Index
A
acquire( ) and release( ) functions
Ambiguous interface
Amdahl’s law
Application programming interface (API)
development process
error handling
GOTOs
health indicators
Array data structure
B
Behavioral design patterns
chain of responsibility
components
iterator
observer
publisher-subscriber
state
visitor
Bossy components
C
Code metrics
code coverage
DD
DDR
DRE
IR
review metrics
Code reusability
Code review lifecycle (CRLC)
Code reviews
agile processes
checklist
defects/potential flaws
developers
goals
informal
inspection
learning experience
logic errors
managers
manual vs. automated
reusability
ROI
SMART approach
spaghetti code
SeeSpaghetti code
types
walkthrough
Code smells
Cohesive
Collision
Comments
CDD
codebase
coding conventions
conditions/flows
example
inline
input(s) and output(s)
philosophy
programmer
Sphinx
text messages
TODO and FIX-ME
typos
Comments-driven development (CDD)
Composition vs. inheritance principle
Concurrency
CPUs and cores
definition
processes
safety
threads
thread safety
ACID transactions
definition
immutable/stateless
philosophers problem
Concurrency, thread safety, mutual exclusion
Consistency
Cost benefit analysis (CBA)
Creational design pattern
abstract factory
builder
classes
factory method
lazy initialization
singleton
Cyclic dependency
D, E
Data structures
design use case
doubly linked list
evaluation/review
hash maps
indicators
operations
Pareto principle
queue
software architecture
stack
time complexity
uniqueness
Defect density (DD)
Defect detection rate (DDR)
Defect removal effectiveness (DRE)
Design document specification (DDS)
Design smells
ambiguous interface
architectures
bossy component
components
cyclic dependencies
feature density
first lady component
list
mashed component
mesh component
unstable dependency
Directed acyclic graph (DAG)
Durability
F
Fetch, decode, and execute (FDE) pattern
First in, first out (FIFO) policy
First lady components
Formatting code
indentation
line spacing
Whitespace
Forwarding methods
G
gather_user_preferences method
get_instance() method
H
Hash function
I, J
Inspection rate (IR)
Internet of Things (IoT)
Isolation
K
Keep it simple stupid (KISS) principle
Knock-on effects
L
Last in first out (LIFO) policy
Least common mechanism
Lines of code (LOCs)
Linked-list
M
Maintainability
Mashed component
Mesh components
Minimum viable product (MVP)
Modularity
N
Naming
affects
Ambiguous
context orientation
conventions
keyword
magic numbers
modifiers
parameterization
python naming conventions
readability and longer-term memory
spacing conventions
O
Object-oriented (OO) language
Object-oriented programming (OOP)
P
Pages-long comments
Parallel programming
definition
local balancing
locality
parallelizable computation
performance measures
Amdahl’s law
asymptotic analysis
observation
metrics
task and data granularity
Peer reviews
Post-condition
Pre-condition
Premature optimization principle
Publisher-subscriber patterns
Q
Quality of service (QoS)
R
Requirements
functional
FURPS+
non-functional
validation process
Return of investment (ROI)
S
Secure software development lifecycle (SSDLC)
Security
availability
confidentiality
CIA triad
code review
automating security review
SSDLC
definitions
fact/fiction
integrity
non-repudiation
principles
complete mediation
defense in depth
fail safe
least privilege
SOD
weakest link
least common mechanism
trade-offs
Segregation of duties (SoD)
Single responsibility principle
Software architectures
Software design
code reviews lifecycle
document
impact
planning concepts
processes
resolution of defects
technologies
Software development life cycle (SDLC)
agile
building software
code reviews
design phase
development phase
process
prototypes
release phase
requirements phase
testing phase
waterfall
Software engineering
bottom-up approach
principles
programming techniques
SDLC
Software requirement specification (SRS)
Sound software architectures
approach
code kind
people minded
SMART
spaghetti code
Spaghetti code
Static application security testing (SAST)
StopIteration signals
Structural design pattern
adapter
components interact
composite
decorator
facade
T
Testability
Trees
binary search
decision making
leaves
root
value
Turing-complete algorithms
U, V
Unclear problem statements
W, X, Y
Wrapper
Z
Zen of Python
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.100.237