Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Object-Oriented Design Using Java

Buy
Object-Oriented Design Using Java, 9780072974164 (0072974168), McGraw-Hill, 2008

This text is an introduction to object-oriented (OO) design for second-year or higher undergraduate computer science students. It discusses software design and implementation in terms of “elegance,” which is defined in Chapter 1. It reviews the concepts of object-oriented programming and then covers fundamental software design techniques, coding style, refactoring, UML, and design patterns.

It uses many examples and one small and two moderate-size case studies to introduce design principles and patterns. The principles and patterns are introduced at the point where they are needed to solve a design problem. In this text, many examples and case studies start with an “obvious” solution to a problem, which evolves to a more elegant solution through a discussion of the advantages and disadvantages of that initial solution.

The book is not intended to be a complete, definitive “bible” regarding elegance in coding and design. Instead, it is an introduction to many of the topics that need to be addressed in order to achieve such elegance. References for further study are provided in the text for students who wish to pursue the topics further.

All the discussion and examples in the text use Java 1.5, but the concepts and principles presented are mostly of a general object-oriented nature and so apply to design and implementation using other object-oriented languages.

The book includes extensive exercises. There are an average of 18 exercises per chapter in each of Chapters 2 to 9. These exercises include simple tests of the students’ understanding of the material in the chapters, but most of the exercises lead in directions that could not be covered in the current text without straying too far from the main subject and without making the text unwieldly large.

(HTML tags aren't allowed.)

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Research and Trends in Data Mining Technologies and Applications
Research and Trends in Data Mining Technologies and Applications
In enterprises, a large volume of data has been collected and stored in data warehouses. Advances in data gathering, storage, and distribution have created a need for integrating data warehousing and data mining techniques. Mining data warehouses raises unique issues and requires special attention. Data warehousing and data mining are...
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...

Network Processors: Architecture, Programming, and Implementation (Systems on Silicon)
Network Processors: Architecture, Programming, and Implementation (Systems on Silicon)

Network processors are the basic building blocks of today's high-speed, high-demand, quality-oriented communication networks. Designing and implementing network processors requires a new programming paradigm and an in-depth understanding of network processing requirements. This book leads the reader through the requirements and the...

Real-Time Systems: Scheduling, Analysis, and Verification
Real-Time Systems: Scheduling, Analysis, and Verification
This text is based on two rich sources: (1) materials in lecture notes I taught to senior and graduate-level computer science and electrical engineering students at Rice University and at the University of Houston, and (2) my research in the area of timing analysis and verification of real-time systems since the late 1980s,...
Tissue Regeneration: Where Nano Structure Meets Biology (Frontiers in Nano Biomedical Research)
Tissue Regeneration: Where Nano Structure Meets Biology (Frontiers in Nano Biomedical Research)

This unique volume presents the recent advances in tissue regeneration. The authors are all active researchers in their respective fields with extensive experiences. The focus of the book is on the use of stem cells and nano-structured biomaterials for tissue regeneration/tissue engineering. It includes the use of stem cells, naturally...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy