Preface ix
Acknowledgments xiii
1 Introduction 1
I Single Process
2 Steps 5
3 Processes 17
4 Names 31
5 Recursion 41
6 Limits: Imperfect Programs 49
7 Limits: Perfect Programs 65
II Interacting Processes
8 Coordination 81
9 State, Change, and Equality 89
10 Controlled Access 101
11 Interrupts 111
12 Virtualization 123
13 Separation 135
14 Packets 151
15 Browsing 155
III Unstoppable Processes
16 Failure 177
17 Software Failure 199
18 Reliable Networks 207
19 Inside the Cloud 217
20 Browsing Revisited 241
IV Defending Processes
21 Attackers 253
22 Thompson's Hack 263
23 Secrets 273
24 Secure Channel, Key Distribution, and Certificates 289
25 Bitcoin Goals 307
26 Bitcoin Mechanisms 315
27 Looking Back 335
Index of Metaphors and Examples 337
Subject Index 341