Design patterns in Java / (Record no. 527)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06549cam a22002294a 4500 |
001 - CONTROL NUMBER | |
control field | 1756 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200702104550.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 060201s2006 njua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131713082 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | PK |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.13/3 |
Edition number | 22 |
Item number | M5949 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Metsker, Steven John. |
245 10 - TITLE STATEMENT | |
Title | Design patterns in Java / |
Statement of responsibility, etc | Steven John Metsker, William C. Wake. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New Delhi : |
Name of publisher, distributor, etc | Pearson, |
Date of publication, distribution, etc | 2007 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xiv, 461 p. |
Other physical details | ill. ; |
Dimensions | 25 cm. |
500 ## - GENERAL NOTE | |
General note | Includes bibliographical references (p. 447-448) and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Java (Computer program language) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Software patterns. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Wake, William C., |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1 Contents<br/>2 Preface vii <br/>3 Chapter 1: introduction 1 <br/>4 Why patterns? 1 <br/>5 Why design patterns? 2 <br/>6 Why java? 3 <br/>7 Uml 3 <br/>8 Challenges 4 <br/>9 The organization of this book 4 <br/>10 Welcome to oozinoz! 6 <br/>11 Summary 6 <br/>12 Part i: interface _patterns <br/>13 Chapter 2: introducing interfaces 9 <br/>14 Interfaces and abstract classes 9 <br/>15 Interfaces and obligations 11 <br/>16 Summary 13 <br/>17 Beyond ordinary interfaces 13 <br/>18 Chapter 3: adapter 15 <br/>19 Adapting to an interface 15 <br/>20 Class and object adapters 21 <br/>21 Adapting data for a jtable 25 <br/>22 Identifying adapters 31 <br/>23 Summary 32 <br/><br/>24 Chapter 4: facade 35 <br/>25 Facades, utilities, and demos 35 <br/>26 Refactoring to facade 37 <br/>27 Summary 49 <br/>28 Chapter 5: composite 51 <br/>29 An ordinary composite 52 <br/>30 Recursive behavior in composites 52 <br/>31 Composites, trees, and cycles 55 <br/>32 Composites with cycles 60 <br/>33 Consequences of cycles 65 <br/>34 Summary 65 <br/>35 Chapter 6: bridge 67 <br/>36 An ordinary abstraction-on the way to bridge 67 <br/>37 From abstraction to bridge 70 <br/>38 Drivers as bridges 72 <br/>39 Database drivers 73 <br/>40 Summary 75 <br/>41 Part ii: responsibility _patterns <br/>42 Chapter 7: introducing responsibility 79 <br/>43 Ordinary responsibility 80 <br/>44 Controlling responsibility with visibility 82 <br/>45 Summary 83 <br/>46 Beyond ordinary responsibility 83 <br/>47 Chapter 8: singleton 85 <br/>48 Singleton mechanics 85 <br/>49 Singletons and threads 87 <br/>50 Recognizing singleton 88 <br/>51 summary 90 <br/>52 Chapter 9: observer 91 <br/>53 A classic example-observer in guis 91 <br/>54 Model/view/controller 96 <br/>55 Maintaining an observable object 102 <br/>56 Summary 105 <br/>57 Chapter 10: mediator 107 <br/>58 A classic example-gui mediators 107 <br/>59 Mediators of relational integrity 112 <br/>60 Summary 120 <br/>61 Chapter 11: proxy 123 <br/>62 A classic example-image proxies 123 <br/>63 Image proxies reconsidered 128 <br/>64 Remote proxies 131 <br/>65 Dynamic proxies 137 <br/>66 Summary 142 <br/>67 Chapter 12: chain of responsibility 143 <br/>68 An ordinary chain of responsibility 143 <br/>69 Refactoring to chain of responsibility 145 <br/>70 Anchoring a chain 148 <br/>71 Chain of responsibility without composite 150 <br/>72 Summary 150 <br/>73 Chapter 13: flyweight 151 <br/>74 Immutability 151 <br/>75 Extracting the immutable part of a flyweight 152 <br/>76 Sharing flyweights 154 <br/>77 Summary 158 <br/>78 Part iii: construction _patterns <br/>79 Chapter 14: introducing construction 161 <br/>80 A few construction challenges 161 <br/>81 Summary 163 <br/>82 Beyond ordinary construction 163 <br/>83 Chapter 15: builder 165 <br/>84 An ordinary builder 165 <br/>85 Building under constraints 168 <br/>86 A forgiving builder 171 <br/>87 Summary 171 <br/>88 Chapter 16: factory method 173 <br/>89 A classic example-iterators 173 <br/>90 Recognizing factory method 174 <br/>91 Taking control of which class to instantiate 175 <br/>92 Factory method in parallel hierarchies 177 <br/>93 Summary 180 <br/>94 Chapter 17: abstract factory 181 <br/>95 A classic example-gui kits 181 <br/>96 Abstract factories and factory method 188 <br/>97 Packages and abstract factories 193 <br/>98 Summary 194 <br/>99 Chapter 18: prototype 195 <br/>100 Prototypes as factories 196 <br/>101 Prototyping with clones 197 <br/>102 Summary 200 <br/>103 Chapter 19: memento 201 <br/>104 A classic example-using memento for undo 201 <br/>105 Memento durability 209 <br/>106 Persisting mementos across sessions 209 <br/>107 Summary 213 <br/>108 Part iv: operation _patterns <br/>109 Chapter 20: introducing operations 217 <br/>110 Operations and methods 217 <br/>111 Signatures 218 <br/>112 Exceptions 219 <br/>113 Algorithms and polymorphism 220 <br/>114 Summary 222 <br/>115 Beyond ordinary operations 223 <br/>116 Chapter 21: template method 225 <br/>117 A classic example-sorting 225 <br/>118 Completing an algorithm 229 <br/>119 Template method hooks 231 <br/>120 Refactoring to template method 233 <br/>121 Summary 235 <br/>122 Chapter 22 : state 237 <br/>123 Modeling states 237 <br/>124 Refactoring to state 241 <br/>125 Making states constant 246 <br/>126 Summary 248 <br/>127 Chapter 23: strategy 249 <br/>128 Modeling strategies 249 <br/>129 Refactoring to strategy 252 <br/>130 Comparing strategy and state 256 <br/>131 Comparing strategy and template method 257 <br/>132 Summary 257 <br/>133 Chapter 24: command 259 <br/>134 A classic example-menu commands 259 <br/>135 Using command to supply a service 262 <br/>136 Command hooks 264 <br/>137 Command in relation to other patterns 266 <br/>138 Summary 267 <br/>139 Chapter 25: interpreter 269 <br/>140 An interpreter example 269 <br/>141 Interpreters, languages, and parsers 283 <br/>142 Summary 283 <br/>143 Part v: extension patterns <br/>144 Chapter 26: introducing extensions 287 <br/>145 Principles of object-oriented design 287 <br/>146 The liskov substitution principle 288 <br/>147 The law of demeter 289 <br/>148 Removing code smells 290 <br/>149 Beyond ordinary extensions 291 <br/>150 Summary 293 <br/>151 Chapter 27: decorator 295 <br/>152 A classic example-streams and writers 295 <br/>153 Function wrappers 305 <br/>154 Decorator in relation to other patterns 314 <br/>155 Summary 315 <br/>156 Chapter 28: iterator 317 <br/>157 Ordinary iteration 317 <br/>158 Thread-safe iteration 319 <br/>159 Iterating over a composite 326 <br/>160 Summary 336 <br/>161 Chapter 29: visitor 339 <br/>162 Visitor mechanics 339 <br/>163 An ordinary visitor 341 <br/>164 Visitor cycles 348 <br/>165 Visitor risks 353 <br/>166 Summary 354 <br/>167 Part vi: appendixes <br/>168 Appendix a: directions 355 <br/>169 Get the most out of this book 355 <br/>170 Understand the classics 356 <br/>171 Weave patterns into your code 356 <br/>172 Keep learning 357 <br/>173 Appendix b: solutions 359 <br/>174 Appendix c: oozinoz source 439 <br/>175 Acquiring and using the source 439 <br/>176 Building the oozinoz code 439 <br/>177 Testing the code with junit 440 <br/>178 Finding files yourself 440 <br/>179 Summary 441 <br/>180 Appendix d: uml at a glance 443 <br/>181 Classes 444 <br/>182 Class relationships 446 <br/>183 Interfaces 447 <br/>184 Objects 448 <br/>185 States 449 <br/>186 Glossary 451 <br/>187 Bibliography 459 <br/>188 Index<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 07.06.2018 | U.E. | 005.133 M5949 | T1756 | 07.06.2018 | 07.06.2018 | Books |