style outlines the concepts every OS designer needs to master. Keep Your Course Current: This edition includes information on the latest OS technologies and developments Enhance Learning with Student and Instructor Resources: Students will gain hands-on experience using the simulation exercises and lab experiments.

Anbieter: buecher
Stand: 22.11.2019
Zum Angebot
Eisbär - Nuka OS Pompon Mütze Gr One Size schwa...
Top-Produkt
44,95 € *
zzgl. 2,95 € Versand

- Farbe: Schwarz/Grau/Rot; Gr: One Size; Highlights: Bommel; geeignet für Freizeit; Material: Hauptmaterial: 50% Wolle, 50% Polyacryl; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
Modern Operating Systems: Global Edition
61,99 € *
ggf. zzgl. Versand

Modern Operating Systems, Fourth Edition, is intended for introductory courses in Operating Systems in Computer Science, Computer Engineering, and Electrical Engineering programs. The widely anticipated revision of this worldwide best-seller incorporates the latest developments in operating systems (OS) technologies. The Fourth Edition includes up-to-date materials on relevant OS. Tanenbaum also provides information on current research based on his experience as an operating systems researcher. Modern Operating Systems, Third Edition was the recipient of the 2010 McGuffey Longevity Award. The McGuffey Longevity Award recognizes textbooks whose excellence has been demonstrated over time. http://taaonline.net/index.html Teaching and Learning Experience This program will provide a better teaching and learning experience–for you and your students. It will help: Provide Practical Detail on the Big Picture Concepts: A clear and entertaining writing style outlines the concepts every OS designer needs to master. Keep Your Course Current: This edition includes information on the latest OS technologies and developments Enhance Learning with Student and Instructor Resources: Students will gain hands-on experience using the simulation exercises and lab experiments. Features + Benefits Provide Practical Detail on the Big Picture Concepts A clear and entertaining writing style outlines the concepts every OS designer needs to master. In-depth topic coverage includes processes, threads, memory management, file systems, I/O, deadlocks, interface design, multimedia, performance tradeoffs, and the newest trends in OS design. Multimedia file systems are covered–an important topic that most books miss. The chapter on Multimedia Operating Systems has been moved to the Web, primarily to make room for new material and keep the book from growing to a completely unmanageable size. A thorough treatment of computer security includes viruses, worms, malware and other digital pests. This chapter far exceeds anything written in any other book. It also discusses ways to combat them. Keep Your Course Current Coverage of multiprocessors, multicomputers, virtual machines, and distributed systems reflects that the field is rapidly moving from an era of single-processor systems to multicore systems, multiprocessors, and distributed systems. Case studies of popular operating systems: UNIX, Linux, Windows 8, and Android NEW: Chapter 10, on UNIX, Linux, and Android is a revision of the old Chapter 10. The focus is clearly on Linux now, with a great deal of new material about Android, which was not in the previous edition. NEW: Chapter 11 in the third edition was on Windows Vista. A chapter on Windows 8, specifically Windows 8.1, has replaced that. It brings the treatment of Windows completely up to date. NEW and UPDATED: Chapters 2—6 have been updated, with older material removed and some new material added. Chapter 2: Added information on the futex synchronization primitive, and a section about how to avoid locking altogether with Read-Copy-Update. Chapter 3: More focus on modern hardware and less emphasis on segmentation and Multics. Chapter 4: CD-Roms are removed, as they are no longer very common, and replaced with more modern solutions (like flash drives). Also, we added RAID level 6 to the section on RAID. Chapter 5: Older devices like CRT and CD-ROMs have been removed, while new technology, like touch screens have been added. The sections on current research in these chapters have been rewritten from scratch. New problems and programming exercises have been added. NEW: Chapter 7 is completely new. It covers the important topics of virtualization and the cloud. NEW and UPDATED: Chapter 8 is an updated version of the previous material on multiprocessor systems. There is more emphasis on multicore systems now, which have become so important in the past few years. A long section on VMware has been added. NEW and UPDATED: Chapter 9 has been heavily revised and reorganized, with considerable new material on exploiting code bugs, malware, and defenses against them. UPDATED: Chapter 12 is a revised version of Chap. 13 from the previous edition. A Research section in many chapters describes current research in the topic covered by the chapter. Enhance Learning with Student and Instructor Resources Online Exercises provide hands-on experience with building as well as analyzing the performance of OS. In particular, these exercises have been designed to provide experience with analyzing the resource consumptions in Windows and Linux. Simulation Exercises are designed to provide experience with building some key components of an OS, including process scheduling, main memory allocation, paging algorithms and virtual memory, and file systems. Student Tools and Lab Experiments allow students to download the tools and run the experiments to gain deeper knowledge of the subject. Password-Protected Instructor Resources (Select the Resources Tab to View Downloadable Files): Power Point Lecture Slides Figures in both .jpeg and .eps file format Solutions to Exercises CHAPTER 1 "INTRODUCTION"1.1 WHAT IS AN OPERATING SYSTEM? 3 1.1.1 The Operating System as an Extended Machine 4 1.1.2 The Operating System as a Resource Manager 51.2 HISTORY OF OPERATING SYSTEMS 6 1.2.1 The First Generation (1945-55): Vacuum Tubes 7 1.2.2 The Second Generation (1955-65): Transistors and Batch Systems 8 1.2.3 The Third Generation (1965-1980): ICs and Multiprogramming 9 1.2.4 The Fourth Generation (1980-Present): Personal Computers 15 1.2.5 The Fifth Generation (1990-Present): Mobile Computers 191.3 COMPUTER HARDWARE REVIEW 20 1.3.1 Processors 21 1.3.2 Memory 24 1.3.3 Disks 27 1.3.4 I/O Devices 28 1.3.5 Buses 32 1.3.6 Booting the Computer 341.4 THE OPERATING SYSTEM ZOO 35 1.4.1 Mainframe Operating Systems 35 1.4.2 Server Operating Systems 35 1.4.3 Multiprocessor Operating Systems 36 1.4.4 Personal Computer Operating Systems 36 1.4.5 Handheld Computer Operating Systems 36 1.4.6 Embedded Operating Systems. 37 1.4.7 Sensor-Node Operating Systems 37 1.4.8 Real-Time Operating Systems 37 1.4.9 Smart Card Operating Systems 381.5 OPERATING SYSTEM CONCEPTS 38 1.5.1 Processes 39 1.5.2 Address Spaces 41 1.5.3 Files 41 1.5.4 Input/Output 45 1.5.5 Protection 45 1.5.6 The Shell 45 1.5.7 Ontogeny Recapitulates Phylogeny 471.6 SYSTEM CALLS 50 1.6.1 System Calls for Process Management 53 1.6.2 System Calls for File Management 56 1.6.3 System Calls for Directory Management 57 1.6.4 Miscellaneous System Calls 59 1.6.5 The Windows Win32 API 601.7 OPERATING SYSTEM STRUCTURE 62 1.7.1 Monolithic Systems 63 1.7.2 Layered Systems 64 1.7.3 Microkernels 65 1.7.4 Client-Server Model 68 1.7.5 Virtual Machines 69 1.7.6 Exokernels 731.8 THE WORLD ACCORDING TO C 73 1.8.1 The C Language 73 1.8.2 Header Files 74 1.8.3 Large Programming Projects 75 1.8.4 The Model of Run Time 761.9 RESEARCH ON OPERATING SYSTEMS 771.10 OUTLINE OF THE REST OF THIS BOOK 781.11 METRIC UNITS 791.12 SUMMARY 80CHAPTER 2 "PROCESSES AND THREADS"2.1 PROCESSES 85 2.1.1 The Process Model 86 2.1.2 Process Creation 88 2.1.3 Process Termination 90 2.1.4 Process Hierarchies 91 2.1.5 Process States 92 2.1.6 Implementation of Processes 94 2.1.7 Modeling Multiprogramming 952.2 THREADS 97 2.2.1 Thread Usage 97 2.2.2 The Classical Thread Model 102 2.2.3 POSIX Threads 106 2.2.4 Implementing Threads in User Space 108 2.2.5 Implementing Threads in the Kernel 111 2.2.6 Hybrid Implementations 112 2.2.7 Scheduler Activations 113 2.2.8 Pop-Up Threads 114 2.2.9 Making Single-Threaded Code Multithreaded 1162.3 INTERPROCESS COMMUNICATION 119 2.3.1 Race Conditions 119 2.3.2 Critical Regions 121 2.3.3 Mutual Exclusion with Busy Waiting 122 2.3.4 Sleep and Wakeup 127 2.3.5 Semaphores 130 2.3.6 Mutexes 132 2.3.7 Monitors 137 2.3.8 Message Passing 144 2.3.9 Barriers 146 2.3.10 Avoiding Locks: Read-Copy-Update 1482.4 SCHEDULING 149 2.4.1 Introduction to Scheduling 150 2.4.2 Scheduling in Batch Systems 156 2.4.3 Scheduling in Interactive Systems 158 2.4.4 Scheduling in Real-Time Systems 164 2.4.5 Policy Versus Mechanism 165 2.4.6 Thread Scheduling 1662.5 CLASSICAL IPC PROBLEMS 167 2.5.1 The Dining Philosophers Problem 167 2.5.2 The Readers and Writers Problem 1712.6 RESEARCH ON PROCESSES AND THREADS 1722.7 SUMMARY 173CHAPTER 3 "MEMORY MANAGEMENT"3.1 NO MEMORY ABSTRACTION 1823.2 A MEMORY ABSTRACTION: ADDRESS SPACES 185 3.2.1 The Notion of an Address Space 186 3.2.2 Swapping 187 3.2.3 Managing Free Memory 190Modern Operating Systems, Fourth Edition, is intended for introductory courses in Operating Systems in Computer Science, Computer Engineering, and Electrical Engineering programs. The widely anticipated revision of this worldwide best-seller incorporates the latest developments in operating systems (OS) technologies. The Fourth Edition includes up-to-date materials on relevant OS. Tanenbaum also provides information on current research based on his experience as an operating systems researcher. Modern Operating Systems, Third Edition was the recipient of the 2010 McGuffey Longevity Award. The McGuffey Longevity Award recognizes textbooks whose excellence has been demonstrated over time. Teaching and Learning Experience This program will provide a better teaching and learning experience - for you and your students. It will help: Provide Practical Detail on the Big Picture Concepts: A clear and entertaining writing style outlines the concepts every OS designer needs to master. Keep Your Course Current: This edition includes information on the latest OS technologies and developments Enhance Learning with Student and Instructor Resources: Students will gain hands-on experience using the simulation exercises and lab experiments.

Anbieter: buecher
Stand: 22.11.2019
Zum Angebot
Eisbär - Svenja OS Lux Crystal Mütze Gr One Siz...
Bestseller
49,95 € *
zzgl. 2,95 € Versand

- Farbe: Schwarz; Gr: One Size; Highlights: Bommel; geeignet für Freizeit; Material: Hauptmaterial: 50% Wolle, 50% Polyacryl; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
How Google Tests Software
26,99 € *
ggf. zzgl. Versand

Testing at Google Scale Product Description 2012 Jolt Award finalist! Pioneering the Future of Software Test Do you need to get it right, too? Then, learn from Google. Legendary testing expert James Whittaker, until recently a Google testing leader, and two top Google experts reveal exactly how Google tests software, offering brand-new best practices you can use even if you’re not quite Google’s size…yet! Breakthrough Techniques You Can Actually Use Discover 100% practical, amazingly scalable techniques for analyzing risk and planning tests…thinking like real users…implementing exploratory, black box, white box, and acceptance testing…getting usable feedback…tracking issues…choosing and creating tools…testing “Docs & Mocks,” interfaces, classes, modules, libraries, binaries, services, and infrastructure…reviewing code and refactoring…using test hooks, presubmit scripts, queues, continuous builds, and more. With these techniques, you can transform testing from a bottleneck into an accelerator–and make your whole organization more productive! Features + Benefits Presents pioneering testing techniques that can help any company moving to the cloud Shows how to achieve web-level scale for integration and system testing Offers expert guidance on managing end-to-end testing, including superior automation strategies Foreword by Alberto Savoia xiii Foreword by Patrick Copeland xvii Preface xxiii Chapter 1: Introduction to Google Software Testing 1 Quality?Test 5 Roles 6 Organizational Structure 8 Crawl, Walk, Run 10 Types of Tests 12 Chapter 2: The Software Engineer in Test 15 The Life of an SET 17 Development and Test Workflow 17 Who Are These SETs Anyway? 22 The Early Phase of a Project 22 Team Structure 24 Design Docs 25 Interfaces and Protocols 27 Automation Planning 28 Testability 29 SET Workflow: An Example 32 Test Execution 40 Test Size Definitions 41 Use of Test Sizes in Shared Infrastructure 44 Benefits of Test Sizes 46 Test Runtime Requirements 48 Case 1: Change in Common Library 52 Test Certified 54 An Interview with the Founders of the Test Certified Program 57 Interviewing SETs 62 An Interview with Tool Developer Ted Mao 68 An Interview with Web Driver Creator Simon Stewart 70 Chapter 3: The Test Engineer 75 A User-Facing Test Role 75 The Life of a TE 76 Test Planning 79 Risk 97 Life of a Test Case 108 Life of a Bug 113 Recruiting TEs 127 Test Leadership at Google 134 Maintenance Mode Testing 137 Quality Bots Experiment 141 BITE Experiment 153 Google Test Analytics 163 Free Testing Workflow 169 External Vendors 173 An Interview with Google Docs TE Lindsay Webster 175 An Interview with YouTube TE Apple Chow 181 Chapter 4: The Test Engineering Manager 187 The Life of a TEM 187 Getting Projects and People 189 Impact 191 An Interview with Gmail TEM Ankit Mehta 193 An Interview with Android TEM Hung Dang 198 An Interview with Chrome TEM Joel Hynoski 202 The Test Engineering Director 206 An Interview with Search and Geo Test Director Shelton Mar 207 An Interview with Engineering Tools Director Ashish Kumar 211 An Interview with Google India Test Director Sujay Sahni 214 An Interview with Engineering Manager Brad Green 219 An Interview with James Whittaker 222 Chapter 5: Improving How Google Tests Software 229 Fatal Flaws in Google's Process 229 The Future of the SET 231 The Future of the TE 233 The Future of the Test Director and Manager 234 The Future of Test Infrastructure 234 In Conclusion 235 Appendix A: Chrome OS Test Plan 237 Overview of Themes 237 Risk Analysis 238 Per-Build Baseline Testing 239 Per-LKG Day Testing 239 Per-Release Testing 239 Manual Versus Automation 240 Dev Versus Test Quality Focus 240 Release Channels 240 User Input 241 Test Case Repositories 241 Test Dashboarding 241 Virtualization 241 Performance 242 Stress, Long-Running, and Stability 242 Test Execution Framework (Autotest) 242 OEMs 242 Hardware Lab 242 E2E Farm Automation 243 Testing the Browser AppManager 243 Browser Testability 243 Hardware 244 Timeline 244 Primary Test Drivers 246 Relevant Documents 246 Appendix B: Test Tours for Chrome 247 The Shopping Tour 247 The Student Tour 248 Suggested Areas to Test 248 The International Calling Tour 249 Suggested Areas to Test 249 The Landmark Tour 249 Suggested Landmarks in Chrome 249 The All Nighter Tour 250 Suggested Areas to Test 250 The Artisan's Tour 251 Tools in Chrome 251 The Bad Neighborhood Tour 251 Bad Neighborhoods in Chrome OS 251 The Personalization Tour 252 Ways to Customize Chrome 252 Appendix C: Blog Posts on Tools and Code 253 Take a BITE out of Bugs and Redundant Labor 253 Unleash the QualityBots 255 RPF: Google's Record Playback Framework 257 Google Test Analytics-Now in Open Source 260 Comprehensive 260 Quick 260 Actionable 260 Sustained Value 260 Index 265Discover 100% practical, amazingly scalable techniques for analyzing risk and planning tests

Anbieter: buecher
Stand: 22.11.2019
Zum Angebot
Eisbär - Kaylinn OS Mütze Gr One Size grau/weiß
Topseller
49,95 € *
zzgl. 2,95 € Versand

- Farbe: Grau/Weiß; Gr: One Size; geeignet für Freizeit; Material: Hauptmaterial: 49% Polyacryl, 21% Polyamid, 20% Wolle, 10% sonstige Fasern; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
How Google Tests Software
26,99 € *
ggf. zzgl. Versand

Testing at Google Scale Product Description 2012 Jolt Award finalist! Pioneering the Future of Software Test Do you need to get it right, too? Then, learn from Google. Legendary testing expert James Whittaker, until recently a Google testing leader, and two top Google experts reveal exactly how Google tests software, offering brand-new best practices you can use even if you’re not quite Google’s size…yet! Breakthrough Techniques You Can Actually Use Discover 100% practical, amazingly scalable techniques for analyzing risk and planning tests…thinking like real users…implementing exploratory, black box, white box, and acceptance testing…getting usable feedback…tracking issues…choosing and creating tools…testing “Docs & Mocks,” interfaces, classes, modules, libraries, binaries, services, and infrastructure…reviewing code and refactoring…using test hooks, presubmit scripts, queues, continuous builds, and more. With these techniques, you can transform testing from a bottleneck into an accelerator–and make your whole organization more productive! Features + Benefits Presents pioneering testing techniques that can help any company moving to the cloud Shows how to achieve web-level scale for integration and system testing Offers expert guidance on managing end-to-end testing, including superior automation strategies Foreword by Alberto Savoia xiii Foreword by Patrick Copeland xvii Preface xxiii Chapter 1: Introduction to Google Software Testing 1 Quality?Test 5 Roles 6 Organizational Structure 8 Crawl, Walk, Run 10 Types of Tests 12 Chapter 2: The Software Engineer in Test 15 The Life of an SET 17 Development and Test Workflow 17 Who Are These SETs Anyway? 22 The Early Phase of a Project 22 Team Structure 24 Design Docs 25 Interfaces and Protocols 27 Automation Planning 28 Testability 29 SET Workflow: An Example 32 Test Execution 40 Test Size Definitions 41 Use of Test Sizes in Shared Infrastructure 44 Benefits of Test Sizes 46 Test Runtime Requirements 48 Case 1: Change in Common Library 52 Test Certified 54 An Interview with the Founders of the Test Certified Program 57 Interviewing SETs 62 An Interview with Tool Developer Ted Mao 68 An Interview with Web Driver Creator Simon Stewart 70 Chapter 3: The Test Engineer 75 A User-Facing Test Role 75 The Life of a TE 76 Test Planning 79 Risk 97 Life of a Test Case 108 Life of a Bug 113 Recruiting TEs 127 Test Leadership at Google 134 Maintenance Mode Testing 137 Quality Bots Experiment 141 BITE Experiment 153 Google Test Analytics 163 Free Testing Workflow 169 External Vendors 173 An Interview with Google Docs TE Lindsay Webster 175 An Interview with YouTube TE Apple Chow 181 Chapter 4: The Test Engineering Manager 187 The Life of a TEM 187 Getting Projects and People 189 Impact 191 An Interview with Gmail TEM Ankit Mehta 193 An Interview with Android TEM Hung Dang 198 An Interview with Chrome TEM Joel Hynoski 202 The Test Engineering Director 206 An Interview with Search and Geo Test Director Shelton Mar 207 An Interview with Engineering Tools Director Ashish Kumar 211 An Interview with Google India Test Director Sujay Sahni 214 An Interview with Engineering Manager Brad Green 219 An Interview with James Whittaker 222 Chapter 5: Improving How Google Tests Software 229 Fatal Flaws in Google's Process 229 The Future of the SET 231 The Future of the TE 233 The Future of the Test Director and Manager 234 The Future of Test Infrastructure 234 In Conclusion 235 Appendix A: Chrome OS Test Plan 237 Overview of Themes 237 Risk Analysis 238 Per-Build Baseline Testing 239 Per-LKG Day Testing 239 Per-Release Testing 239 Manual Versus Automation 240 Dev Versus Test Quality Focus 240 Release Channels 240 User Input 241 Test Case Repositories 241 Test Dashboarding 241 Virtualization 241 Performance 242 Stress, Long-Running, and Stability 242 Test Execution Framework (Autotest) 242 OEMs 242 Hardware Lab 242 E2E Farm Automation 243 Testing the Browser AppManager 243 Browser Testability 243 Hardware 244 Timeline 244 Primary Test Drivers 246 Relevant Documents 246 Appendix B: Test Tours for Chrome 247 The Shopping Tour 247 The Student Tour 248 Suggested Areas to Test 248 The International Calling Tour 249 Suggested Areas to Test 249 The Landmark Tour 249 Suggested Landmarks in Chrome 249 The All Nighter Tour 250 Suggested Areas to Test 250 The Artisan's Tour 251 Tools in Chrome 251 The Bad Neighborhood Tour 251 Bad Neighborhoods in Chrome OS 251 The Personalization Tour 252 Ways to Customize Chrome 252 Appendix C: Blog Posts on Tools and Code 253 Take a BITE out of Bugs and Redundant Labor 253 Unleash the QualityBots 255 RPF: Google's Record Playback Framework 257 Google Test Analytics-Now in Open Source 260 Comprehensive 260 Quick 260 Actionable 260 Sustained Value 260 Index 265Discover 100% practical, amazingly scalable techniques for analyzing risk and planning tests

Anbieter: buecher
Stand: 22.11.2019
Zum Angebot
Eisbär - Tula OS Mütze Gr One Size lila/rot
Unser Tipp
44,95 € *
zzgl. 2,95 € Versand

- Farbe: Lila/Rot; Gr: One Size; geeignet für Freizeit; Material: Hauptmaterial: 60% Polyester, 28% Polyacryl, 12% Wolle, Innenmaterial: 100% Polyester; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
DELOCK 42571 - externes Dual mSATA SSD Gehäuse,...
53,53 € *
zzgl. 5,95 € Versand

Dieses Aluminium-Gehäuse von Delock ermöglicht den Einbau zweier mSATA SSDs, das via USB Type-C an einen PC oder ein Notebook angeschlossen werden kann. Bei der Verwendung von mehr als einer SSD besteht die Möglichkeit, verschiedene RAID Level zu nutzen. Im Packungsinhalt befindet sich ein USB-C Stecker zu USB Typ-A Stecker Kabel. Dieses kann auch nur in dieser Richtung verwendet werden. Der USB-C Stecker muss an den Computer angeschlossen werden und der USB Typ-A Stecker an das Gehäuse.Optional gibt es von Delock USB Typ-A Stecker zu USB Typ-A Stecker Kabel (83981), so dass dieses Gehäuse auch an einen Computer mit USB Typ-A Schnittstelle angeschlossen werden kann. Zusätzlich besteht die Möglichkeit ein Netzteil anzuschließen, sollte der Strom vom USB Port nicht ausreichen. Spezifikation Anschlüsse extern: 1 x SuperSpeed USB 10 Gbps (USB 3.1 Gen 2) Typ-A Buchse, 1 x 5 V DC StrombuchseAnschlüsse intern: 2 x mSATA Slot (full size)Chipsatz: Asmedia ASM1352Rfür 3,3 V mSATA Moduleunterstützt RAID 0, 1, SPAN, Port MultiplierRAID Modus durch DIP Schalter auf Platine einstellbarDatentransferrate bis zu 10 GbpsGehäuse mit VollplatineFarbe: silberMaße (LxBxH): ca. 110 x 80 x 16 mmHot Plug, Plug & Play Systemvoraussetzungen Windows 7/7-64/8.1/8.1-64/10/10-64, Linux ab Kernel 4.6, Mac OS 10.12PC oder Notebook mit einem freien USB Type-C™ oder Thunderbolt™ 3 Port Packungsinhalt externes GehäuseKabel USB-C™ Stecker zu USB Typ-A Stecker, Länge ca. 50 cmTasche, Schraubendreher, SchraubenBedienungsanleitung Verpackung Retail Box

Anbieter: reichelt elektronik
Stand: 22.11.2019
Zum Angebot
Eisbär - Soft OS MÜ - Mütze Gr One Size beige/grau
Empfehlung
39,95 € *
zzgl. 2,95 € Versand

Super bequeme Mütze mit Kashmir - Farbe: Beige/Grau; Gr: One Size; Material: Außenmaterial: 40% Wolle, 30% Viskose, 20% Polyamid, 10% Kaschmir; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot
TCP/IP Illustrated Volume 1: The Protocols
47,99 € *
ggf. zzgl. Versand

More than 162,000 networking Product Description "For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable." -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks. Features + Benefits W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall Shows how each protocol actually operates, and explains why they work that way New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more Foreword xxv Preface to the Second Edition xxvii Adapted Preface to the First Edition xxxiii Chapter 1: Introduction 1 1.1 Architectural Principles 2 1.2 Design and Implementation 8 1.3 The Architecture and Protocols of the TCP/IP Suite 13 1.4 Internets, Intranets, and Extranets 19 1.5 Designing Applications 20 1.6 Standardization Process 22 1.7 Implementations and Software Distributions 24 1.8 Attacks Involving the Internet Architecture 25 1.9 Summary 26 1.10 References 28 Chapter 2: The Internet Address Architecture 31 2.1 Introduction 31 2.2 Expressing IP Addresses 32 2.3 Basic IP Address Structure 34 2.4 CIDR and Aggregation 46 2.5 Special-Use Addresses 50 2.6 Allocation 62 2.7 Unicast Address Assignment 65 2.8 Attacks Involving IP Addresses 70 2.9 Summary 71 2.10 References 72 Chapter 3: Link Layer 79 3.1 Introduction 79 3.2 Ethernet and the IEEE 802 LAN/MAN Standards 80 3.3 Full Duplex, Power Save, Autonegotiation, and 802.1X Flow Control 94 3.4 Bridges and Switches 98 3.5 Wireless LANs-IEEE 802.11(Wi-Fi) 111 3.6 Point-to-Point Protocol (PPP) 130 3.7 Loopback 145 3.8 MTU and Path MTU 148 3.9 Tunneling Basics 149 3.10 Attacks on the Link Layer 154 3.11 Summary 156 3.12 References 157 Chapter 4: ARP: Address Resolution Protocol 165 4.1 Introduction 165 4.2 An Example 166 4.3 ARP Cache 169 4.4 ARP Frame Format 170 4.5 ARP Examples 171 4.6 ARP Cache Timeout 174 4.7 Proxy ARP 174 4.8 Gratuitous ARP and Address Conflict Detection (ACD) 175 4.9 The arp Command 177 4.10 Using ARP to Set an Embedded Device's IPv4 Address 178 4.11 Attacks Involving ARP 178 4.12 Summary 179 4.13 References 179 Chapter 5: The Internet Protocol (IP) 181 5.1 Introduction 181 5.2 IPv4 and IPv6 Headers 183 5.3 IPv6 Extension Headers 194 5.4 IP Forwarding 208 5.5 Mobile IP 215 5.6 Host Processing of IP Datagrams 220 5.7 Attacks Involving IP 226 5.8 Summary 226 5.9 References 228 Chapter 6: System Configuration: DHCP and Autoconfiguration 233 6.1 Introduction 233 6.2 Dynamic Host Configuration