Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Functional Programming Patterns in Scala and Clojure: Write Lean Programs for the JVM

Buy

Solve real-life programming problems with a fraction of the code that pure object-oriented programming requires. Use Scala and Clojure to solve in-depth problems with two sets of patterns: object-oriented patterns that become more concise with functional programming, and natively functional patterns. Your code will be more declarative, with fewer bugs and lower maintenance costs.

Functional languages have their own patterns that enable you to solve problems with less code than object-oriented programming alone. This book introduces you, the experienced Java programmer, to Scala and Clojure: practical, production-quality languages that run on the JVM and interoperate with existing Java. By using both the statically typed, type-inferred Scala and the dynamically typed, modern Lisp Clojure, you'll gain a broad understanding of functional programming.

For each pattern, you'll first see the traditional object-oriented solution, and then dig into the functional replacements in both Scala and Clojure. These patterns are common in the functional world and deserve to become part of your problem-solving toolkit. On the object-oriented side, you'll see many common patterns, such as Command, Strategy, and Null Object. On the functional side, you'll learn core functional patterns such as Memoization, Lazy Sequence, and Tail Recursion.

Each pattern helps you solve a common programming problem. Working through them gives you a set of patterns you can use to solve problems you come across while writing programs. Finally, you'll learn how to work your existing Java code into new Scala or Clojure projects. You can start off small, adding functional code little by little, so you can complement your existing knowledge with Scala and Clojure as these languages gain popularity on the JVM.

What You Need

Clojure 1.5 and Scala 2.10.Optionally, Eclipse with plugins.

(HTML tags aren't allowed.)

Commitments of Traders : Strategies for Tracking the Market and Trading Profitably
Commitments of Traders : Strategies for Tracking the Market and Trading Profitably

"Floyd has answered for many in this book a way to both understand and use the Commitment of Traders reports. In my thirty-five years as a registered broker and author of my own book, I find that at times someone takes a complex subject and makes it easier to understand. Floyd has done this with his book. Not only does he make...

Pattern Matching Algorithms
Pattern Matching Algorithms
Issues of matching and searching on elementary discrete structures arise pervasively in computer science and many of its applications, and their relevance is expected to grow as information is amassed and shared at an accelerating pace. Several algorithms were discovered as a result of these needs, which in turn created the subfield of Pattern...
Pro Apache Ant
Pro Apache Ant

Pro Apache Ant is ideal for Java developers who need to use the leading open source build tool out there for development and project management. It is organized around chronological tasks instead of alphabetical functions, using a sample application throughout the set-up, from calling database scripts to unit testing.

Practical...


Thinking in LINQ: Harnessing the Power of Functional Programming in .NET Applications
Thinking in LINQ: Harnessing the Power of Functional Programming in .NET Applications

LINQ represents a paradigm shift for developers used to an imperative/object oriented programming style, because LINQ draws on functional programming principles. Thinking in LINQ addresses the differences between these two by providing a set of succinct recipes arranged in several groups, including:

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy