It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 08343cam 22007214a 4500
001 ocm43187054
003 OCoLC
005 20191203074812.0
008 000224s2000 nyua 001 0 eng
010 $a 00025724
040 $aDLC$beng$cDLC$dUKM$dC#P$dBTCTA$dYDXCP$dBAKER$dIG#$dHEBIS$dDEBBG$dVA@$dZWZ$dOCLCF$dOCLCO$dOCLCQ$dI8M$dOCLCQ$dAPUMS$dOCLCO$dCSA$dOCLCQ$dOCLCO$dCNO$dOCLCO$dUOK$dOCLCQ$dOCLCO$dAU@$dOCLCQ$dCPO$dOCLCQ$dAZU
015 $aGBA0Z8718$2bnb
016 7 $a959778764$2DE-101
019 $a45853473$a50841124$a490359297
020 $a0471361747$q(paper)
020 $a9780471361749$q(paper)
035 $a(OCoLC)43187054$z(OCoLC)45853473$z(OCoLC)50841124$z(OCoLC)490359297
042 $apcc
050 00 $aQA76.73.J38$bJ3789 2000
082 00 $a005.13/3$221
084 $aST 250 J35$2rvk
084 $aST 250$2rvk
245 00 $aJava pitfalls :$btime-saving solutions and workarounds to improve programs /$cMichael C. Daconta [and others].
260 $aNew York :$bWiley,$c2000.
300 $axiv, 322 pages :$billustrations ;$c23 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
505 00 $gPart 1$tLanguage Syntax$g1 --$gItem 1$tWhen Is an "Overridden" Method Not Really Overridden?$g2 --$gItem 2$tUsage of String equals() Method versus the "==" Operator$g5 --$gItem 3$tJava Is Strongly Typed$g8 --$tType Conversion$g9 --$tWidening$g9 --$tNarrowing$g10 --$tImplicit Type Conversion$g11 --$gItem 4$tIs That a Constructor?$g12 --$gItem 5$tCannot Access Overridden Methods$g14 --$gItem 6$tAvoid the "Hidden Field" Pitfall$g17 --$tKinds of Java Variables$g18 --$tVariable Scope$g19 --$tWhich Kinds of Variables Can Be Hidden?$g20 --$tHow Instance Variables and Class Variables Get Hidden$g20 --$tHow to Access a Hidden Field Member$g22 --$tHow Hidden Variables Differ from an Overridden Method$g23 --$gItem 7$tForward References$g25 --$gItem 8$tDesign Constructors for Extension$g26 --$gItem 9$tPassing Primitives by Reference$g33 --$gItem 10$tBoolean Logic and Short-Circuit Operators$g36 --$gPart 2$tLanguage Support$g39 --$gItem 11$tReclaiming References When Using SoftReference Objects$g40 --$tA Word about Garbage Collection$g40 --$tSoftReference Class$g42 --$tReference Queues$g48 --$gItem 12$tCausing Deadlock by Calling a Synchronized Method from a Synchronized Method$g50 --$tReview of Threads, Monitors, and the "Synchronized" Keyword$g51 --$tExample of Deadlock Scenario$g55 --$gItem 13$tProperly Cloning an Object$g60 --$gItem 14$tOverriding the equals Method$g66 --$tUsing StringBuffer Objects as Hashmap Keys$g68 --$gItem 15$tAvoid Using Constructor for Implementing clone()$g70 --$gItem 16$tMethod Dispatching with Reflection, Interfaces, and Anonymous Classes$g75 --$gItem 17$tHandling Exceptions and OutOfMemoryError$g85 --$tException Syntax$g86 --$tException Hierarchy$g86 --$tCatching Exceptions$g87 --$tRunning Out of Memory$g88 --$gPart 3$tUtilities and Collections$g91 --$gItem 18$tOrdered Property Keys?$g92 --$gItem 19$tHandling Occasionally Huge Collections with Caching and Persistence$g96 --$gItem 20$tProperty File or ResourceBundle?$g108 --$gItem 21$tProperties Object Pitfalls$g111 --$gItem 22$tUsing Vector as a Collection Instead of Old API$g117 --$gPart 4$tInput/Output$g121 --$gItem 23$tSerialization$g122 --$tWhat Really Happens When We Serialize an Object?$g123 --$tExternalizable Interface$g124 --$gItem 24$tUnicode, UTF, and Streams$g126 --$tUnicode$g126 --$tUTF$g127 --$tStreams$g128 --$tInput or Output$g128 --$tBytes or Characters$g129 --$tLow Level or High Level$g130 --$tData Sink or Filter$g130 --$tChaining$g130 --$tConfigurable Encoding$g131 --$gItem 25$tSending Serialized Objects over Sockets$g132 --$gItem 26$tTry, Catch ... Finally?$g135 --$gItem 27$tFlushing Image Resources$g139 --$gPart 5$tGui Presentation$g145 --$gItem 28$tProviding Progress Feedback$g146 --$tUsing a Busy Cursor$g147 --$tUsing a Progress Monitor$g149 --$gItem 29$tUsing repaint() Instead of validate() for Re-Layout of Components$g152 --$gItem 30$tZ-Order and Overlapping Components$g156 --$tLayout Managers$g157 --$tJLayeredPane$g162 --$gItem 31$tSolving the Validate, Revalidate, Invalidate Mystery$g164 --$gItem 32$tStacking Items Vertically$g168 --$gItem 33$tHow to Use GridBagLayout Properly$g178 --$gItem 34$tAvoiding Flicker$g186 --$tPainting in AWT$g187 --$tPainting in Swing$g191 --$gItem 35$tComponents with Embedded HTML$g192 --$gPart 6$tGui Control$g197 --$gItem 36$tBetter Data Validation$g198 --$tTailored Components$g199 --$tFiltering$g199 --$tConsuming Events$g200 --$tPost-Entry Validation$g201 --$tDesign Issues$g202 --$tAsynchronous Validation$g202 --$tValidation Adapter$g204 --$tValidation Techniques$g206 --$tValidation Using Exceptions$g206 --$tChained Validators$g208 --$gItem 37$tDesensitizing GUI Components Based on Application State$g209 --$tOver-Reactive Approach$g210 --$tBrute-Force Approach$g210 --$tAbstract Approach--A StateMonitor Class$g211 --$tList Viewer$g213 --$tAdaptive Sensitization$g215 --$gItem 38$tUse Threads in Event Handlers to Avoid Freezing Your GUI$g216 --$tImplementing an Effective Cancel with Threading$g218 --n$tImplementing an Effective Cancel with SwingWorker$g222 --$gItem 39$tModel View Controller and JTree$g224 --$gItem 40$tHow to Data Transfer Something Other Than Text$g227 --$tData Transfer Overview$g227 --$tThree Types of Data Transfer$g229 --$tIntra-JVM Example$g229 --$tDetermining What Support Is Available for Data Transfer$g234 --$tInter-JVM and Native-JVM Example$g235 --$gItem 41$tA KeyListener That Doesn't Listen?$g250 --$gItem 42$tPrinting Text, HTML, and Images in a JEditorPane$g254 --$gPart 7$tPerformance$g265 --$gItem 43$tLazy Loading Our Way to Better Performance$g266 --$gItem 44$tUsing Object Pools for Excessive Object Creation$g269 --$tObject Recycling$g269 --$tA Comparison to Caching$g269 --$tImplementation$g270 --$tGood$g272 --$tBad$g272 --$tUgly$g273 --$gItem 45$tPerformance Watch: Array versus Vector$g274 --$tWhy is a Vector so much slower than an Array?$g277 --$tWhen should I use a Vector?$g278 --$tArrayList Class$g279 --$gItem 46$tAvoid Using Temporary Arrays for Dynamic Array Growth$g280 --$gItem 47$tUse StringBuffer Instead of '+' for Concatenation inside a Loop$g286 --$gItem 48$tIs There a Better Way to Debug?$g290 --$gItem 49$tEncapsulating JNI Calls through Interfaces$g292 --$tDiscussion of Concept$g292 --$tAn Example Interface$g294 --$tPure Java Implementation$g296 --$tNative Implementation$g298 --$tWindows Specifics$g302 --$gItem 50$tAssertions$g307 --$tAssertions in Java$g308 --$tUsing Assertions$g308 --$tHow Not to Use Assertions$g309.
530 $aAlso issued online.
650 0 $aJava (Computer program language)
650 7 $aJava (Computer program language)$2fast$0(OCoLC)fst00982065
650 7 $aJava$gProgrammiersprache$2gnd
650 7 $aProgrammoptimierung$2gnd
650 7 $aProgrammierung$2gnd
650 7 $aJava (langage de programmation)$2ram
650 07 $aJava <Programmiersprache>$2swd
650 07 $aProgrammierung.$2swd
700 1 $aDaconta, Michael C.
776 08 $iOnline version:$tJava pitfalls.$dNew York : Wiley, 2000$w(OCoLC)606292885
856 41 $3Table of contents$uhttp://catdir.loc.gov/catdir/toc/onix01/00025724.html
856 41 $zConnect to this title online$uhttp://corpitk.earthweb.com/reference/0471361747.html
856 42 $3Contributor biographical information$uhttp://catdir.loc.gov/catdir/bios/wiley041/00025724.html
856 42 $3Publisher description$uhttp://catdir.loc.gov/catdir/description/wiley031/00025724.html
938 $aBaker & Taylor$bBKTY$c39.99$d29.99$i0471361747$n0003438762$sactive
938 $aBaker and Taylor$bBTCP$n00025724
938 $aIngram$bINGR$n9780471361749
938 $aYBP Library Services$bYANK$n1620490
029 1 $aAU@$b000021266346
029 1 $aAU@$b000021370999
029 1 $aAU@$b000024157126
029 1 $aDEBBG$bBV013378523
029 1 $aDEBSZ$b086359142
029 1 $aHEBIS$b094237131
029 1 $aIG#$b9780471361749
029 1 $aNLGGC$b204144876
029 1 $aNZ1$b5540540
029 1 $aUKDON$b0471361747
029 1 $aUNITY$b01919546X
029 1 $aYDXCP$b1620490
029 1 $aZWZ$b052204421
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 221 OTHER HOLDINGS