Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Sutter H., Alexandrescu A. — C++ Coding Standards: 101 Rules, Guidelines, and Best Practices
Sutter H., Alexandrescu A. — C++ Coding Standards: 101 Rules, Guidelines, and Best Practices



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: C++ Coding Standards: 101 Rules, Guidelines, and Best Practices

Авторы: Sutter H., Alexandrescu A.

Аннотация:

The authors cover virtually every facet of C++ programming: design and coding style, functions, operators, class design, inheritance, construction/destruction, copying, assignment, namespaces, modules, templates, genericity, exceptions, STL containers and algorithms, and more. Each standard is described concisely, with practical examples. From type definition to error handling, this book presents C++ best practices, including some that have only recently been identified and standardized-techniques you may not know even if you've used C++ for years.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 240

Добавлена в каталог: 14.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
deallocation functions      
Dechev, Damian      
declaration      
declaration ambiguities      
declaring      
decrement      
default      
default arguments      
default case      
Default constructor      2nd
default container      
defined but not used      
Definition      
DELETE      
Dependencies      
dependency cycles      
Dependency Inversion Principle      2nd
dependency management      2nd
Dependent      
dependent names      
depending upon instead of details      
Deployment      
derived      [See polymorphism and substitutability]
design patters      
destructor      [See copy construction]
Destructors      2nd
details      
Detection      
Dewhurst, Steve      
Dimov, Peter      
dint      
disabling      
disabling unwanted      
disabling warnings      [See warnings]
discriminated unions library      
disk capacity      
disk-bound      
Distance      2nd 3rd
Divide and conquer      [See minimal vs. monolithic]
DoClone      
downcasting with      
downcasts      
draw      
dusty corners      
Dynamic      2nd
Dynamic checking      
dynamically checked errors      [See errors errors;dynamic
dynamic_cast      2nd
ease of      
EBO      [See empty base class optimization]
ECO      [See empty base class optimization]
Efficiency      [See performance]
empty base class      
empty base class optimization      2nd
empty()      
enabling compiler's      2nd
encapsulate where possible      
Encapsulation      2nd 3rd 4th 5th 6th
enums      2nd
equal_range      
ER units      
errno      2nd
error code      
error codes      
error messages      
error safety      2nd 3rd
error-safety      
Errors      
example of      2nd 3rd
example use of      
exception      
Exception classes      [See classes exception]
Exception handling      
exception safety      [See error safety]
exception specifications      2nd
Exceptions      
Explicit      2nd
explicit loops      
explicit preferred      
explicit qualification      2nd
Exponential      
exposing      
expression templates      2nd
EXTERNAL      
external #include guards      
external locking      
Facets      
Factory      
factory and      
Factory functions      
FAST      
fewer explicit loops in STL-using programs      
fewer in STL-using programs      
FILE      2nd
find      
find_first_of      
find_if      
fixed-size      
FlagNth      
Fly      
fly in the      
for error safety      [See error-safety]
for resource management      
format library      
Formatting      
FORTRAN      
forward declaration      
for_each      2nd
French      
fudgeFactor      
full build      2nd
Fuller, John      
Function      
function arguments      
function objects      2nd
function parameters      
function templates      
function templates not in same namespace as a type      
Functions      
functions,compiler-generated      
Gaffney, Bernard      
generic programming      [See templates]
German      
get/set      
GetBuffer      
GetBuilding      
GetLastError      
getstr      
global      [See global variables]
global data      [See global variables]
Global namespace      
global state      [See global variables]
Global variables      2nd
Gordon, Peter      
gratuitous      
gratuitous reference to      
gratuitous use of      2nd
gratuitous use of odd word      
grauitous use of      
greater      
grep      
Griffiths, Alan      
Growth      
growth of      
Guarantees      
Handles      
handling      
hash-based      2nd 3rd
hash-based containers      [See containers containers;hash-based]
Haskell      
header files      
header guards      [See #include guards]
Headers      
Henney, Kevlin      
Henning, Michi      
Heterogeneous      
heterogeneous containers      
hide information      [See information hiding]
hiding      
hijacking      
Hinnant, Howard      
Hoare, C.A      
hole in      
Hungarian notation      
hygiene      
Hyslop, Jim      
identifying      
ignoring, dangers of      
immediately giving result to an owning object      
IMPLICIT      [See implicit interface]
implicit cast from const char[] to (non-const) char* hole in the type system      
implicit conversions      
implicit interface      
implicit type conversions      
import      
import this      
in base classes      
in constructors      
in increasing address order      
in STL implementations      
in-place      
in-place new      [See new]
inclusion      
Increment      
incremental build      2nd
Indentation      
INDEX      
index containers      
Indexing      
indexing vs. iteration      
inferior to containers      
Information hiding      
inheritance      
Initialization      
initialization dependencies      
initialization list      
initialization list ordering not significant, definition order significant      
initialization of      
initializing      
inline      2nd
Input      
Insects      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Insert      
inserter      
instead of locking      
instead of magic numbers      
interdependence between      
INTERFACE      
Interface Principle      
Interfaces      
interfaces use only sufficiently portable types      
interfering with template instantiations      
intermittent crashes      
Internal      
internal assumptions      
internal locking      
internal vs. external      
internals      
Invalid      2nd
invalid iterators      
Invariants      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th
invariants to test for      [See invariants]
iostreams      
is good      
is-a      [See substitutability]
IsHeavy      
is_in_klingon      
iterator ranges      
iterators      
Java      2nd
Johnson, Curt      
Josuttis, Nicolai      
juggling      
K&R style      [See brace placement]
Kalb, Jon      
Kanze, James      
Khesin, Max      
kinds of      
KISS      
Knuth, Donald      
Koenig lookup      [See ADL]
lack of      
Lafferty, Debbie      
Lambda library      2nd 3rd 4th
Lambda library, example use of      
Last Word      
Latin      
LaunchSatellite      
Law of      
Law of Second Chances      
leak      
leaks      
Leary-Coutu, Chanda      
Leddy, Charles      
Length      
less      
level of indirection      
Lifetime      [See object lifetime]
limit parallelism      
line length      
linear-looking that is really quadratic      2nd
link time      
link-time      
Linkage      
Lippman, Stan      
Liskov Substitution Principle      [See substitutability]
Lisp      
LIST      [See also containers]
Literals      
livelock      
locality of reference      
localized_string      
lock-free designs      
Locking      
logic_error      
lookup      
Loops      
lower_bound      
macro needed for      
macros      2nd
macros interfering with      
magic numbers      
Main      
make      2nd
making use of      2nd 3rd 4th 5th
malloc      
Managing      
managing dependencies      [See dependency management]
manual memory management      2nd
manual resource management      2nd
map, and optional values      
Marcus, Matt      
Marginean, Petru      
Martin, Robert C      
Matching      
Matrix      2nd
matters of      
matters of personal      
MAX_PATH      
McConnell, Steve      2nd
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте