,

Kollected Kode Vicious, The

Paperback Engels 2020 9780136788249
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The Kollected Kode Vicious brings together Kode Vicious’s essays on building more effective computer systems: some of the most popular and respected essays ever published by ACM’s Queue Magazine. These entertaining and incisive explorations, written as Socratic Q&A dialogues, are complemented with never-before-published material that illuminate KV’s broader themes and offer new advice on code spelunking and other issues.
KV’s essays range from very specific coding advice to wide-ranging discussions of building distributed systems, working with difficult people, and hosting code reviews. While the topics are diverse, KV’s unifying and unique voice is consistent throughout. The columns in  The Kollected Kode Vicious focus on five major areas: The Kode at Hand: What to do or not do with a specific piece of code Systems Design: Overall systems design issues Koding Konundrums: Q&As about things that surround code, such as testing and  documentation Machine to Machine: Distributed systems and computer networking Human to Human: Dealing with other people, including developers and managers Relevant both to industry newcomers and those who’ve been around for decades, KV’s work offers practical and pragmatic advice for everyone who codes, works with code, or works with coders. 

Specificaties

ISBN13:9780136788249
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Foreword by Donald E. Knuth xi<br>Preface xiii<br>Acknowledgments xvi<br>About the Author xvii <br> <br> Chapter 1: The Kode at Hand 1 <br>1.1 Resource Management 4 <br>1.2 Big Big Memory 7 <br>1.3 Coded Arrangements 10 <br>1.4 Code Abuse 13 <br>1.5 Nesting Tendencies 16 <br>1.6 Choking on Changes 18 <br>1.7 Cursed Code 21 <br>1.8 Forced Exceptions 24 <br>1.9 A Nice Piece...of Code 28 <br>1.10 Something Rotten in... 31 <br>1.11 Logging 34 <br>1.12 Lost 37 <br>1.13 Copying 39 <br>1.14 Top Five Koding Peeves 42 <br>1.15 Linguistically Lost 45 <br>1.16 Check in Comments 48 <br> <br> Chapter 2: Koding Konundrums 51 <br>2.1 Ode to the Method 52 <br>2.2 How Much + in C++? 55 <br>2.3 Something Sleek and Modern 58 <br>2.4 What's in a Cache Miss? 61 <br>2.5 Code Spelunking 65 <br>2.6 Input Validation 73 <br>2.7 Dickering with Docs 76 <br>2.8 What's in the Foo Field? 80 <br>2.9 Testy Tester 83 <br>2.10 How to Test 86 <br>2.11 Leave the Test Modes In! 90 <br>2.12 Maintenance Mode 93 <br>2.13 Merge Early 96 <br>2.14 Multicore Manticore 99 <br>2.15 This Is Not a Product 102 <br>2.16 Heisenbugs 105 <br>2.17 I Don't Want Your Dirty PDFs 109 <br>2.18 Pining for a PIN 112 <br>2.19 Reboot 115 <br>2.20 Code Scanners 117 <br>2.21 Debugging Hardware 119 <br>2.22 Sanity vs. Visibility 123 <br> <br> Chapter 3: Systems Design 127 <br>3.1 Abstractions 129 <br>3.2 Driven 133 <br>3.3 Driven Revisited 136 <br>3.4 Changative Changes 140 <br>3.5 Threading the Needle 143 <br>3.6 Threads Still Unsafe? 146 <br>3.7 Authentication vs. Encryption 149 <br>3.8 Authentication Revisited 152 <br>3.9 Authentication by Example 155 <br>3.10 Cross-Site Scripting 160 <br>3.11 Phishing and Infections 166 <br>3.12 UI Design 172 <br>3.13 Secure Logging 176 <br>3.14 Java 181 <br>3.15 Secure P2P 185 <br> <br> Chapter 4: Machine to Machine 189 <br>4.1 Stepping on Toes 190 <br>4.2 Paucity of Ports 193 <br>4.3 Protocol Design 196 <br>4.4 Which Came First? 200 <br>4.5 Debugging the Network 203 <br>4.6 Latency 208 <br>4.7 Long Distance Runaround 211 <br>4.8 The Network Is the Computer 215 <br>4.9 Failure to Scale 219 <br>4.10 Port Squatting 221 <br>4.11 Networking in the Raw 224 <br>4.12 Pointless PKI 227 <br>4.13 Standard on Standards 230 <br> <br> Chapter 5: Human to Human 235 <br>5.1 Of Pride and... 236 <br>5.2 What Color Is Your...? 239 <br>5.3 Broken Builds 242 <br>5.4 What Is Intelligence? 245 <br>5.5 Review the Design 248 <br>5.6 The Naming of Hosts 252 <br>5.7 Hosting an Interview 256 <br>5.8 Mythical 260 <br>5.9 The Obsolete Koder 263 <br>5.10 With Great Power... 267 <br>5.11 The Letter 270 <br>5.12 The Tickets That... 273 <br>5.13 Of Screwdrivers and Hammers 276 <br>5.14 Security Reviews 279 <br>5.15 Getting Back to Work 284 <br>5.16 Open Source Licenses 287 <br>5.17 So Many Standards 290 <br>5.18 Books 293 <br>5.19 More on Books 297 <br>5.20 Keeping Up to Date 299 <br>5.21 For My Last Trick 302 <br> <br> Index 305

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Kollected Kode Vicious, The