Design patterns Java workbook

Author(s)

    • Metsker, Steven John

Bibliographic Information

Design patterns Java workbook

Steven John Metsker

(The software patterns series)

Addison-Wesley, c2002

Available at  / 6 libraries

Search this Book/Journal

Note

Includes bibliographical references (p. 459-462) and index

Description and Table of Contents

Description

Finally, a companion to the seminal book, Design Patterns, 0-201-63361-2, that allows students to learn patterns using Java as opposed to C++, which was used in the original work. By working through the challenges presented in Design Patterns Java (TM) Workbook, the student will learn to recognize and apply a large portion of the accumulated wisdom of the software community. The author uses a workbook approach because he believes that students will not truly learn the material by reading it, but by "doing it." The accompanying CD-ROM will include all code examples included in the book as well as some bonus code examples not found in the book. As the title suggests, all samples will be in Java.

Table of Contents

Foreword. Preface. 1. Introduction to Patterns. Why Patterns? Why Design Patterns? Why Java? Why UML? Why a Workbook? The Organization of This Book. Welcome to Oozinoz! Source Code Disclaimer. Summary. I. NTERFACE PATTERNS. 2. Introducing Interfaces. Ordinary Interfaces. Interfaces and Obligations. Placing Constants in Interfaces. Summary. Beyond Ordinary Interfaces. 3. Adapter. Adapting in the Presence of Foresight. Class and Object Adapters. Unforeseen Adaptation. Recognizing ADAPTER. Summary. 4. FACADE. Refactoring to FACADE. Facades, Utilities, and Demos. Summary. 5. Composite. An Ordinary Composite. Recursive Behavior in Composites. Trees in Graph Theory. Composites with Cycles. Consequences of Cycles. Summary. 6. Bridge. A Classic Example of BRIDGE: Drivers. Refactoring to BRIDGE. A Bridge Using the List Interface. Summary. II. Responsibility Patterns. 7. Introducing Responsibility. Ordinary Responsibility. Controlling Responsibility with Visibility. Summary. Beyond Ordinary Responsibility. 8. SINGLETON. SINGLETON Mechanics. Singletons and Threads. Recognizing SINGLETON. Summary. 9. OBSERVER. A Classic Example: OBSERVER in Swing. Model/View/Controller. Maintaining an Observable Object. Summary. 10. MEDIATOR. A Classic Example: GUI Mediators. Relational Integrity Mediators. Summary. 11. Proxy. A Classic Example: Image Proxies. Image Proxies Reconsidered. Remote Proxies. Summary. 12. Chain of Responsibility. Varieties of Lookup. Refactoring to CHAIN OF RESPONSIBILITY. Anchoring a Chain. CHAIN OF RESPONSIBILITY without COMPOSITE. Summary. 13. FLYWEIGHT. Recognizing FLYWEIGHT. Immutability. Extracting the Immutable Part of a Flyweight. Sharing Flyweights. Summary. III. CONSTRUCTION PATTERNS. 14. Introducing Construction. Ordinary Construction. Superclass Collaboration. Collaboration within a Class. Summary. Beyond Ordinary Construction. 15. Builder. Building from a Parser. Building under Constraints. Building a Counteroffer. Summary. 16. FACTORY METHOD. Recognizing FACTORY METHOD. A Classic Example of FACTORY METHOD: Iterators. Taking Control of Which Class to Instantiate. FACTORY METHOD in Parallel Hierarchies. Summary. 17. Abstract Factory. Abstract Factories for Families of Objects. Packages and Abstract Factories. Abstract Factories for Look-and-Feel. Summary. 18. Prototype. Prototypes as Factories. Prototyping with Clones. Using Object.clone(). Summary. 19. Memento. Memento Durability. Applying Memento. Persisting Mementos across Sessions. Using Strings as Mementos. Summary. IV. OPERATION PATTERNS. 20. Introducing Operations. Operations, Methods, and Algorithms. The Mechanics of Methods. Exceptions in Methods. Summary. Beyond Ordinary Operators. 21. TEMPLATE METHOD. A Classic Example of TEMPLATE METHOD: Sorting. Completing an Algorithm. TEMPLATE METHOD Hooks. Refactoring to TEMPLATE METHOD. Summary. 22. STATE. Modeling States. Refactoring to STATE. Making States Constant. Summary. 23. STRATEGY. Modeling Strategies. Refactoring to STRATEGY. Comparing STRATEGY and STATE. Comparing STRATEGY and TEMPLATE METHOD. Summary. 24. Command. A Classic Example: Menu Commands. Using COMMAND to Supply a Service. COMMAND in Relation to Other Patterns. Summary. 25. INTERPRETER. An INTERPRETER Example. Interpreters, Languages, and Parsers. Summary. V. EXTENSION PATTERNS. 26. Introducing Extensions. Reuse as an Alternative to Extension. Extending by Subclassing. The Liskov Substitution Principle. Extending by Delegating. Summary. Beyond Ordinary Extension. 27. DECORATOR. A Classic Example of DECORATOR: Streams. Function Decorators. Decorating without DECORATOR. Summary. 28. Iterator. Type-Safe Collections. Iterating Over a Composite. Thread-Safe Iterators. Summary. 29. VISITOR. Supporting VISITOR. Extending with VISITOR. VISITOR Cycles. VISITOR Controversy. Summary. VI. APPENDIXES. Appendix A: Directions. Appendix B: Solutions. Appendix C: UML at a Glance. Glossary. Bibliography. Index. 0201743973T03262002

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

  • NCID
    BA56521850
  • ISBN
    • 0201743973
  • Country Code
    us
  • Title Language Code
    eng
  • Text Language Code
    eng
  • Place of Publication
    Boston ; Tokyo
  • Pages/Volumes
    xviii, 475 p.
  • Size
    26 cm
  • Parent Bibliography ID
Page Top