Street Coder: The rules to break and how to break them

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Computer science theory quickly collides with the harsh reality of professional software development. This wickedly smart and devilishly funny beginner's guide shows you how to get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. In Street Coder you will learn: • Data types, algorithms, and data structures for speedy software development • Putting "bad" practices to good use • Learn to love testing • Embrace code breaks and become friends with failure • Beginner-friendly insight on code optimization, asynchronous programming, parallelization, and refactoring Street Coder: Rules to break and how to break them is a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. It takes the best practices you learn in a computer science class and deconstructs them to show when they’re beneficial—and when they aren't! This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learn the crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Welcome to the streets! About the technology Fresh-faced CS grads, bootcampers, and other junior developers lack a vital quality: the “street smarts” of experience. To succeed in software, you need the skills and discipline to put theory into action. You also need to know when to go rogue and break the unbreakable rules. Th is book is your survival guide. About the book Street Coder teaches you how to handle the realities of day-to-day coding as a software developer. Self-taught guru Sedat Kapanoglu shares down-and-dirty advice that’s rooted in his personal hands-on experience, not abstract theory or ivory-tower ideology. You’ll learn how to adapt what you’ve learned from books and classes to the challenges you’ll face on the job. As you go, you’ll get tips on everything from technical implementations to handling a paranoid manager. What's inside • Beginner-friendly insights on code optimization, parallelization, and refactoring • Put “bad” practices to good use • Learn to love testing • Embrace code breaks and become friends with failure About the reader For new programmers. Examples in C#. About the author Sedat Kapanoglu is a self-taught programmer with more than 25 years of experience, including a stint at Microsoft.

Author(s): Sedat Kapanoglu
Edition: 1
Publisher: Manning Publications
Year: 2022

Language: English
Commentary: Publisher's PDF
Pages: 325
City: Shelter Island, NY
Tags: Algorithms; Software Engineering; Debugging; Data Structures; Security; C#; .NET; Scalability; Best Practices; Refactoring; Testing; Career; Threat Models; Computer Science; Code Optimization; Test-Driven Development; Type-Driven Development; Anti-Patterns

Street Coder
brief contents
contents
preface
acknowledgments
about this book
Who should read this book
How this book is organized: A road map
About the code
liveBook discussion forum
about the author
about the cover illustration
Chapter 1: To the streets
1.1 What matters in the streets
1.2 Who’s a street coder?
1.3 Great street coders
1.3.1 Questioning
1.3.2 Results-driven
1.3.3 High-throughput
1.3.4 Embracing complexity and ambiguity
1.4 The problems of modern software development
1.4.1 Too many technologies
1.4.2 Paragliding on paradigms
1.4.3 The black boxes of technology
1.4.4 Underestimating overhead
1.4.5 Not my job
1.4.6 Menial is genial
1.5 What this book isn’t
1.6 Themes
Chapter 2: Practical theory
2.1 A crash course on algorithms
2.1.1 Big-O better be good
2.2 Inside data structures
2.2.1 String
2.2.2 Array
2.2.3 List
2.2.4 Linked list
2.2.5 Queue
2.2.6 Dictionary
2.2.7 HashSet
2.2.8 Stack
2.2.9 Call stack
2.3 What’s the hype on types?
2.3.1 Being strong on the type
2.3.2 Proof of validity
2.3.3 Don’t framework hard, framework smart
2.3.4 Types over typos
2.3.5 To be nullable or non-nullable
2.3.6 Better performance for free
2.3.7 Reference types vs. value types
Chapter 3: Useful anti-patterns
3.1 If it ain’t broke, break it
3.1.1 Facing code rigidity
3.1.2 Move fast, break things
3.1.3 Respecting boundaries
3.1.4 Isolating common functionality
3.1.5 Example web page
3.1.6 Leave no debt behind
3.2 Write it from scratch
3.2.1 Erase and rewrite
3.3 Fix it, even if it ain’t broke
3.3.1 Race toward the future
3.3.2 Cleanliness is next to codeliness
3.4 Do repeat yourself
3.4.1 Reuse or copy?
3.5 Invent it here
3.6 Don’t use inheritance
3.7 Don’t use classes
3.7.1 Enum is yum!
3.7.2 Structs rock!
3.8 Write bad code
3.8.1 Don’t use If/Else
3.8.2 Use goto
3.9 Don’t write code comments
3.9.1 Choose great names
3.9.2 Leverage functions
Chapter 4: Tasty testing
4.1 Types of tests
4.1.1 Manual testing
4.1.2 Automated tests
4.1.3 Living dangerously: Testing in production
4.1.4 Choosing the right testing methodology
4.2 How to stop worrying and love the tests
4.3 Don’t use TDD or other acronyms
4.4 Write tests for your own good
4.5 Deciding what to test
4.5.1 Respect boundaries
4.5.2 Code coverage
4.6 Don’t write tests
4.6.1 Don’t write code
4.6.2 Don’t write all the tests
4.7 Let the compiler test your code
4.7.1 Eliminate null checks
4.7.2 Eliminate range checks
4.7.3 Eliminate valid value checks
4.8 Naming tests
Chapter 5: Rewarding refactoring
5.1 Why do we refactor?
5.2 Architectural changes
5.2.1 Identify the components
5.2.2 Estimate the work and the risk
5.2.3 The prestige
5.2.4 Refactor to make refactoring easier
5.2.5 The final stretch
5.3 Reliable refactoring
5.4 When not to refactor
Chapter 6: Security by scrutiny
6.1 Beyond hackers
6.2 Threat modeling
6.2.1 Pocket-sized threat models
6.3 Write secure web apps
6.3.1 Design with security in mind
6.3.2 Usefulness of security by obscurity
6.3.3 Don’t implement your own security
6.3.4 SQL injection attacks
6.3.5 Cross-site scripting
6.3.6 Cross-site request forgery
6.4 Draw the first flood
6.4.1 Don’t use captcha
6.4.2 Captcha alternatives
6.4.3 Don’t implement a cache
6.5 Storing secrets
6.5.1 Keeping secrets in source code
Chapter 7: Opinionated optimization
7.1 Solve the right problem
7.1.1 Simple benchmarking
7.1.2 Performance vs. responsiveness
7.2 Anatomy of sluggishness
7.3 Start from the top
7.3.1 Nested loops
7.3.2 String-oriented programming
7.3.3 Evaluating 2b || !2b
7.4 Breaking the bottle at the neck
7.4.1 Don’t pack data
7.4.2 Shop local
7.4.3 Keep dependent works separated
7.4.4 Be predictable
7.4.5 SIMD
7.5 1s and 0s of I/O
7.5.1 Make I/O faster
7.5.2 Make I/O non-blocking
7.5.3 The archaic ways
7.5.4 Modern async/await
7.5.5 Gotchas of async I/O
7.6 If all else fails, cache
Chapter 8: Palatable scalability
8.1 Don’t use locks
8.1.1 Double-checked locking
8.2 Embrace inconsistency
8.2.1 The dreaded NOLOCK
8.3 Don’t cache database connections
8.3.1 In the form of an ORM
8.4 Don’t use threads
8.4.1 The gotchas of async code
8.4.2 MULTITHREADING with async
8.5 Respect the monolith
Chapter 9: Living with bugs
9.1 Don’t fix bugs
9.2 The error terror
9.2.1 The bare truth of exceptions
9.2.2 Don’t catch exceptions
9.2.3 Exception resiliency
9.2.4 Resiliency without transactions
9.2.5 Exceptions vs. errors
9.3 Don’t debug
9.3.1 printf() debugging
9.3.2 Dump diving
9.3.3 Advanced rubber-duck debugging
index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z