Skip to main content

简单评价几本java 入门编程书籍

个人观点,记下来供参考, 专指Java SE

1. absolute java @ Savitch

只覆盖Java 最基本的知识点,但是对这些知识点的讲解极其详细,非常适合编程新手
理解关键的知识点。适合自学。

2. big java @Horstmann

只覆盖java SE最基本的知识点,但是穿插了不少java和计算机工业的掌故,读起来有
趣,不觉得枯燥。排版也舒服。适合从其他语言转过来的人。
他的Core Java 一样不适合纯粹编程新手

3 Java How to Program @ DEITEL

覆盖了java 基本的知识点,内容组织和讲解得像Reference Book,简直每个Api都想给
出个code example。排版密集却超过1500页,这父子两个真是掏心窝子讲解呀。 特别
适合自学或者考证。

4  Introduction  to Java (Comprehensive) @ Liang

覆盖了java 最基本的知识点,并且把algorithm 也集成在一起。比如书里的BFS和DFS
算是正常面试当场coding最难的知识点了。 书因此厚度快1400页,并有很多case,适
合自学或准备java面试。

5 Java programming language @ Gosling

作者我不解释, 关键知识点从语言实现的角度讲解,非常清晰,适合从其他语言转来
的老手。

6.  Learn Objective C for Java Developer @Bucanek

了解一下java 的设计哲学吧,Java的祖宗其实是Cocoa,而不是从天上掉下来的。

7.  Thinking in Java @Eckel

这书不是给编程新手读的, 再说前面的几本都是彩色排版呀,哈哈。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...