Predictional C ++: 47 c ++ engineering challenges, Programming Problems and Solutions (Chinese Version)

Source: Internet
Author: User
Tags microsoft c
Predictional C ++: 47 c ++ engineering difficulties, Programming Problems and Solutions (Chinese Version)
Basic Information
Author: (US) Herb Sutter
Translator: Yan Xuejun
Series name: Classic Books
Press: Electronic Industry Press
ISBN: 9787121170850
Mounting time:
Published on: February 1, June 2012
Start: 16
Page number: 276
Version: 1-1
Category: Computer> Software and programming> C ++
Cooperation Area> Microsoft technical books> Microsoft Program Design> Microsoft C/C ++/VC ++ for more information about "predictional C ++: 47 c ++ engineering difficulties, Programming Problems and Solutions (Chinese Version)
Introduction
Computer books
Predictional C ++: 47 c ++ engineering difficulties, Programming Problems and Solutions (Chinese version) describes how to use standard C ++ for enterprise-level software development, through the "question/answer" method, readers are inspired to think and understand the design ideas hidden behind the problem, as well as the applicable scenarios of various programming guiding principles. The terms listed in this book cover many topics, especially the rational design of exception security, classes and modules, correct code optimization, and write the portable code that complies with the c ++ standard for in-depth discussion.
Predictional C ++: 47 c ++ engineering difficulties, Programming Problems and Solutions (Chinese version) are suitable for readers who have a certain degree of C ++ programming basics.
Directory
Predictional C ++: 47 c ++ engineering difficulties, Programming Problems and Solutions (Chinese Version)
1 generic programming and C ++ standard library 1
Clause 1: iterator Difficulty coefficient 1
Clause 2: case-insensitive string -- one of the five
Clause 3: case-insensitive string -- 2 9
Clause 4: Generic containers with the highest reusability -- one of 12
Article 5: Generic containers with the highest reusability -- II 13
Clause 6: Temporary objects 22
Clause 7: use of the standard library (or, on temporary objects) 28
2 issues related to abnormal security and technology 31
Clause 8: Write abnormal security code -- one of 32
Clause 9: Write abnormal security code-Part 2 37
Clause 10: Write abnormal security code -- Part 3 40
Clause 11: Write abnormal and secure code-Part 4: 47
Clause 12: Write abnormal and secure code-
Clause 13: Write abnormal and secure code -- 6th 56
Clause 14: Write abnormal and secure code -- 762
Clause 15: Write exceptional security code-
Clause 16: Write exceptional security code-968
Article 17: Writing exceptional security code-
Article 18: Code complexity-75
Article 19: Code complexity-II 79
Class 3 design and inheritance 85
Article 20: Writing Skills for Classes 85
Article 21: virtual function overloading 93
Clause 22: Relationship between classes -- one 99
Article 23: Relationship between classes -- Part 2 103
Clause 24: Use and Misuse of inheritance 110
Article 25: Object-oriented programming 121
4 compiler firewall and pimpl usage 123
Article 26: Minimize compile-time dependencies-one 123
Article 27: Minimize compile-time dependencies-II 127
Article 28: Minimize compile-time dependencies -- Part 3 132
Clause 29: Compile firewall 135
Clause 30: Fast pimpl usage 138
5. Name Search, namespace, and interface Rule 148
Clause 31: Name Search and interface rules -- one of the 148
Clause 32: Name Search and interface rules -- 2 152
Clause 33: Name Search and interface rules -- Part 3 162
Clause 34: Name Search and interface rules-Part 4 167
6. Memory Management: 176
Article 35: Memory Management-1, 176
Clause 36: Memory Management-Part 2 179
Clause 37: auto_ptr 186
7 misunderstandings, traps, and mispractices 201
Clause 38: Object ID 201
Clause 39: automatic conversion 204
Clause 40: lifetime of an object-1, 206
Cla41: Object survival period-2 209
8 other theme 219
Cla42: Variable initialization 219
Cla43: Use const 222 correctly
Cla44: type conversion 231
Clause 45: bool 238
Cla46: Transfer Function 242
Article 47: Control Process 244
Postscript 254
Bibliography 256

This book is from: China Interactive publishing network

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.