If you are a programmer, you need this book.
You've got a day to add a new feature in a 34,000-line program: Where do you start? Page 333
How can you understand and simplify an inscrutable piece of code? Page 39
Where do you start when disentangling a complicated build process? Page 167
How do you comprehend code that appears to be doing five things in parallel? Page 132
You may read code because you have to-to fix it, inspect it, or improve it. You may read code the way an engineer examines a machine--to discover what makes it tick. Or you may read code because you are scavenging--looking for material to reuse.
Code-reading requires its own set of skills, and the ability to determine which technique you use when is crucial. In this indispensable book, Diomidis Spinellis uses more than 600 real-world examples to show you how to identify good (and bad) code: how to read it, what to look for, and how to use this knowledge to improve your own code.
Fact: If you make a habit of reading good code, you will write better code yourself.
http://rapidshare.com/files/108654072/a
- Anonymous Mass Mailers (1)
- bots (1)
- browser (1)
- cool links (1)
- cracking tools (3)
- dos commands (3)
- ebooks (104)
- Exploits (14)
- file upload (3)
- firefox (1)
- flash games (2)
- free space (2)
- gmail (1)
- google (7)
- google chrome Vulnerability (7)
- graphics (5)
- greasemonkey scripts (8)
- gtalk (4)
- hacking (12)
- hacking ebooks (45)
- hacking tools (42)
- hacking tutorials (22)
- haking tutorials (37)
- hosting (1)
- image hosting (1)
- information (11)
- invisible (2)
- IP Scanner (14)
- java (2)
- javascript (4)
- keygen (1)
- Keyloggers (3)
- magazine (1)
- Mail Bombers (1)
- mcse (1)
- muliti login (1)
- networking (2)
- news (9)
- orkut (15)
- Port Scanner (14)
- proxy (2)
- RapidShare Libraries (1)
- regedit (1)
- Sniffers (1)
- sniffing (1)
- sql injection (5)
- tips n trics (41)
- upload sites (3)
- virus (9)
- virus removal (6)
- visual c++ (2)
- Vulnerability Scanner (1)
- wallpapers (5)
- web based hackiing (1)
- web design (1)
- web templates (1)
- Wireless Hacking (5)
-
▼
2009
(127)
- ► August 2009 (33)
-
▼
March 2009
(40)
- Web Dragons: Inside the Myths of Search Engine
- Mathematics for Algorithm and Systems Analysis
- Javascript The Definitive Guide 5th Edition
- Brute Force: Cracking the Data Encryption Standard
- Operating Systems Design and Implementation
- Access Denied
- Exploiting Software: How to Break Code
- The Ethical Hack: A Framework for Business Value
- Create your own linux distribution
- Fuzzing: Brute Force Vulnerability Discovery
- Principles of Computer Science
- Pro Decrypting VBScript Viruses
- Learn-Key's Hacking Revealed
- Hacking Exposed Wireless
- Assembly Language Step-By-Step
- Professional JavaScript for Web Developers
- Network Security Assessment
- Advanced Linux Programming
- Introduction to Computing and Programming wit Java
- Hacking the Cable Modem
- Hacking the Cable Modem
- Java Cryptography Extensions:Practical Guide
- Internet and the World Wide Web: How to Program
- IPSec, 2nd Edition
- Understanding the Linux Kernel
- Software Piracy Exposed
- Computer Security Art And Science
- Network Security: A Beginner's Guide
- Code Reading: The Open Source Perspective
- 5 C Programming eBooks
- The Invisible Web
- MYSQL Books
- Reverse Engineering Code with IDA Pro
- Forensic Computing A Practitioner’s Guide
- Network Security Tools
- XML Books
- Internet Denial of Service: Attack and Defense
- Practical Internet Security
- Ankit Fadia ebooks
- Offensive Security Tutorial Videos...zone
- ► February 2009 (17)
-
►
2008
(211)
- ► November 2008 (13)
- ► September 2008 (198)
Blog Archive
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment