1. 首页
  2. 课程学习
  3. C++/C
  4. MoreEffectiveC++

MoreEffectiveC++

上传者: 2019-05-19 13:23:55上传 PDF文件 10.21MB 热度 30次
More Effective C++,英文版,经典,值得一读This page intentionally left blankMore Effective C++Addison-Wesley Professional Computing SeriesBrian W. Kernighan, Consulting EditorMatthew H. Austern, Generic Programming and the STL: Using and Extending the C++ Standard Template libraryDavid R. Butenhof, Programming with posiX threadsBrent Callaghan nfs lllustratedTom Cargill, C++ Programming StyleWilliam R Cheswick /Steven M. Bellovin/Aviel D. Rubin, Firewalls and Internet Security, Second Edition: Repellingley HacKe]David A Curry, UNIX System Security: A Guide for users and System AdministratorsStephen C. Dewhurst, C++ Gotchas: Avoiding Common Problems in Coding and designDan Farmer/Wietse Venema, Forensic discoveryErich Gamma/Richard Helm/Ralph Johnson/John Vlissides, Design Patterns: Elements of reusable object-Oriented SoftwareErich Gamma/Richard Helm /Ralph Johnson/John Vlissides, Design Patterns CD: Elements of Reusable object-Oriented SoftwarePeter Haggar, Practical Java Programming Language GuideDavid R. Hanson, C Interfaces and Implementations: Techniques for Creating Reusable SoftwareMark Harrison/Michael McLennan, Effective Tcl/Tk Programming: Writing Better Programs with Tcl and TkMichi Henning /Steve Vinoski, Advanced CORBA Programming with C++Brian W. Kernighan/Rob Pike, The Practice of programmingS. Keshav, An Engineering Approach to Computer Networking: ATM Networks, the Internet, and the Telephone NetworkJohn lakos, Large-Scale C++ Software designScott Meyers, Effective C++ CD: 85 Specific Ways to Improve Your Programs and designsScott Meyers, Effective C++, Third Edition: 55 Specific Ways to Improve Your programs and designsScott Meyers, More Effective C++: 35 New Ways to Improve Your Programs and designsScott Meyers, Effective STL: 50 Specific Ways to Improve Your use of the Standard Template libraryRobert B. Murray, C++ Strategies and TacticsDavid R. Musser/Gillmer J Derge/Atul Saini, STL Tutorial and Reference Guide, Second editionC++ Programming with the Standard Template libraryJohn K Ousterhout, Tcl and the tk ToolkitCraig Partridge, Gigabit networkingRadia Perlman, Interconnections, Second Edition: Bridges, Routers, Switches, and Internetworking protocolsStephen A Rago, UNIX System V Network programmingEric S Raymond, The Art of UNIX ProgrammingMarc J Rochkind, Advanced UNIX Programming, Second EditionCurt Schimmel, UnIX Systems for Modern Architectures: Symmetric Multiprocessing and Caching for Kernel programmersW. Richard Stevens TCP/IP Illustrated, volume 1: The ProtocolsW. richarD Stevens Tcp/p Illustrated Volume 3: Tcp for Transactions, Http Nntp, and the UnixDomain protocolsW. Richard Stevens/Bill Fenner/Andrew M. Rudoff, UNIX Network Programming Volume 1, Third Edition: TheSockets Networking apⅠW. Richard Stevens/Stephen A Rago, Advanced Programming in the UNIX Environment, Second editionW. Richard Stevens /Gary R. Wright, TCP/P Illustrated Volumes 1-3 Boxed SetJohn Viega /Gary McGraw, Building Secure Software: How to Avoid Security Problems the right WayGary R. Wright/W. Richard Stevens, TCP/IP Illustrated, Volume 2: The ImplementationRuixi Yuan/W. Timothy Strayer, Virtual Private Networks: Technologies and SolutionsVisitwww.awprofessional.com/series/professionalcomputingformoreinformationaboutthesetitlesMore effective ct+35 New Ways to Improve Your Programs and DesignsScott MeyersADDISON- WESLEYBoston· San francisco· New york· Toronto· MontrealLondon· Munich· Paris· MadridCapetown· Sydney· Tokyo· Singapore· Mexico cityThis e-book reproduces in electronic form the printed book content of More effective C++: 35 NewWays to Improve Your Programs and Designs, by Scott Meyers. Copyright o 1996 by Addison-Wesley,an imprint of pearson Education, Inc. ISBN: 0-201-63371-XLICENSE FOR PERSONAL USE: For the convenience of readers this e-book is licensed and sold inits PDF version without any digital rights management ( DRM) applied. Purchasers of the PDF versionmay, for their personal use only, install additional copies on multiple devices and copy or print excerptsfor themselves. The duplication, distribution, transfer, or sharing of this e-book's content for any purpose other than the purchasers personal use, in whole or in part, by any means, is strictly prohibitedPERSONALIZATION NOTICE: To discourage unauthorized uses of this e-book and thereby allow itspublication without DRM. each copy of the Pdf version identifies its purchaser. To encourage a DRM-free policy, please protect your files from access by othersMany of the designations used by manufacturers and sellers to distinguish their products are claimed astrademarks. Where those designations appear in the original printed book and this e-book, and we wereaware of a trademark claim, the designations have been printed in initial capital letters or in all capitalsThe author and publisher have taken care in the preparation of the original printed book and this e-book,but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising outof thc usc of thc information or programs contained hcrcinDISCOUNTS AND SITE LICENSES: The publisher offers discounted prices on this e-book when purchased with its corresponding printed book or with other e-books by Scott Meyers. The publisher alsooffers site licenses for these e-books(not available in some countries ) For more information, pleasevisitwww.scottmeyers-ebOoks.comorwww.informit.com/awCopyright@ 2008 by Pearson Education, IncAll rights reserved. This publication is protected by copyright, and permission must be obtained fromthe publisher prior to any prohibited reproduction, storagc in a rctricval systcm, or transmission in anyform or by any means, electronic, mechanical, photocopying, recording, or likewise. For informationregarding permissions, write toPearson education incRights and Contracts Department501 Boylston Street, Suite 900Boston MA 02116Fax(6l7671-3447E- book IsBn13:978-0-321-51581-0E- book isbn10:0-321-51581-1Second e-book release, April 2011(essentially identical to the 28th Paper Printing)For clancymy favorite enemy withinThis page intentionally left blankContentsAcknowledgmentsIntroductionBasicsItem 1: Distinguish between pointers and referencesItem 2: Prefer C++-style casts12Itcm 3: Never trcat arrays polymorphically16Item 4: Avoid gratuitous default constructors19Operators24Item 5: Be wary of user-defined conversion functions24Item 6: Distinguish between prefix and postfix forms ofincrement and decrement operators31Item 7. Never overload &or35Item 8: Understand the different meanings of newand delete38Exceptions44Item 9: Usc destructors to prevent resource leaks45Item 10: Prevent resource leaks in constructors0Item 11: Prevent exceptions from leaving destructors58Item 12: Understand how throwing an exception differs frompassing a parameter or calling a virtual function61Item 13: Catch exceptions by reference68Item 14: Use exception specifications judiciously.72Item 15: Understand the costs of exception handling
用户评论