
Feathers Michael Working Effectively with Legacy Code
This book provides programmers with the ability to cost effectively handlecommon legacy code problems without having to go through the hugelyexpensive task of rewriting all existing code. It describes a series of practicalstrategies that developers can employ to bring their existing softwareapplications under control. The aut......
fra 779,-
Tilgjengelig i 1 butikker
Forhåndsbestill
Frakt og levering
Produktinformasjon
This book provides programmers with the ability to cost effectively handlecommon legacy code problems without having to go through the hugelyexpensive task of rewriting all existing code. It describes a series of practicalstrategies that developers can employ to bring their existing softwareapplications under control. The author provides useful guidance about how touse these strategies when refactoring or making functional changes to codebases. One of the book''s key points is that it teaches developers to write teststhat can be used to make sure they are not unintentionally changing theapplication as they optimize it. Examples are provided in Java, C++, and Csharp,and the book assumes that the reader has some knowledge of UMLnotation. Strategies using UML and code in C++ and Java primarily whilelanguage independent advice will be delivered in side bars and appendices forlanguage specific users.
Topplisten: Pearson Education (Us) Data og informasjonsteknologi
Spesifikasjon
Spesifikasjoner
| Språk | Engelsk |
| Sjanger | Datamaskiner og IT |
Generelt
| Sett | Nei |
| Typ | Papirbøker |
Populære produkter
Pris og prishistorikk
Akkurat nå er 779,- den billigste prisen for Feathers Michael Working Effectively with Legacy Code blant 1 butikker hos Prisradar. Sjekk også vår topp 5-rangering av beste data og informasjonsteknologi for å være sikker på at du gjør det beste kjøpet.
Mastering United States Government Information Sources and ServicesResearch design and methods : a process approachThinking With MachinesData Science
Data Systems and SocietyOutlier Detection in PythonMedical Device Cybersecurity for Engineers and Manufacturers Second EditionKubernetes
Everyday Data VisualizationSnowflake Data EngineeringBootstrapping MicroservicesAI Powered Wordpress










