Cargando…

Implementation patterns /

"Great code doesn t just happen. It is the outcome of hundreds of small but critical decisions programmers make every single day. Now, software innovator Kent Beck focuses on these critical decisions, unearthing "implementation patterns" for writing programs that are simpler, clearer,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Beck, Kent
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, ©2008.
Colección:Addison-Wesley signature series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn213482773
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 080320s2008 njua ob 001 0 eng d
010 |a  2007035166 
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d TXJ  |d TOH  |d CEF  |d OCLCQ  |d NHM  |d DEBSZ  |d OCLCQ  |d OCLCO  |d C6I  |d OCLCF  |d OCLCQ  |d OCLCE  |d OCLCQ  |d YDX  |d AU@  |d OCLCQ  |d WYU  |d UAB  |d VT2  |d OCLCQ  |d LDP  |d UKAHL  |d OCLCO  |d LVT  |d OCLCQ 
019 |a 191912870  |a 317818525  |a 681555181  |a 1044251282  |a 1056385566  |a 1063937918  |a 1103273974  |a 1104494616  |a 1129357253  |a 1152978290  |a 1156905173  |a 1227700955  |a 1240526501  |a 1302264601  |a 1355689849 
020 |a 9780321413093 
020 |a 0321413091 
020 |a 013270255X 
020 |a 9780132702553 
020 |a 9780321543851  |q (online) 
020 |a 0321543858 
029 1 |a DEBSZ  |b 355403986 
029 1 |a HEBIS  |b 291476759 
029 1 |a AU@  |b 000073550929 
035 |a (OCoLC)213482773  |z (OCoLC)191912870  |z (OCoLC)317818525  |z (OCoLC)681555181  |z (OCoLC)1044251282  |z (OCoLC)1056385566  |z (OCoLC)1063937918  |z (OCoLC)1103273974  |z (OCoLC)1104494616  |z (OCoLC)1129357253  |z (OCoLC)1152978290  |z (OCoLC)1156905173  |z (OCoLC)1227700955  |z (OCoLC)1240526501  |z (OCoLC)1302264601  |z (OCoLC)1355689849 
037 |a CL0500000019  |b Safari Books Online 
042 |a dlr 
050 4 |a QA76.76.P37  |b B33 2008 
082 0 4 |a 005.1  |2 22 
049 |a UAMI 
100 1 |a Beck, Kent. 
245 1 0 |a Implementation patterns /  |c Kent Beck. 
260 |a Upper Saddle River, N.J. :  |b Addison-Wesley,  |c ©2008. 
300 |a 1 online resource (xvi, 157 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Addison-Wesley signature series 
504 |a Includes bibliographical references (pages 145-148) and indexes. 
588 0 |a Print version record. 
505 0 |a Ch. 1. Introduction -- Tour Guide -- And Now -- Ch. 2. Patterns -- Ch. 3. A Theory of Programming -- Values -- Communication -- Simplicity -- Flexibility -- Principles -- Local Consequences -- Minimize Repetition -- Logic and Data Together -- Symmetry -- Declarative Expression -- Rate of Change -- Ch. 4. Motivation -- Ch. 5. Class -- Class -- Simple Superclass Name -- Qualified Subclass Name -- Abstract Interface -- Interface -- Abstract Class -- Versioned Interface -- Value Object -- Specialization -- Subclass -- Implementor -- Inner Class -- Instance-Specific Behavior -- Conditional -- Delegation -- Pluggable Selector -- Anonymous Inner Class -- Library Class -- Ch. 6. State -- State -- Access -- Direct Access -- Indirect Access -- Common State -- Variable State -- Extrinsic State -- Variable -- Local Variable -- Field -- Parameter -- Collecting Parameter -- Optional Parameter -- Var Args -- Parameter Object -- Constant -- Role-Suggesting Name -- Declared Type -- Initialization -- Eager Initialization -- Lazy Initialization -- Ch. 7. Behavior -- Control Flow -- Main Flow -- Message -- Choosing Message -- Double Dispatch -- Decomposing (Sequencing) Message -- Reversing Message -- Inviting Message -- Explaining Message -- Exceptional Flow -- Guard Clause -- Exception -- Checked Exceptions -- Exception Propagation -- Ch. 8. Methods -- Composed Method -- Intention-Revealing Name -- Method Visibility -- Method Object -- Overridden Method -- Overloaded Method -- Method Return Type -- Method Comment -- Helper Method -- Debug Print Method -- Conversion -- Conversion Method -- Conversion Constructor -- Creation -- Complete Constructor -- Factory Method -- Internal Factory -- Collection Accessor Method -- Boolean Setting Method -- Query Method -- Equality Method -- Getting Method -- Setting Method -- Safe Copy -- Ch. 9. Collections -- Metaphors -- Issues -- Interfaces -- Array -- Iterable -- Collection -- List -- Set -- Sorted Set -- Map -- Implementations -- Collection -- List -- Set -- Map -- Collections -- Searching -- Sorting -- Unmodifiable Collections -- Single-Element Collections -- Empty Collections -- Extending Collections -- Ch. 10. Evolving Frameworks -- Changing Frameworks without Changing Applications -- Incompatible Upgrades -- Encouraging Compatible Change -- Library Class -- Objects -- App. A. Performance Measurement -- Example -- Api -- Implementation -- MethodTimer -- Canceling Overhead -- Tests -- Comparing Collections -- Comparing ArrayList and LinkedList -- Comparing Sets -- Comparing Maps -- General Programming -- Philosophy -- Java. 
520 1 |a "Great code doesn t just happen. It is the outcome of hundreds of small but critical decisions programmers make every single day. Now, software innovator Kent Beck focuses on these critical decisions, unearthing "implementation patterns" for writing programs that are simpler, clearer, better organized, and more cost effective." "Beck collects 77 patterns for handling everyday programming tasks and writing more readable code. This new collection of patterns addresses many aspects of development, including class, state, behavior, method, collections, frameworks, and more. He uses diagrams, stories, examples, and essays to engage the reader as he illuminates the patterns. You'll find solutions for handling everything from naming variables to checking exceptions." "Implementation Patterns will help programmers at all experience levels, especially those who have benefited from software patterns or agile methods. It will also be a resource for development teams seeking to work together more efficiently and build more maintainable software."--Jacket 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Software patterns. 
650 0 |a Computer software  |x Development. 
650 6 |a Logiciels  |x Modèles de conception. 
650 6 |a Logiciels  |x Développement. 
650 7 |a Software patterns.  |2 blmlsh 
650 7 |a Computer software  |x Development.  |2 blmlsh 
650 7 |a Computer software  |x Development.  |2 fast  |0 (OCoLC)fst00872537 
650 7 |a Software patterns.  |2 fast  |0 (OCoLC)fst01124209 
776 0 8 |i Print version:  |a Beck, Kent.  |t Implementation patterns.  |d Upper Saddle River, NJ : Addison-Wesley, ©2008  |w (DLC) 2007035166  |w (OCoLC)150359620 
830 0 |a Addison-Wesley signature series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780321413093/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37972271 
938 |a YBP Library Services  |b YANK  |n 14858150 
994 |a 92  |b IZTAP