Flylib.com
Coder to Developer: Tools and Strategies for Delivering Your Software
Coder to Developer: Tools and Strategies for Delivering Your Software
ISBN: 078214327X
EAN: 2147483647
Year: 2003
Pages: 118
Authors:
Mike Gunderloy
,
Sybex
BUY ON AMAZON
Coder to Developer-Tools and Strategies for Delivering Your Software
Coder to Developer-Tools and Strategies for Delivering Your Software
Foreword
Introduction
How This Book Is Organized
About the Sample Application
Keeping Up to Date
Chapter 1: Planning Your Project
Nailing Down a Feature Set
Handling Requirements
Project-Tracking Tools
Choosing a Methodology
Planning Checklist
Chapter 2: Organizing Your Project
Thinking about Architecture
Introducing Patterns
Starting a New Project
Scheduling Deliveries
Organization Checklist
Chapter 3: Using Source Code Control Effectively
The Three Levels of Source Code Control Enlightenment
Source Code Control Alternatives
Choosing Your Source Code Control System
Best Practices in Source Code Control
Source Code Control for Download Tracker
Source Code Control Checklist
Chapter 4: Coding Defensively
Assertions and Exceptions
Comments or Self-Documenting Code?
Defensive Coding Checklist
Chapter 5: Preventing Bugs with Unit Testing
The Testing Landscape
Unit Testing in Action
Test-Driven Development
Refactoring
Unit Testing Checklist
Chapter 6: Pumping Up the IDE
Customizing Visual Studio .NET
Writing VS .NET Macros
Choosing Add-Ins
IDE Checklist
Chapter 7: Digging Into Source Code
Spelunking Utilities
Sources of Reusable Source Code
Evaluating Code: FxCop
Source Code Checklist
Chapter 8: Generating Code
Understanding Code Generation
Code Generation for .NET
Code Generation in Download Tracker
Deciding Whether to use Code Generation
Code-Generation Checklist
Chapter 9: Tracking and Squashing Bugs
Risk Management
QA and Testing
Bug-Tracking Tools
Bug-Squashing Checklist
Chapter 10: Logging Application Activity
Logging Strategies
Logging Tools
Diagnostic Tools
Logging Checklist
Chapter 11: Working with Small Teams
Why Work with a Team?
Managing a Team
Tools for Distributed Teams
Teams Checklist
Chapter 12: Creating Documentation
Writing End-User Help Files
Creating Developer Help Files
Writing Manuals
Writing Team Documentation
Documentation Checklist
Chapter 13: Mastering the Build Process
Developing a Build Process
Tools for Daily Builds
Continuous Integration
Problems and Solutions
Build Process Checklist
Chapter 14: Protecting Your Intellectual Property
Writing Software Contracts
Licensing Your Software
Using Obfuscation to Protect Your Algorithms
Property Protection Checklist
Chapter 15: Delivering the Application
Writing Robust Installers
Building a Setup for Download Tracker
Alternatives to Traditional Installers
Delivery Checklist
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
List of Figures
List of Tables
List of Technology Traps
List of Sidebars
Coder to Developer: Tools and Strategies for Delivering Your Software
ISBN: 078214327X
EAN: 2147483647
Year: 2003
Pages: 118
Authors:
Mike Gunderloy
,
Sybex
BUY ON AMAZON
CISSP Exam Cram 2
Taking the Exam
Answers to Exam Prep Questions
Ethical Hacking
Answers to Exam Prep Questions
Integrity and Authentication
Java How to Program (6th Edition) (How to Program (Deitel))
JTextArea
Sorting Algorithms
Using Menus with Frames
Exercises
Case Study: Guest Book
C & Data Structures (Charles River Media Computer Engineering)
The printf Function
Function
Strings
Problems in Linked Lists
Problems in Trees
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 13. Create a Route with a Click (or Two)
Hack 26. Follow Your Packets Across the Internet
Hack 28. How Big Is That, Exactly?
Hack 43. Dont Believe Everything You Read on a Map
Hack 54. Add a Nicer Info Window to Your Map with TLabel
Special Edition Using Crystal Reports 10
Creating and Designing Basic Reports
Using the Formula Workshop
Understanding the Core Functions of Crystal Enterprise
Understanding Firewall Types
Introducing Servers
Cultural Imperative: Global Trends in the 21st Century
Cultural Black Holes
The China Phenomenon
Conclusion
Epilogue After September 11
Appendix A Cultural Categorization Characteristics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies