Flylib.com
The Pragmatic Programmer: From Journeyman to Master
The Pragmatic Programmer: From Journeyman to Master
ISBN: 020161622X
EAN: 2147483647
Year: 2005
Pages: 81
Authors:
Andrew Hunt
,
David Thomas
BUY ON AMAZON
Starting Page
Table of Content
Front Matter
Foreword
Preface
Who Should Read This Book?
What Makes a Pragmatic Programmer?
Individual Pragmatists, Large Teams
It s a Continuous Process
How the Book Is Organized
What s in a Name?
Chapter 1. A Pragmatic Philosophy
The Cat Ate My Source Code
Software Entropy
Stone Soup and Boiled Frogs
Good-Enough Software
Your Knowledge Portfolio
Communicate
Summary
Chapter 2. A Pragmatic Approach
The Evils of Duplication
Orthogonality
Reversibility
Tracer Bullets
Prototypes and Post-it Notes
Domain Languages
Estimating
Chapter 3. The Basic Tools
The Power of Plain Text
Shell Games
Power Editing
Source Code Control
But My Team Isn t Using Source Code Control
Source Code Control Products
Debugging
Text Manipulation
Exercises
Code Generators
Chapter 4. Pragmatic Paranoia
Design by Contract
Dead Programs Tell No Lies
Assertive Programming
When to Use Exceptions
How to Balance Resources
Objects and Exceptions
Balancing and Exceptions
When You Can t Balance Resources
Checking the Balance
Exercises
Chapter 5. Bend or Break
Decoupling and the Law of Demeter
Metaprogramming
Temporal Coupling
It s Just a View
Blackboards
Chapter 6. While You Are Coding
Programming by Coincidence
Algorithm Speed
Refactoring
Code That s Easy to Test
Evil Wizards
Chapter 7. Before the Project
The Requirements Pit
Solving Impossible Puzzles
Not Until You re Ready
The Specification Trap
Circles and Arrows
Chapter 8. Pragmatic Projects
Pragmatic Teams
Ubiquitous Automation
Ruthless Testing
It s All Writing
Great Expectations
Pride and Prejudice
Appendix A. Resources
Professional Societies
Building a Library
Internet Resources
Bibliography
Appendix B. Answers to Exercises
The Pragmatic Programmer: From Journeyman to Master
ISBN: 020161622X
EAN: 2147483647
Year: 2005
Pages: 81
Authors:
Andrew Hunt
,
David Thomas
BUY ON AMAZON
CISSP Exam Cram 2
ACCESS-CONTROL SYSTEMS AND METHODOLOGY
Acknowledgments
Policies, Procedures, Standards, Baselines, and Guidelines
Access-Control Types
Asymmetric Encryption
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Scope Risk
Identifying Project Resource Risk
Quantifying and Analyzing Activity Risks
Quantifying and Analyzing Project Risk
Software Configuration Management
Configuration Management and Software Engineering Standards Reference
Appendix G Sample Inspection Plan
Appendix I System Service Request
Appendix S Sample Maintenance Plan
Appendix T Software Configuration Management Plan (SCMP)
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA 5540 Model
Summary
SIP
Remote System Management
IPS Management Using ASDM
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Handling WMI Events
Instrumenting .NET Applications with WMI
WMI Providers
.NET-A Complete Development Cycle
Unit Tests
References for Further Reading
References for Further Reading
Analysis of the Advanced GDI+ Extensions Requirements
E-mail, Password, Credit Card: Creating a Customer Profile
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies