The role of the maintenance engineer is to exorcise the evil spirits that dwell in legacy software. Day and night, maintenance engineers are beset upon, and spited, as they forge a lonely path through the corporate landscape. Every day, they face the challenge of
  • Repairing bugs

  • Improving performance

The first four chapters of this book are devoted to looking at the first task. The final two chapters of this book deal with the second task.


Source Code Virtual Machine Preventative Medicine Global Variable Unit Test 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Eric S. Raymond, ed., The New Hacker’s Dictionary, Third Edition (MIT Press, 1996. ISBN: 0-262-68092-0)Google Scholar
  2. 2.
    William J. Brown et al., AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis (John Wiley & Sons, 1998. ISBN: 0-471-19713-0)Google Scholar
  3. 3.
    Rebecca Sykes, “AOL buys Netscape, joins Sun in Java Deal,” IDG News Service, November 24,1998Google Scholar
  4. 5.
    Walter Oney, Programming the Microsoft Windows Driver Model, Second Edition (Microsoft Press, 2002. ISBN: 0-7356-1803-8)Google Scholar
  5. 6.
    Charles Mann, “Why Software Is So Bad,” Technology Review, June 17,2002Google Scholar
  6. 7.
  7. 8.
    Introduction to Assembly Language Programming (Springer Verlag, 1998. ISBN: 0-387-98530-1)Google Scholar
  8. 9.
    Matt Nicholson, “Understanding Software Components,“ DNJ Online, September 1997Google Scholar
  9. 10.
    Duncan Mackenzie, “Developing Custom Windows Controls Using Visual Basic.NET,” MSDN, May 2002Google Scholar
  10. 11.
    George A. Miller, “The Magical Number Seven, Plus or Minus TWo,“ Psychological Review, 1956, vol. 63, pp. 81–97CrossRefGoogle Scholar
  11. 14.
    Frederick P. Brooks Jr., The Mythical Man-Month (Addison-Wesley, 1995. ISBN: 0-201-83595-9)Google Scholar
  12. 15.
    Thomas Gutschmidt, “Securing Java Code: Part 4,”, June 6, 2001Google Scholar
  13. 16.
    John Robbins, Debugging Applications (Microsoft Press, 2000. ISBN: 0-7356-0886-5)Google Scholar

Copyright information

© Bill Blunden 2012

Authors and Affiliations

  • Bill Blunden

There are no affiliations available

Personalised recommendations