Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Linux Programmer's Toolbox (Prentice Hall Open Source Software Development Series)

Buy
Master the Linux Tools That Will Make You a More Productive Programmer

Linux comes with an extraordinary collection of power tools for C and C++ developers. The Linux Programmer's Toolbox helps you leverage all that power and productivity--without mastering endless syntax options, tracking down hard-to-find documentation, or reading kernel source code. John Fusco systematically illuminates today's best open source tools, explaining which to choose, where to find them, how to use them, and why you'd want to.

You'll start by walking through installing, patching, and managing software development tools on your Linux system. Next, you'll discover the right tools to solve real-world problems at every stage of your project, from coding to revision control, debugging to performance optimization. Fusco's concise, practical examples are designed for clarity--and easy modification to your needs.

Coverage includes

  • Maximizing productivity with editors, revision control tools, source code browsers, and "beautifiers"
  • What programmers should know about the kernel: interpreting what your tools are telling you
  • Understanding processes--and the tools available for managing them
  • Debugging IPC with shell commands: signals, pipes, sockets, files, and IPC objects
  • Optimizing program code with sar, vmstat, iostat, and other tools
  • Tracing and resolving application bottlenecks with gprof and valgrind
  • Using printf, gdb, and other essential debugging tools
  • Streamlining and automating the documentation process
  • Finding help, solutions, and workarounds when you need them
About the Author

John Fusco, a Senior Software Engineer at GE Healthcare, has spent ten years developing high performance UNIX and Linux medical imaging software and device drivers. Previously, he developed advanced UNIX-based software and systems for the U.S. Navy. His articles have appeared in Embedded Systems Programming and Linux Journal.

(HTML tags aren't allowed.)

Inside Network Perimeter Security (2nd Edition)
Inside Network Perimeter Security (2nd Edition)
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip...
Web Site Privacy with P3P
Web Site Privacy with P3P
Introducing the long-awaited first step to personal privacy on the Web!

Privacy on the Internet is a very complicated–and delicate–subject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server....

Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks presents abstract models that capture the cross layer interaction from the physical to transport layer in wireless network architectures including cellular, ad-hoc and sensor networks as well as hybrid wireless-wireline. The emphasis in the presentation is on describing the models and...

Succeeding with Object Databases: A Practical Look at Today's Implementations with Java and XML
Succeeding with Object Databases: A Practical Look at Today's Implementations with Java and XML
There is a definite need by many users and practitioners for documented case studies and examples that demonstrate the first-hand use of Object Data Management in realworld applications and systems. During the past few years, we have seen tremendous interest in Java. There has been an important shift from using Java just on the clientside to the...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Software Testing: Testing Across the Entire Software Development Life Cycle
Software Testing: Testing Across the Entire Software Development Life Cycle
Software Testing presents one of the first comprehensive guides to testing activities, ranging from test planning through test completion for every phase of software under development, and software under revision. Real life case studies are provided to enhance understanding as well as a companion website with tools and examples....
©2021 LearnIT (support@pdfchm.net) - Privacy Policy