Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)

Buy

Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book arms you with the strategies you need, no matter what programming language you use.

Software is a living entity that's constantly changing. To understand software systems, we need to know where they came from and how they evolved. By mining commit data and analyzing the history of your code, you can start fixes ahead of time to eliminate broken designs, maintenance issues, and team productivity bottlenecks.

In this book, you'll learn forensic psychology techniques to successfully maintain your software. You'll create a geographic profile from your commit data to find hotspots, and apply temporal coupling concepts to uncover hidden relationships between unrelated areas in your code. You'll also measure the effectiveness of your code improvements. You'll learn how to apply these techniques on projects both large and small. For small projects, you'll get new insights into your design and how well the code fits your ideas. For large projects, you'll identify the good and the fragile parts.

Large-scale development is also a social activity, and the team's dynamics influence code quality. That's why this book shows you how to uncover social biases when analyzing the evolution of your system. You'll use commit messages as eyewitness accounts to what is really happening in your code. Finally, you'll put it all together by tracking organizational problems in the code and finding out how to fix them. Come join the hunt for better code!

What You Need:

You need Java 6 and Python 2.7 to run the accompanying analysis tools. You also need Git to follow along with the examples.

(HTML tags aren't allowed.)

Computational Intelligence: Engineering of Hybrid Systems
Computational Intelligence: Engineering of Hybrid Systems

Hybrid Intelligent Systems has become an important research topic in computer science and a key application field in science and engineering. This book offers a gentle introduction to the engineering aspects of hybrid intelligent systems, also emphasizing the interrelation with the main intelligent technologies such as genetic algorithms –...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...


Tools of Radio Astronomy (Astronomy and Astrophysics Library)
Tools of Radio Astronomy (Astronomy and Astrophysics Library)

This 6th edition of “Tools of Radio Astronomy”, the most used introductory text in radio astronomy, has been revised to reflect the current state of this important branch of astronomy. This includes the use of satellites, low radio frequencies, the millimeter/sub-mm universe, the Cosmic Microwave Background and the increased...

Leveraging the New Human Capital: Adaptive Strategies, Results Achieved, and Stories of Transformation
Leveraging the New Human Capital: Adaptive Strategies, Results Achieved, and Stories of Transformation

Without the “invisible” support of a home-based partner that backed Industrial Age workers, today’s employee can no longer focus solely on work but must simultaneously manage work and personal responsibilities. This dual-focus employee, whose knowledge or service work requires mind and heart as well as hands, is the new human...

Joe Celko's Complete Guide to NoSQL: What Every SQL Professional Needs to Know about Non-Relational Databases
Joe Celko's Complete Guide to NoSQL: What Every SQL Professional Needs to Know about Non-Relational Databases

Joe Celko's Complete Guide to NoSQL provides a complete overview of non-relational technologies so that you can become more nimble to meet the needs of your organization. As data continues to explode and grow more complex, SQL is becoming less useful for querying data and extracting meaning. In this new world of bigger and faster...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy