Feeds

Code Complete, Second Edition

At last, a good book about writing code

3 Big data security analytics techniques

Book review This is a book about a sorely neglected part of software development: writing code. It's not a book about the specifics of a particular language, programming paradigm or development methodology. Nor is it about UML, design patterns or data structures. It's about coding. About low-level design, about naming conventions, about all those things we spend so much of our time doing, but which are conspicuously absent from most books on development.

In that sense, Steve McConnell's Code Complete is fairly unique, and the first edition was justly acclaimed as a classic. Now a second edition - expanded and extensively re-written - confirms this status.

Code Complete

Covering every aspect of code construction, this is a mammoth volume packed to the hilt with sage advice, sample code, hard facts and figures, and sound arguments. Marrying data from countless journal papers and academic studies with war stories and anecdotes, the book does a great job in persuading the reader, rather than just laying down the law. McConnell wants to help the reader become a better developer. It's part of what makes this such a great book.

Organised into seven different sections, the topics range from metaphors for software construction to the use of pseudo-code, to variable naming, to code formatting and more. The treatment of material is comprehensive, so that even a topic such as variable naming gets a whole chapter that is both useful and interesting. Topics of religious significance, such as code formatting, also get an airing.

We could do a review that summarises the book section by section, but that would not do it justice. Instead, it's better to focus on some of the key themes. The first of these is complexity. Taming complexity is a key goal of the best developers. This means writing code that is well-structured, easy to understand and maintain. It means avoiding writing 'clever' code. This principle extends everywhere, from how you name routines and lay out your code, to what you call your variables.

Secondly, it's important to remember that code is read more often than it's written, which means making sure it's readable. Again, this means taking care with program structure, using naming conventions, commenting code and so on.

The best developers are themselves developing and learning along the way. This means striving to improve, being aware of what you are doing, keeping an eye on what's happening in the industry, and not allowing yourself to get complacent.

In addition to the technical content, the quality of writing should also be stressed. This is a huge book but it doesn't read like one. It is engaging and clear. There's sample code aplenty, with Java, C++ and Visual Basic, but the lessons the book really draws are independent of language, tools or methodologies.

There is so much more good solid material in the book, it's difficult to do it justice in a single review. Anyone who wants to improve as a developer should read it.

Code Complete, Second Editiion

Verdict: We can't recommend it enough.

Author: Steve McConnell

Publisher: Microsoft Press

ISBN: 0735619670

Media: Book

Buy this book at Cash & Carrion!

Top three mobile application threats

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.