Feeds

Programming classics - the sequel

Time to expand your bookshelf

Site offer You've done it again. Our programming classics article went down a storm and prompted several emails back to Register Books, both praising and suggesting.

Most of you agreed that we had a pretty formidable selection, but as usual, and as we wanted, you also came up with a list of books you felt deserved a place in our list (because they have a place in your hearts!).

As a result we thought that we'd do a sequel to programming classics and add the titles your peers feel you should not be without, and they're still nearly all at 40 per cent off!*

We have also set up an area on Register Books devoted entirely to our classics, and we will continue to welcome any suggestions that we can add to the list. Just email books@theregister.co.uk with the subject "My Classic Books" and we'll add them to the list if we agree.

  • C Programming Language
    This book is meant to help the reader learn how to program in C. It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a worldwide best-seller. This second edition brings the classic original up to date to include the ANSI standard, and it was the one title that cropped up most in your suggestions.
  • The Pragmatic Programmer: From Journeyman to Master
    The Pragmatic Programmer cuts through the increasing specialisation and technicalities of modern software development to examine the core process - taking a requirement and producing working, maintainable code that delights its users. It covers topics ranging from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse.
  • Refactoring: Improving the Design of Existing Code
    In Refactoring: Improving the Design of Existing Code, renowned object technology mentor Martin Fowler breaks new ground, demystifying these master practices and demonstrating how software practitioners can realise the significant benefits of this new process.
  • Death March
    The #1 guide to surviving "doomed" projects...Fully updated and expanded, with powerful new techniques! t an alarming rate, companies continue to create death march projects, repeatedly! What's worse is the amount of rational, intelligent people who sign up for a death-march projects - projects whose schedules, estimations, budgets, and resources are so constrained or skewed that participants can hardly survive, much less succeed. In Death March, Second Edition, Ed Yourdon sheds new light on the reasons why companies spawn Death Marches and provides you with guidance to identify and survive death march projects.
  • Computer Networks 4th Edition
    The world's leading introduction to networking - fully updated for tomorrow's key technologies. Computer Networks, Fourth Edition is the ideal introduction to today's networks - and tomorrow's. This classic best-seller has been thoroughly updated to reflect the newest and most important networking technologies with a special emphasis on wireless networking, including 802.11, Bluetooth, broadband wireless, ad hoc networks, i-mode, and WAP.
  • Structure & Interpretation of Computer Programs 2nd Edition
    Structure and Interpretation of Computer Programs has had a dramatic impact on computer science curricula over the past decade. There are new implementations of most of the major programming systems in the book, including the interpreters and compilers, and the authors have incorporated many small changes that reflect their experience teaching the course at MIT since the first edition was published.
  • DNS and BIND
    DNS and BIND tells you everything you need to work with one of the internet's fundamental building blocks: the distributed host information database that's responsible for translating names into addresses, routing mail to its proper destination, and even listing phone numbers with the new ENUM standard. This book brings you up-to-date with the latest changes in this crucial service.
  • TCP/IP Illustrated, Volume 1: The Protocols
    TCP/IP Illustrated is a complete and detailed guide to the entire TCP/IP protocol suite-with an important difference from other books on the subject. Rather than just describing what the RFCs say the protocol suite should do, this unique book uses a popular diagnostic tool so you may actually watch the protocols in action. By forcing various conditions to occur - such as connection establishment, timeout and retransmission, and fragmentation - and then displaying the results, TCP/IP Illustrated gives you a much greater understanding of these concepts than words alone could provide.
  • TCP/IP Illustrated, Volume 2: The Implementation
    TCP/IP Illustrated, Volume 2 contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, this book uses a teach-by-example approach to help you master TCP/IP implementation.
  • Advanced Programming in the UNIX® Environment
    For over a decade, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens' Advanced Programming in the UNIX(R) Environment. Now, Stevens' colleague Stephen Rago has thoroughly updated this classic to reflect the latest technical advances and add support for today's leading UNIX and Linux platforms. Rago carefully retains the spirit and approach that made this book a classic.

* Offer correct at time of going to press. ®

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.