effective_java_table_of_contents

Effective Java, Third Edition by Joshua Bloch - Table of Contents

Return to Effective Java, Third Edition by Joshua Bloch, Pearson Education Inc., 2018, ISBN-13: 978-0-13-468599-1, ISBN-10: 0-13-468599-7

Contents

Foreword

Preface

Acknowledgments

1 Introduction

2 Creating and Destroying Objects

3 Methods Common to All Objects

4 Classes and Interfaces

5 Generics

6 Enums and Annotations

7 Lambdas and Streams

8 Methods

9 General Programming

10 Exceptions

11 Concurrency

12 Serialization

Items Corresponding to Second Edition

References

Index

Appendix: Items Corresponding to Second Edition

Second Edition Item Number

Third Edition Item Number, Title

1

1, Consider static factory methods instead of constructors

2

2, Consider a builder when faced with many constructor parameters

3

3, Enforce the singleton property with a private constructor or an enum type

4

4, Enforce noninstantiability with a private constructor

5

6, Avoid creating unnecessary objects

6

7, Eliminate obsolete object references

7

8, Avoid finalizers and cleaners

8

10, Obey the general contract when overriding equals

9

11, Always override hashCode when you override equals

10

12, Always override toString

11

13, Override clone judiciously

12

14, Consider implementing Comparable

13

15, Minimize the accessibility of classes and members

14

16, In public classes, use accessor methods, not public fields

15

17, Minimize mutability

16

18, Favor composition over inheritance

17

19, Design and document for inheritance or else prohibit it

18

20, Prefer interfaces to abstract classes

19

22, Use interfaces only to define types

20

23, Prefer class hierarchies to tagged classes

21

42, Prefer lambdas to anonymous classes

22

24, Favor static member classes over nonstatic

23

26, Don’t use raw types

24

27, Eliminate unchecked warnings

25

28, Prefer lists to arrays

26

29, Favor generic types

27

30, Favor generic methods

28

31, Use bounded wildcards to increase API flexibility

29

33, Consider typesafe heterogeneous containers

30

34, Use enums instead of int constants

31

35, Use instance fields instead of ordinals

32

36, Use EnumSet instead of bit fields

33

37, Use EnumMap instead of ordinal indexing

34

38, Emulate extensible enums with interfaces

35

39, Prefer annotations to naming patterns

36

40, Consistently use the Override annotation

37

41, Use marker interfaces to define types

38

49, Check parameters for validity

39

50, Make defensive copies when needed

40

51, Design method signatures carefully

41

52, Use overloading judiciously

42

53, Use varargs judiciously

43

54, Return empty collections or arrays, not nulls

44

56, Write doc comments for all exposed API elements

45

57, Minimize the scope of local variables

46

58, Prefer for-each loops to traditional for loops

47

59, Know and use the libraries

48

60, Avoid float and double if exact answers are required

49

61, Prefer primitive types to boxed primitives

50

62, Avoid strings where other types are more appropriate

51

63, Beware the performance of string concatenation

52

64, Refer to objects by their interfaces

53

65, Prefer interfaces to reflection

54

66, Use native methods judiciously

55

67, Optimize judiciously

56

68, Adhere to generally accepted naming conventions

57

69, Use exceptions only for exceptional conditions

58

70, Use checked exceptions for recoverable conditions and runtime exceptions for programming errors

59

71, Avoid unnecessary use of checked exceptions

60

72, Favor the use of standard exceptions

61

73, Throw exceptions appropriate to the abstraction

62

74, Document all exceptions thrown by each method

63

75, Include failure-capture information in detail messages

64

76, Strive for failure atomicity

65

77, Don’t ignore exceptions

66

78, Synchronize access to shared mutable data

67

79, Avoid excessive synchronization

68

80, Prefer executors, tasks, and streams to threads

69

81, Prefer concurrency utilities to wait and notify

70

82, Document thread safety

71

83, Use lazy initialization judiciously

72

84, Don’t depend on the thread scheduler

73

(Retired)

74

85, Prefer alternatives to Java serialization

86, Implement Serializable with great caution

75

85, Prefer alternatives to Java serialization

87, Consider using a custom serialized form

76

85, Prefer alternatives to Java serialization

88, Write readObject methods defensively

77

85, Prefer alternatives to Java serialization

89, For instance control, prefer enum types to readResolve

78

85, Prefer alternatives to Java serialization

90, Consider serialization proxies instead of serialized instances

References

[Asserts]

Programming with Assertions. 2002. Sun Microsystems. http://docs.oracle.com/javase/8/docs/technotes/guides/language/assert.html

[Beck04]

Beck, Kent. 2004. JUnit Pocket Guide. Sebastopol, CA: O’Reilly Media, Inc. ISBN: 0596007434.

[Bloch01]

Bloch, Joshua. 2001. Effective Java Programming Language Guide. Boston: Addison-Wesley. ISBN: 0201310058.

[Bloch05]

Bloch, Joshua, and Neal Gafter. 2005. Java Puzzlers: Traps, Pitfalls, and Corner Cases. Boston: Addison-Wesley.

ISBN: 032133678X.

[Blum14]

Blum, Scott. 2014. “Faster RSA in Java with GMP.” The Square Corner (blog). Feb. 14, 2014. https://medium.com/square-corner-blog/faster-rsa-in-java-with-gmp-8b13c51c6ec4

[Bracha04]

Bracha, Gilad. 2004. “Lesson: Generics” online supplement to The Java Tutorial: A Short Course on the Basics, 6th ed. Upper Saddle River, NJ: Addison-Wesley, 2014. https://docs.oracle.com/javase/tutorial/extra/generics/

[Burn01]

Burn, Oliver. 2001–2017. Checkstyle. http://checkstyle.sourceforge.net

[Coekaerts15]

Coekaerts, Wouter (@WouterCoekaerts). 2015. “Billion-laughs-style DoS for Java serialization https://gist.github.com/coekie/a27cc406fc9f3dc7a70d … WONTFIX,” Twitter, November 9, 2015, 9:46 a.m. https://twitter.com/woutercoekaerts/status/663774695381078016

[CompSci17]

Brief of Computer Scientists as Amici Curiae for the United States Court of Appeals for the Federal Circuit, Case No. 17-1118, Oracle America, Inc. v. Google, Inc. in Support of Defendant-Appellee. (2017)

[Dagger]

Dagger. 2013. Square, Inc. http://square.github.io/dagger/

[Gallagher16]

Gallagher, Sean. 2016. “Muni system hacker hit others by scanning for year-old Java vulnerability.” Ars Technica, November 29, 2016. https://arstechnica.com/information-technology/2016/11/san-francisco-transit-ransomware-attacker-likely-used-year-old-java-exploit/

[Gamma95]

Gamma, Erich, Richard Helm, Ralph Johnson, and John Vlissides. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Reading, MA: Addison-Wesley. ISBN: 0201633612.

[Goetz06]

Goetz, Brian. 2006. Java Concurrency in Practice. With Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Boston: Addison-Wesley. ISBN: 0321349601.

[Gosling97]

Gosling, James. 1997. “The Feel of Java.” Computer 30 no. 6 (June 1997): 53-57. http://dx.doi.org/10.1109/2.587548

[Guava]

Guava. 2017. Google Inc. https://github.com/google/guava

[Guice]

Guice. 2006. Google Inc. https://github.com/google/guice

[Herlihy12]

Herlihy, Maurice, and Nir Shavit. 2012. The Art of Multiprocessor Programming, Revised Reprint. Waltham, MA: Morgan Kaufmann Publishers. ISBN: 0123973376.

[Jackson75]

Jackson, M. A. 1975. Principles of Program Design. London: Academic Press. ISBN: 0123790506.

[Java-secure]

Secure Coding Guidelines for Java SE. 2017. Oracle. http://www.oracle.com/technetwork/java/seccodeguide-139067.html

[Java8-feat]

What’s New in JDK 8. 2014. Oracle. http://www.oracle.com/technetwork/java/javase/8-whats-new-2157071.html

[Java9-feat]

Java Platform, Standard Edition What’s New in Oracle JDK 9. 2017. Oracle. https://docs.oracle.com/javase/9/whatsnew/toc.htm

[Java9-api]

Java Platform, Standard Edition & Java Development Kit Version 9 API Specification. 2017. Oracle. https://docs.oracle.com/javase/9/docs/api/overview-summary.html

[Javadoc-guide]

How to Write Doc Comments for the Javadoc Tool. 2000–2004. Sun Microsystems. http://www.oracle.com/technetwork/java/javase/documentation/index-137868.html

[Javadoc-ref]

Javadoc Reference Guide. 2014-2017. Oracle. https://docs.oracle.com/javase/9/javadoc/javadoc.htm

[JLS]

Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. 2014. The Java Language Specification, Java SE 8 Edition. Boston: Addison-Wesley. ISBN: 013390069X.

[JMH]

Code Tools: jmh. 2014. Oracle. http://openjdk.java.net/projects/code-tools/jmh/

[JSON]

Introducing JSON. 2013. Ecma International. https://www.json.org

[Kahan91]

Kahan, William, and J. W. Thomas. 1991. Augmenting a Programming Language with Complex Arithmetic.

UCB/CSD-91-667, University of California, Berkeley.

[Knuth74]

Knuth, Donald. 1974. Structured Programming with go to Statements. In Computing Surveys 6: 261–301.

[Lea14]

Lea, Doug. 2014. When to use parallel streams. http://gee.cs.oswego.edu/dl/html/StreamParallelGuidance.html

[Lieberman86]

Lieberman, Henry. 1986. Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems. In Proceedings of the First ACM Conference on Object-Oriented Programming Systems, Languages, and Applications, pages 214–223, Portland, September 1986. ACM Press.

[Liskov87]

Liskov, B. 1988. Data Abstraction and Hierarchy. In Addendum to the Proceedings of OOPSLA ’87 and SIGPLAN Notices, Vol. 23, No. 5: 17–34, May 1988.

[Naftalin07]

Naftalin, Maurice, and Philip Wadler. 2007. Java Generics and Collections. Sebastopol, CA: O’Reilly Media, Inc.

ISBN: 0596527756.

[Parnas72]

Parnas, D. L. 1972. On the Criteria to Be Used in Decomposing Systems into Modules. In Communications of the ACM 15: 1053–1058.

[POSIX]

9945-1:1996 (ISO/IEC) [IEEE/ANSI Std. 1003.1 1995 Edition] Information Technology—Portable Operating System Interface (POSIX)—Part 1: System Application: Program Interface (API) C Language] (ANSI), IEEE Standards Press, ISBN: 1559375736.

[Protobuf]

Protocol Buffers. 2017. Google Inc. https://developers.google.com/protocol-buffers

[Schneider16]

Schneider, Christian. 2016. SWAT (Serial Whitelist Application Trainer). https://github.com/cschneider4711/SWAT/

[Seacord17]

Seacord, Robert. 2017. Combating Java Deserialization Vulnerabilities with Look-Ahead Object Input Streams (LAOIS). San Francisco: NCC Group Whitepaper. https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2017/june/ncc_group_combating_java_deserialization_vulnerabilities_with_look-ahead_object_input_streams1.pdf

[Serialization]

Java Object Serialization Specification. March 2005. Sun Microsystems. http://docs.oracle.com/javase/9/docs/specs/serialization/index.html

[Sestoft16]

Sestoft, Peter. 2016. Java Precisely, 3rd ed. Cambridge, MA: The MIT Press. ISBN: 0262529076.

[Shipilëv16]

Aleksey Shipilëv. 2016. Arrays of Wisdom of the Ancients. https://shipilev.net/blog/2016/arrays-wisdom-ancients/

[Smith62]

Smith, Robert. 1962. Algorithm 116 Complex Division. In Communications of the ACM 5, no. 8 (August 1962): 435.

[Snyder86]

Snyder, Alan. 1986. “Encapsulation and Inheritance in Object-Oriented Programming Languages.” In Object-Oriented Programming Systems, Languages, and Applications Conference Proceedings, 38–45. New York, NY: ACM Press.

[Spring]

Spring Framework. Pivotal Software, Inc. 2017. https://projects.spring.io/spring-framework/

[Stroustrup]

Stroustrup, Bjarne. [ca. 2000]. “Is Java the language you would have designed if you didn’t have to be compatible with C?” Bjarne Stroustrup’s FAQ. Updated Ocober 1, 2017. http://www.stroustrup.com/bs_faq.html#Java

[Stroustrup95]

Stroustrup, Bjarne. 1995. “Why C++ is not just an object-oriented programming language.” In Addendum to the proceedings of the 10th annual conference on Object-oriented programming systems, languages, and applications, edited by Steven Craig Bilow and Patricia S. Bilow New York, NY: ACM. http://dx.doi.org/10.1145/260094.260207

[Svoboda16]

Svoboda, David. 2016. Exploiting Java Serialization for Fun and Profit. Software Engineering Institute, Carnegie Mellon University. https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=484347

[Thomas94]

Thomas, Jim, and Jerome T. Coonen. 1994. “Issues Regarding Imaginary Types for C and C++.” In The Journal of C Language Translation 5, no. 3 (March 1994): 134–138.

[ThreadStop]

Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated? 1999. Sun Microsystems. https://docs.oracle.com/javase/8/docs/technotes/guides/concurrency/threadPrimitiveDeprecation.html

[Viega01]

Viega, John, and Gary McGraw. 2001. Building Secure Software: How to Avoid Security Problems the Right Way. Boston: Addison-Wesley. ISBN: 020172152X.

[W3C-validator]

W3C Markup Validation Service. 2007. World Wide Web Consortium. http://validator.w3.org/

[Wulf72]

Wulf, W. A Case Against the GOTO. 1972. In Proceedings of the 25th ACM National Conference 2: 791–797. New York, NY: ACM Press.

effective_java_table_of_contents.txt · Last modified: 2025/02/01 07:00 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki