Feeds

Effective Java

A classic work on Java programming

Choosing a cloud hosting partner with confidence

Book review Although it's not a new title, Joshua Bloch's Effective Java is one of those classics that invariably crops up on people's list of top Java books. And, when the question comes up 'what book do you recommend for someone who's past the beginner stage?', this is usually the answer.

Effective Java

The book assumes a good working knowledge of Java and object oriented development, and is not a tutorial or introduction. Instead, it aims to teach a set of best practice techniques that can be applied to real world coding problems. This isn't about design as such, it's certainly not a set of design patterns, though there is an element of it here.

The author lists 57 techniques to make your Java code more robust, easier to maintain and easier to reuse. These techniques are grouped by theme, such as Creating and Destroying Objects, Methods Common to All Objects, Classes and Interfaces, Serialization, and Threads. Each item is illustrated with sample code, cross-referenced to other items and given a thorough explanation.

For example, item 8: Always overide hashCode when you override equals, explains the principles of object identity, principles which are essential to the understanding of anything but a simple application. Bloch not only gives a thorough explanation, he shows what happens when this rule is violated.

Aside from providing a set of proven techniques, Bloch discusses the pros and cons of each, explaining the reasons as well as the rules. The effect gives a deeper insight into the structure of Java and object orientation in general, and is the reason it's rated so highly among Java developers. It's as though years of hard-won experience have been distilled in a single book.

For someone taking the step up from beginner, the chances are many of the techniques will be way beyond you, or perhaps the advantages are not as clear as you would want. As your coding matures, however, it is likely you'll come back to the book again and again.

Effective Java

Verdict: Essential for any serious Java developer

Author: Joshua Bloch

Publisher: Addison Wesley

ISBN: 0201310058

Media: Book

List Price: £30.99

Reg price: £24.79

Business security measures using SSL

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.