The role of the maintenance engineer is to exorcise the evil spirits that dwell in legacy software. Day and night, maintenance engineers are beset upon, and spited, as they forge a lonely path through the corporate landscape. Every day, they face the challenge of
The first four chapters of this book are devoted to looking at the first task. The final two chapters of this book deal with the second task.
KeywordsSource Code Virtual Machine Preventative Medicine Global Variable Unit Test
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- 1.Eric S. Raymond, ed., The New Hacker’s Dictionary, Third Edition (MIT Press, 1996. ISBN: 0-262-68092-0)Google Scholar
- 2.William J. Brown et al., AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis (John Wiley & Sons, 1998. ISBN: 0-471-19713-0)Google Scholar
- 3.Rebecca Sykes, “AOL buys Netscape, joins Sun in Java Deal,” IDG News Service, November 24,1998Google Scholar
- 5.Walter Oney, Programming the Microsoft Windows Driver Model, Second Edition (Microsoft Press, 2002. ISBN: 0-7356-1803-8)Google Scholar
- 6.Charles Mann, “Why Software Is So Bad,” Technology Review, June 17,2002Google Scholar
- 7.Ibid.Google Scholar
- 8.Introduction to Assembly Language Programming (Springer Verlag, 1998. ISBN: 0-387-98530-1)Google Scholar
- 9.Matt Nicholson, “Understanding Software Components,“ DNJ Online, September 1997Google Scholar
- 10.Duncan Mackenzie, “Developing Custom Windows Controls Using Visual Basic.NET,” MSDN, May 2002Google Scholar
- 14.Frederick P. Brooks Jr., The Mythical Man-Month (Addison-Wesley, 1995. ISBN: 0-201-83595-9)Google Scholar
- 15.Thomas Gutschmidt, “Securing Java Code: Part 4,” developer.com, June 6, 2001Google Scholar
- 16.John Robbins, Debugging Applications (Microsoft Press, 2000. ISBN: 0-7356-0886-5)Google Scholar
© Bill Blunden 2012