Protocol (DHCP) 234 6.3 Stateless Address Autoconfiguration (SLAAC) 276 6.4 DHCP and DNS Interaction 285 6.5 PPP over Ethernet (PPPoE) 286 6.6 Attacks Involving System Configuration 292 6.7 Summary 292 6.8 References 293 Chapter 7: Firewalls and Network Address Translation (NAT) 299 7.1 Introduction 299 7.2 Firewalls 300 7.3 Network Address Translation (NAT) 303 7.4 NAT Traversal 316 7.5 Configuring Packet-Filtering Firewalls and NATs 334 7.6 NAT for IPv4/IPv6 Coexistence and Transition 339 7.7 Attacks Involving Firewalls and NATs 345 7.8 Summary 346 7.9 References 347 Chapter 8: ICMPv4 and ICMPv6: Internet Control Message Protocol 353 8.1 Introduction 353 8.2 ICMP Messages 355 8.3 ICMP Error Messages 361 8.4 ICMP Query/Informational Messages 380 8.5 Neighbor Discovery in IPv6 395 8.6 Translating ICMPv4 and ICMPv6 424 8.7 Attacks Involving ICMP 428 8.8 Summary 430 8.9 References 430 Chapter 9: Broadcasting and Local Multicasting (IGMP and MLD) 435 9.1 Introduction 435 9.2 Broadcasting 436 9.3 Multicasting 441 9.4 The Internet Group Management Protocol (IGMP) and Multicast Listener Discovery Protocol (MLD) 451 9.5 Attacks Involving IGMP and MLD 469 9.6 Summary 470 9.7 References 471 Chapter 10: User Datagram Protocol (UDP) and IP Fragmentation 473 10.1 Introduction 473 10.2 UDP Header 474 10.3 UDP Checksum 475 10.4 Examples 478 10.5 UDP and IPv6 481 10.6 UDP-Lite 487 10.7 IP Fragmentation 488 10.8 Path MTU Discovery with UDP 493 10.9 Interaction between IP Fragmentation and ARP/ND 496 10.10 Maximum UDP Datagram Size 497 10.11 UDP Server Design 498 10.12 Translating UDP/IPv4 and UDP/IPv6 Datagrams 505 10.13 UDP in the Internet 506 10.14 Attacks Involving UDP and IP Fragmentation 507 10.15 Summary 508 10.16 References 508 Chapter 11: Name Resolution and the Domain Name System (DNS) 511 11.1 Introduction 511 11.2 The DNS Name Space 512 11.3 Name Servers and Zones 516 11.4 Caching 517 11.5 The DNS Protocol 518 11.6 Sort Lists, Round-Robin, and Split DNS 565 11.7 Open DNS Servers and DynDNS 567More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: Remote procedure call Identity management (access control / authentication) Network and transport layer security (authentication / privacy) File access protocols, including NFS and SMB/CIFS Host initialization and DHCP NAT and firewalls E-mail Web and web services Wireless and wireless security New tools, including Ethereal, nmap and netcat

Anbieter: buecher
Stand: 22.11.2019
Zum Angebot
Eisbär - Nicoletta OS Crystal Mütze Gr One Size...
Angebot
49,95 € *
zzgl. 2,95 € Versand

- Farbe: Grau; Gr: One Size; geeignet für Freizeit; Material: Hauptmaterial: 43% Viskose, 29% Polyester, 28% Polyamid; Weitere Top-Angebote von Eisbär im Online-Shop von Bergfreunde.de bestellen!

Anbieter: Bergfreunde.de
Stand: 22.11.2019
Zum Angebot