Professional Linux Programming
Authors: Neil Matthew and Richard Stones
Price: $59.99 US
Reviewer: Stephanie Black
With the increasing number of Linux programming books on the market, the new Linux coder is left in a bit of a muddle.
Information about Linux is spreading—a good thing in terms of the open-source model and the community that supports it. The influx of new Linux authors also tends to decrease the odds of finding literacy and technical expertise in the same place. Numerous would-be writers ride the popularity wave of “Penguin Power!”, resulting in increasing numbers of Linux “bibles”, most of which are just as difficult to follow as the original and not nearly as imaginative. In either case, the context is most often distorted, if presented at all. Then again, there are exceptions.
Professional Linux Programming is a huge credit to both its authors and publishers. It's clearly written, highly informative and, with the exception of one or two topics, exhaustive in scope. Its intended audience is intermediate programmers, but the book is written in sufficiently clear and plain language as to be quite easily understood by the novice programmer.
The book's main “theme” is a project designed for a DVD rental store, taking into account both general and user requirements for a design specification. These specifications are followed up in subsequent chapters, which discuss various elements. The vast majority of the chapters in the book go back to this project and approach the subject matter from that context. Occasionally, the authors sprinkle in “take a break” chapters. These are related to a variety of programming issues in general. The project, however, is the meat of the book.
This approach provides not only a context, but a flow of information from one topic to the next. As a result, the reader learns a vast quantity of subjects easily because they're all connected to each other—an approach more conducive to increasing a coder's knowledge and skill than the “bits and pieces” approach so prevalent among technical works.
The majority of programming books, even Linux programming books, are negligent about providing sane information regarding application design according to general (and user) specifications. Given that the first step of writing an application is to define its use and user-base, design is too often overlooked or, if mentioned, relegated to the back of the book. This is the first topic of discussion in Professional Linux Programming and gives the reader a taste of rationally approaching software development.
Having read several Linux programming books, all of which ignore (by intent or accident) the increasing popularity of CVS (concurrent version system), I was overjoyed to find an entire chapter detailing this marvelous tool, both in collaborative and individual contexts. Common CVS terminology (check-out, commit, repository, etc.) is delineated, as are commands and the growing number of CVS resources available on the Internet.
Databases are, for many programmers, the singularly least interesting subject and the one that is most easily overlooked. Matthew and Stones not only give a foundation in database requirements and functions, but offer an in-depth comparison of PostgreSQL and MySQL. An interesting addition was a brief contrast between libpq and ecpg as ways of calling PostgreSQL from C. Later in the book, as application construction confronts the area of connectivity, PHP is detailed as well.
In separate chapters, both debugging and testing are carefully illustrated, with particular attention paid to the varieties of software errors and the tools to intercept them prior to release. Testing tools, including different kinds of tests for different kinds of requirements, are examined in great length with particular attention paid to getting the most information from tests to ensure quality of the application.
Chapter 12 deals with secure programming (including a reference to Ken Thompson's “trojan” that appeared in every release of the UNIX compiler). This chapter does not, however, simply leave the reader with a simple alert; it details how permissions work, some useful cryptography tools and some environment variables, all of which can assist in the production of secure code. It ends with a discussion of security features/impediments that come with some of the more common programming languages.
I personally have to give an extra round of applause to anyone who can take the complexities of Beowulf clusters and turn them into very comprehensible English (I am currently scrounging a bunch of 386s with which to construct my own Beowulf cluster—or should that be Bayou-Wolf?).
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- The Tiny Internet Project, Part I
- Bitcoin on Amazon! Sort of...
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Android Browser Security--What You Haven't Been Told
- Returning Values from Bash Functions
- Epiq Solutions' Sidekiq M.2
- Securing the Programmer
- Nativ Disc
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide