Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java 8 in Action: Lambdas, Streams, and functional-style programming

Buy

Summary

Java 8 in Action is a clearly written guide to the new features of Java 8. The book covers lambdas, streams, and functional-style programming. With Java 8's functional features you can now write more concise code in less time, and also automatically benefit from multicore architectures. It's time to dig in!

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Book

Every new version of Java is important, but Java 8 is a game changer. Java 8 in Action is a clearly written guide to the new features of Java 8. It begins with a practical introduction to lambdas, using real-world Java code. Next, it covers the new Streams API and shows how you can use it to make collection-based code radically easier to understand and maintain. It also explains other major Java 8 features including default methods, Optional, CompletableFuture, and the new Date and Time API.

This book is written for programmers familiar with Java and basic OO programming.

What's Inside

  • How to use Java 8's powerful new features
  • Writing effective multicore-ready applications
  • Refactoring, testing, and debugging
  • Adopting functional-style programming
  • Quizzes and quick-check questions

About the Authors

Raoul-Gabriel Urma is a software engineer, speaker, trainer, and PhD candidate at the University of Cambridge. Mario Fusco is an engineer at Red Hat and creator of the lambdaj library. Alan Mycroft is a professor at Cambridge and cofounder of the Raspberry Pi Foundation.

(HTML tags aren't allowed.)

XSLT 2.0 Web Development
XSLT 2.0 Web Development

Leverage the incredible power of XSLT 2.0 to create sites that are easy to build, maintain, and extend!

This book teaches you exactly how to build state-of-the-art web sites with XSLT 2.0 and XPath 2.0. XML developer and web designer Dmitry Kirsanov drills down to...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Building a Programmable Logic Controller with a PIC16F648A Microcontroller
Building a Programmable Logic Controller with a PIC16F648A Microcontroller

Programmable logic controllers (PLCs) are extensively used in industry to perform automation tasks, with manufacturers offering a variety of PLCs that differ in functions, program memories, and the number of inputs/outputs (I/O). Not surprisingly, the design and implementation of these PLCs have long been a secret of manufacturers. Unveiling...


Network Graph Analysis and Visualization with Gephi
Network Graph Analysis and Visualization with Gephi

Visualize and analyze your data swiftly using dynamic network graphs built with Gephi

Overview

  • Use your own data to create network graphs displaying complex relationships between several types of data elements
  • Learn about nodes and edges, and customize your graphs using size, color, and...
Aptana Radrails: An Ide for Rails Development
Aptana Radrails: An Ide for Rails Development
Coming from a background of developing in languages such as Java, one of the things that surprised me the most about the Ruby and Rails community, was the common practice of not using an Integrated Development Environment. Most of the members of the community, including the most relevant, were comfortable with just a programmer's editor.
...
The Ultimate CSS Reference
The Ultimate CSS Reference
A complete and thorough and up-to-date reference guide for CSS.

Stop wasting time doing Internet searches only to find inaccurate, out-of-date, or incomplete information. CSS: The Ultimate Reference includes all the ins-and-outs you need to know including compatability information for all major browsers, lists of useful hacks, known...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy