Professional Linux Programming
Authors: Neil Matthew and Richard Stones
Price: $59.99 US
Reviewer: Stephanie Black
With the increasing number of Linux programming books on the market, the new Linux coder is left in a bit of a muddle.
Information about Linux is spreading—a good thing in terms of the open-source model and the community that supports it. The influx of new Linux authors also tends to decrease the odds of finding literacy and technical expertise in the same place. Numerous would-be writers ride the popularity wave of “Penguin Power!”, resulting in increasing numbers of Linux “bibles”, most of which are just as difficult to follow as the original and not nearly as imaginative. In either case, the context is most often distorted, if presented at all. Then again, there are exceptions.
Professional Linux Programming is a huge credit to both its authors and publishers. It's clearly written, highly informative and, with the exception of one or two topics, exhaustive in scope. Its intended audience is intermediate programmers, but the book is written in sufficiently clear and plain language as to be quite easily understood by the novice programmer.
The book's main “theme” is a project designed for a DVD rental store, taking into account both general and user requirements for a design specification. These specifications are followed up in subsequent chapters, which discuss various elements. The vast majority of the chapters in the book go back to this project and approach the subject matter from that context. Occasionally, the authors sprinkle in “take a break” chapters. These are related to a variety of programming issues in general. The project, however, is the meat of the book.
This approach provides not only a context, but a flow of information from one topic to the next. As a result, the reader learns a vast quantity of subjects easily because they're all connected to each other—an approach more conducive to increasing a coder's knowledge and skill than the “bits and pieces” approach so prevalent among technical works.
The majority of programming books, even Linux programming books, are negligent about providing sane information regarding application design according to general (and user) specifications. Given that the first step of writing an application is to define its use and user-base, design is too often overlooked or, if mentioned, relegated to the back of the book. This is the first topic of discussion in Professional Linux Programming and gives the reader a taste of rationally approaching software development.
Having read several Linux programming books, all of which ignore (by intent or accident) the increasing popularity of CVS (concurrent version system), I was overjoyed to find an entire chapter detailing this marvelous tool, both in collaborative and individual contexts. Common CVS terminology (check-out, commit, repository, etc.) is delineated, as are commands and the growing number of CVS resources available on the Internet.
Databases are, for many programmers, the singularly least interesting subject and the one that is most easily overlooked. Matthew and Stones not only give a foundation in database requirements and functions, but offer an in-depth comparison of PostgreSQL and MySQL. An interesting addition was a brief contrast between libpq and ecpg as ways of calling PostgreSQL from C. Later in the book, as application construction confronts the area of connectivity, PHP is detailed as well.
In separate chapters, both debugging and testing are carefully illustrated, with particular attention paid to the varieties of software errors and the tools to intercept them prior to release. Testing tools, including different kinds of tests for different kinds of requirements, are examined in great length with particular attention paid to getting the most information from tests to ensure quality of the application.
Chapter 12 deals with secure programming (including a reference to Ken Thompson's “trojan” that appeared in every release of the UNIX compiler). This chapter does not, however, simply leave the reader with a simple alert; it details how permissions work, some useful cryptography tools and some environment variables, all of which can assist in the production of secure code. It ends with a discussion of security features/impediments that come with some of the more common programming languages.
I personally have to give an extra round of applause to anyone who can take the complexities of Beowulf clusters and turn them into very comprehensible English (I am currently scrounging a bunch of 386s with which to construct my own Beowulf cluster—or should that be Bayou-Wolf?).
|diff -u: What's New in Kernel Development||Sep 04, 2015|
|Android Candy: Copay—the Next-Generation Bitcoin Wallet||Sep 03, 2015|
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
- diff -u: What's New in Kernel Development
- Using tshark to Watch and Inspect Network Traffic
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- The True Internet of Things
- September 2015 Issue of Linux Journal: HOW-TOs
- Firefox Security Exploit Targets Linux Users and Web Developers
- Concerning Containers' Connections: on Docker Networking
- Android Candy: Copay—the Next-Generation Bitcoin Wallet
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects