Your code as a crime scene : (Record no. 6442)

MARC details
000 -LEADER
fixed length control field 01785cam a22002777i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240114104228.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161209s2015 txua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781680500387
Qualifying information (pbk. : acid-free paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1680500384
Qualifying information (pbk. : acid-free paper)
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.1
Edition number 23
Item number TOR
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tornhill, Adam
Relator term author.
245 10 - TITLE STATEMENT
Title Your code as a crime scene :
Remainder of title use forensic techniques to arrest defects, bottlenecks, and bad design in your programs /
Statement of responsibility, etc. Adam Tornhill.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Dallas, Texas :
Name of producer, publisher, distributor, manufacturer The Pragmatic Bookshelf,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
300 ## - PHYSICAL DESCRIPTION
Extent viii, 201 p. :
Other physical details col. ill. ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note <br/>CONTENTS<br/><br/>1. Welcome<br/><br/>PART I: EVOLOVING SOFTWARE<br/>2. Codes as a crime scene<br/><br/>3. Creating an offender profile<br/><br/>4. Analyze hotspots in large-scale systems<br/><br/>5. Judge hotspots with the power of names<br/><br/>6. Calculate complexity trends from your code shape<br/><br/>PART II. DISSECT YOUR ARCHITECTURE<br/>7. Treat your code as a corporative witness<br/><br/>8. Detect architectural decay<br/><br/>9. Build a safety for your architecture<br/><br/>10. Use beauty as a guiding principle<br/><br/>PART III. MASTER THE SOCIAL ASPECTS OF CODE<br/>11. Norms, groups, and false serial killers<br/><br/>12. Discover organizational metrics in your codebase<br/><br/>13. Build a knowledge map of your system <br/><br/>14. Dive deeper with code churn<br/><br/>15. Toward the future
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 187-190) and index P. 191-201
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Quality control.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer programming
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer architecture.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Forensic sciences.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rashid, Fahmida Y.,
Relator term editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Classification part 005.1
Item part 1
Call number prefix TOR
Call number suffix 005.1 TOR
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 09/24/2021 Purchase 0027618   005.1 TOR 1 BUML24010365 09/24/2021 1 09/24/2021 Book Closed Access