Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Patterns in Java, Volume 2

Buy
Patterns in Java, Volume 2, 9780471258414 (0471258415), John Wiley & Sons, 1999
Mark Grand's Patterns in Java, Volume 2 offers a grab bag of 50 reusable patterns for Java developers. Together, these patterns can improve your graphical user interface (GUI) design, testing, and the overall robustness of your next Java project.

After a short introduction to patterns and UML (unified modeling language) basics, the author looks at the software engineering life cycle, then moves on to describe the first group of object-oriented design patterns, including Creator, Polymorphism, and Law of Demeter.

Less theoretical, the next group of GUI patterns can let you create more responsive and intuitive interfaces. (Experienced programmers will already know several of these, such as the Form pattern for dialog boxes and the Disabled Irrelevant Things pattern, which grays out unused items.) The following sections on organizational coding and coding optimization patterns are the most practical as they offer ways to write better Java code, including conditional compilation, exception handling, and socket programming.

Next, the author includes a group of code robustness patterns, including assertions. The book closes with more theoretical material on testing. (Patterns such as White/Black Box or Regression Testing will be familiar turf to anyone who knows a little software engineering.)

A good many of the patterns cataloged here probably call attention to the obvious. (For instance, is using a Java switch statement really a true "pattern," as the authors argue?) But with a total of 50 patterns, this guide provides a helpful group of reusable strategies. Many of these patterns will be absolutely essential to any working Java developer.

About the Author
MARK GRAND is a consultant specializing in Java and object-oriented development. He has been an instructor for Sun's Java training programs. He is also the author of Patterns in Java, Volume 1 (Wiley), Java Language Reference, and Java Fundamental Classes.
(HTML tags aren't allowed.)

Palm & Treo Hacks
Palm & Treo Hacks

Palm OS is one of the most popular handheld operating systems on the planet. From the newest Tungstens and Treos all the way down the family tree, Palms are everywhere. Although the Palm OS is simple to learn and use, there is more to it than meets the eye--from new features in the Palm to capabilities you can get with add-on...

Developments in Tissue Engineered and Regenerative Medicine Products: A Practical Approach (Woodhead Publishing Series in Biomaterials)
Developments in Tissue Engineered and Regenerative Medicine Products: A Practical Approach (Woodhead Publishing Series in Biomaterials)

Developments in tissue engineered and regenerative medicine products summarizes recent developments in tissue engineering and regenerative medicine with an emphasis on commercialization and product development. Features of current cell therapy and tissue engineered products which have facilitated successful commercialization are emphasized...

The Homemade Workshop: Build Your Own Woodworking Machines and Jigs
The Homemade Workshop: Build Your Own Woodworking Machines and Jigs
Less cost! More features! Bragging rights!
Let's face it: Woodworking isn't cheap. Wood and materials alone can cost a small fortune. And well-designed commercial woodworking machines are often so expensive that they are beyond the reach of many home woodworkers. So what's a woodworker to do? Do what Stumpy Nubs does and
...

Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to
Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to

A step-by-step guide to installing, configuring, and updating to Windows Server 2012.

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  • Install and configure Windows Server 2012 and upgrade Active Directory.
  • Decommission...
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

Hackers and Painters: Big Ideas from the Computer Age
Hackers and Painters: Big Ideas from the Computer Age

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. "
--from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham

We are living in the computer age, in a world increasingly designed and...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy