Your code as a crime scene: use forensic techniques to arrest defects, bottlenecks, and bad design in your programs
Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of for...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Frisco, TX]
Pragmatic Bookshelf
[2015]
|
Schriftenreihe: | The Pragmatic programmers
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781680500813/?ar |
Zusammenfassung: | Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book arms you with the strategies you need, no matter what programming language you use. |
Beschreibung: | Place of publication taken from publisher's Web site. - "Version: P1.0 (March 2015).". - Includes bibliographical references. - Print version record |
Umfang: | 1 Online-Ressource (1 volume) illustrations. |
ISBN: | 9781680500806 1680500805 9781680505214 1680505211 9781680505207 1680505203 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047668083 | ||
003 | DE-627-1 | ||
005 | 20240228115904.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9781680500806 |c electronic bk. |9 978-1-68050-080-6 | ||
020 | |a 1680500805 |c electronic bk. |9 1-68050-080-5 | ||
020 | |a 9781680505214 |c electronic bk. |9 978-1-68050-521-4 | ||
020 | |a 1680505211 |c electronic bk. |9 1-68050-521-1 | ||
020 | |a 9781680505207 |c electronic bk. |9 978-1-68050-520-7 | ||
020 | |a 1680505203 |c electronic bk. |9 1-68050-520-3 | ||
035 | |a (DE-627-1)047668083 | ||
035 | |a (DE-599)KEP047668083 | ||
035 | |a (ORHE)9781680500813 | ||
035 | |a (DE-627-1)047668083 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.1 | |
100 | 1 | |a Tornhill, Adam |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Your code as a crime scene |b use forensic techniques to arrest defects, bottlenecks, and bad design in your programs |c Adam Tornhill ; edited by Fahmida Y. Rashid ; foreword by Michael Feathers |
246 | 3 | 3 | |a Use forensic techniques to arrest defects, bottlenecks, and bad design in your programs |
264 | 1 | |a [Frisco, TX] |b Pragmatic Bookshelf |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The Pragmatic programmers | |
500 | |a Place of publication taken from publisher's Web site. - "Version: P1.0 (March 2015).". - Includes bibliographical references. - Print version record | ||
520 | |a Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book arms you with the strategies you need, no matter what programming language you use. | ||
650 | 0 | |a Computer software |x Quality control | |
650 | 0 | |a Computer programming |x Management | |
650 | 0 | |a Computer architecture | |
650 | 0 | |a Forensic sciences | |
650 | 2 | |a Forensic Sciences | |
650 | 4 | |a Logiciels ; Qualité ; Contrôle | |
650 | 4 | |a Ordinateurs ; Architecture | |
650 | 4 | |a Criminalistique | |
650 | 4 | |a forensic science | |
650 | 4 | |a COMPUTERS ; Programming ; General | |
650 | 4 | |a COMPUTERS ; Software Development & Engineering ; Quality Assurance & Testing | |
650 | 4 | |a Computer architecture | |
650 | 4 | |a Computer programming ; Management | |
650 | 4 | |a Computer software ; Quality control | |
650 | 4 | |a Forensic sciences | |
700 | 1 | |a Rashid, Fahmida Y. |e HerausgeberIn |4 edt | |
700 | 1 | |a Feathers, Michael C. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781680500387 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781680500387 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781680500813/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047668083 |
---|---|
_version_ | 1821494864816111616 |
adam_text | |
any_adam_object | |
author | Tornhill, Adam |
author2 | Rashid, Fahmida Y. Feathers, Michael C. |
author2_role | edt ctb |
author2_variant | f y r fy fyr m c f mc mcf |
author_facet | Tornhill, Adam Rashid, Fahmida Y. Feathers, Michael C. |
author_role | aut |
author_sort | Tornhill, Adam |
author_variant | a t at |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047668083 (DE-599)KEP047668083 (ORHE)9781680500813 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03187cam a22006852 4500</leader><controlfield tag="001">ZDB-30-ORH-047668083</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115904.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781680500806</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-68050-080-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1680500805</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-68050-080-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781680505214</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-68050-521-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1680505211</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-68050-521-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781680505207</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-68050-520-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1680505203</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-68050-520-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047668083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047668083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781680500813</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047668083</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tornhill, Adam</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Your code as a crime scene</subfield><subfield code="b">use forensic techniques to arrest defects, bottlenecks, and bad design in your programs</subfield><subfield code="c">Adam Tornhill ; edited by Fahmida Y. Rashid ; foreword by Michael Feathers</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Use forensic techniques to arrest defects, bottlenecks, and bad design in your programs</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Frisco, TX]</subfield><subfield code="b">Pragmatic Bookshelf</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Pragmatic programmers</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Place of publication taken from publisher's Web site. - "Version: P1.0 (March 2015).". - Includes bibliographical references. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book arms you with the strategies you need, no matter what programming language you use.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer programming</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Forensic Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels ; Qualité ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalistique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Programming ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Software Development & Engineering ; Quality Assurance & Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software ; Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rashid, Fahmida Y.</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Feathers, Michael C.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781680500387</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781680500387</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781680500813/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047668083 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:10Z |
institution | BVB |
isbn | 9781680500806 1680500805 9781680505214 1680505211 9781680505207 1680505203 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Pragmatic Bookshelf |
record_format | marc |
series2 | The Pragmatic programmers |
spelling | Tornhill, Adam VerfasserIn aut Your code as a crime scene use forensic techniques to arrest defects, bottlenecks, and bad design in your programs Adam Tornhill ; edited by Fahmida Y. Rashid ; foreword by Michael Feathers Use forensic techniques to arrest defects, bottlenecks, and bad design in your programs [Frisco, TX] Pragmatic Bookshelf [2015] ©2015 1 Online-Ressource (1 volume) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The Pragmatic programmers Place of publication taken from publisher's Web site. - "Version: P1.0 (March 2015).". - Includes bibliographical references. - Print version record Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book arms you with the strategies you need, no matter what programming language you use. Computer software Quality control Computer programming Management Computer architecture Forensic sciences Forensic Sciences Logiciels ; Qualité ; Contrôle Ordinateurs ; Architecture Criminalistique forensic science COMPUTERS ; Programming ; General COMPUTERS ; Software Development & Engineering ; Quality Assurance & Testing Computer programming ; Management Computer software ; Quality control Rashid, Fahmida Y. HerausgeberIn edt Feathers, Michael C. MitwirkendeR ctb 9781680500387 Erscheint auch als Druck-Ausgabe 9781680500387 |
spellingShingle | Tornhill, Adam Your code as a crime scene use forensic techniques to arrest defects, bottlenecks, and bad design in your programs Computer software Quality control Computer programming Management Computer architecture Forensic sciences Forensic Sciences Logiciels ; Qualité ; Contrôle Ordinateurs ; Architecture Criminalistique forensic science COMPUTERS ; Programming ; General COMPUTERS ; Software Development & Engineering ; Quality Assurance & Testing Computer programming ; Management Computer software ; Quality control |
title | Your code as a crime scene use forensic techniques to arrest defects, bottlenecks, and bad design in your programs |
title_alt | Use forensic techniques to arrest defects, bottlenecks, and bad design in your programs |
title_auth | Your code as a crime scene use forensic techniques to arrest defects, bottlenecks, and bad design in your programs |
title_exact_search | Your code as a crime scene use forensic techniques to arrest defects, bottlenecks, and bad design in your programs |
title_full | Your code as a crime scene use forensic techniques to arrest defects, bottlenecks, and bad design in your programs Adam Tornhill ; edited by Fahmida Y. Rashid ; foreword by Michael Feathers |
title_fullStr | Your code as a crime scene use forensic techniques to arrest defects, bottlenecks, and bad design in your programs Adam Tornhill ; edited by Fahmida Y. Rashid ; foreword by Michael Feathers |
title_full_unstemmed | Your code as a crime scene use forensic techniques to arrest defects, bottlenecks, and bad design in your programs Adam Tornhill ; edited by Fahmida Y. Rashid ; foreword by Michael Feathers |
title_short | Your code as a crime scene |
title_sort | your code as a crime scene use forensic techniques to arrest defects bottlenecks and bad design in your programs |
title_sub | use forensic techniques to arrest defects, bottlenecks, and bad design in your programs |
topic | Computer software Quality control Computer programming Management Computer architecture Forensic sciences Forensic Sciences Logiciels ; Qualité ; Contrôle Ordinateurs ; Architecture Criminalistique forensic science COMPUTERS ; Programming ; General COMPUTERS ; Software Development & Engineering ; Quality Assurance & Testing Computer programming ; Management Computer software ; Quality control |
topic_facet | Computer software Quality control Computer programming Management Computer architecture Forensic sciences Forensic Sciences Logiciels ; Qualité ; Contrôle Ordinateurs ; Architecture Criminalistique forensic science COMPUTERS ; Programming ; General COMPUTERS ; Software Development & Engineering ; Quality Assurance & Testing Computer programming ; Management Computer software ; Quality control |
work_keys_str_mv | AT tornhilladam yourcodeasacrimesceneuseforensictechniquestoarrestdefectsbottlenecksandbaddesigninyourprograms AT rashidfahmiday yourcodeasacrimesceneuseforensictechniquestoarrestdefectsbottlenecksandbaddesigninyourprograms AT feathersmichaelc yourcodeasacrimesceneuseforensictechniquestoarrestdefectsbottlenecksandbaddesigninyourprograms AT tornhilladam useforensictechniquestoarrestdefectsbottlenecksandbaddesigninyourprograms AT rashidfahmiday useforensictechniquestoarrestdefectsbottlenecksandbaddesigninyourprograms AT feathersmichaelc useforensictechniquestoarrestdefectsbottlenecksandbaddesigninyourprograms |