Table of Contents for
Your Code as a Crime Scene

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Your Code as a Crime Scene by Adam Tornhill Published by Pragmatic Bookshelf, 2015
  1. Title Page
  2. Your Code as a Crime Scene
  3. Your Code as a Crime Scene
  4. For the Best Reading Experience...
  5. Table of Contents
  6. Early praise for Your Code as a Crime Scene
  7. Foreword by Michael Feathers
  8. Acknowledgments
  9. Chapter 1: Welcome!
  10. About This Book
  11. Optimize for Understanding
  12. How to Read This Book
  13. Toward a New Approach
  14. Get Your Investigative Tools
  15. Part 1: Evolving Software
  16. Chapter 2: Code as a Crime Scene
  17. Meet the Problems of Scale
  18. Get a Crash Course in Offender Profiling
  19. Profiling the Ripper
  20. Apply Geographical Offender Profiling to Code
  21. Learn from the Spatial Movement of Programmers
  22. Find Your Own Hotspots
  23. Chapter 3: Creating an Offender Profile
  24. Mining Evolutionary Data
  25. Automated Mining with Code Maat
  26. Add the Complexity Dimension
  27. Merge Complexity and Effort
  28. Limitations of the Hotspot Criteria
  29. Use Hotspots as a Guide
  30. Dig Deeper
  31. Chapter 4: Analyze Hotspots in Large-Scale Systems
  32. Analyze a Large Codebase
  33. Visualize Hotspots
  34. Explore the Visualization
  35. Study the Distribution of Hotspots
  36. Differentiate Between True Problems and False Positives
  37. Chapter 5: Judge Hotspots with the Power of Names
  38. Know the Cognitive Advantages of Good Names
  39. Investigate a Hotspot by Its Name
  40. Understand the Limitations of Heuristics
  41. Chapter 6: Calculate Complexity Trends from Your Code’s Shape
  42. Complexity by the Visual Shape of Programs
  43. Learn About the Negative Space in Code
  44. Analyze Complexity Trends in Hotspots
  45. Evaluate the Growth Patterns
  46. From Individual Hotspots to Architectures
  47. Part 2: Dissect Your Architecture
  48. Chapter 7: Treat Your Code As a Cooperative Witness
  49. Know How Your Brain Deceives You
  50. Learn the Modus Operandi of a Code Change
  51. Use Temporal Coupling to Reduce Bias
  52. Prepare to Analyze Temporal Coupling
  53. Chapter 8: Detect Architectural Decay
  54. Support Your Redesigns with Data
  55. Analyze Temporal Coupling
  56. Catch Architectural Decay
  57. React to Structural Trends
  58. Scale to System Architectures
  59. Chapter 9: Build a Safety Net for Your Architecture
  60. Know What’s in an Architecture
  61. Analyze the Evolution on a System Level
  62. Differentiate Between the Level of Tests
  63. Create a Safety Net for Your Automated Tests
  64. Know the Costs of Automation Gone Wrong
  65. Chapter 10: Use Beauty as a Guiding Principle
  66. Learn Why Attractiveness Matters
  67. Write Beautiful Code
  68. Avoid Surprises in Your Architecture
  69. Analyze Layered Architectures
  70. Find Surprising Change Patterns
  71. Expand Your Analyses
  72. Part 3: Master the Social Aspects of Code
  73. Chapter 11: Norms, Groups, and False Serial Killers
  74. Learn Why the Right People Don’t Speak Up
  75. Understand Pluralistic Ignorance
  76. Witness Groupthink in Action
  77. Discover Your Team’s Modus Operandi
  78. Mine Organizational Metrics from Code
  79. Chapter 12: Discover Organizational Metrics in Your Codebase
  80. Let’s Work in the Communication Business
  81. Find the Social Problems of Scale
  82. Measure Temporal Coupling over Organizational Boundaries
  83. Evaluate Communication Costs
  84. Take It Step by Step
  85. Chapter 13: Build a Knowledge Map of Your System
  86. Know Your Knowledge Distribution
  87. Grow Your Mental Maps
  88. Investigate Knowledge in the Scala Repository
  89. Visualize Knowledge Loss
  90. Get More Details with Code Churn
  91. Chapter 14: Dive Deeper with Code Churn
  92. Cure the Disease, Not the Symptoms
  93. Discover Your Process Loss from Code
  94. Investigate the Disposal Sites of Killers and Code
  95. Predict Defects
  96. Time to Move On
  97. Chapter 15: Toward the Future
  98. Let Your Questions Guide Your Analysis
  99. Take Other Approaches
  100. Let’s Look into the Future
  101. Write to Evolve
  102. Appendix 1: Refactoring Hotspots
  103. Refactor Guided by Names
  104. Bibliography
  105. You May Be Interested In…


Bibliography

[AS96]
Harold Abelson and Gerald Jay Sussman. Structure and Interpretation of Computer Programs. MIT Press, Cambridge, MA, 2nd, 1996.
[Bac96]
J. Bach. Test Automation Snake Oil. Windows Tech Journal. 1996.
[BH06]
D. Beyer and A. E. Hassan. Animated Visualization of Software History using Evolution Storyboards. Reverse Engineering, 2006. WCRE ’06. 13th Working Conference on. 199--210, 2006.
[BHS07]
F. Buschmann, K. Henney, and D.C. Schmidt. Pattern-Oriented Software Architecture Volume 4: A Pattern Language for Distributed Computing. John Wiley & Sons, New York, NY, 2007.
[BK03]
R.S. Baron and N.L. Kerr. Group Process, Group Decision, Group Action. Open University Press, Berkshire, United Kingdom, 2003.
[BNMG11]
C. Bird, N. Nagappan, B. Murphy, H. Gall, and P. Devanbu. Don’t Touch My Code! Examining the Effects of Ownership on Software Quality. Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering. 4-14, 2011.
[BOW04]
R.M. Bell, T.J. Ostrand, and E.J. Weyuker. Where the bugs are. Proceedings of the 2004 ACM SIGSOFT international symposium on software testing and analysis. ACM Press, New York, NY, USA, 2004.
[BOW11]
R.M. Bell, T.J. Ostrand, and E.J. Weyuker. Does Measuring Code Change Improve Fault Prediction?. ACM Press, New York, NY, USA, 2011.
[Bro95]
Frederick P. Brooks Jr. The Mythical Man-Month: Essays on Software Engineering. Addison-Wesley, Reading, MA, Anniversary, 1995.
[Con68]
M.E. Conway. How do committees invent?. Datamation. 4:28--31, 1968.
[CY08]
D. Canter and D. Youngs. Applications of Geographical Offender Profiling. Ashgate, Farnham, Surrey, UK, 2008.
[CY08a]
D. Canter and D. Youngs. Principles of Geographical Offender Profiling. Ashgate, Farnham, Surrey, UK, 2008.
[DB13]
F. Detienne and F. Bott. Software Design: Cognitive Aspects. Springer, New York, NY, USA, 2013.
[DHAQ07]
M. Di Penta, M. Harman, G. Antoniol, and F. Qureshi. The Effect of Communication Overhead on Software Maintenance Project Staffing. Software Maintenance, 2007. ICSM 2007. IEEE International Conference on. 315--324, 2007.
[DL68]
J.M. Darley and B. Latané. Bystander intervention in emergencies: diffusion of responsibility. Journal of Personality and Social Psychology. 8:377--383, 1968.
[DL99]
Tom Demarco and Timothy Lister. Peopleware: Productive Projects and Teams. Dorset House, New York, NY, USA, Second edition, 1999.
[DLG05]
M. D’Ambros, M. Lanza, and H Gall. Fractal Figures: Visualizing Development Effort for CVS Entities. Visualizing Software for Understanding and Analysis, 2005. VISSOFT 2005. 3rd IEEE International Workshop on. 1--6, 2005.
[DLR09]
M. D’Ambros, M. Lanza, and R Robbes. On the Relationship Between Change Coupling and Software Defects. Reverse Engineering, 2009. WCRE ’09. 16th Working Conference on. 135--144, 2009.
[FW08]
S. M. Fulero and L. S. Wrightsman. Forensic Psychology. Cengage Learning, Boston, MA, 2008.
[GAL14]
E. Guzman, D. Azócar, and L. Li. Sentiment analysis of commit comments in GitHub. MSR 2014 Proceedings of the 11th Working Conference on Mining Software Repositories. ACM Press, New York, NY, USA, 2014.
[GK03]
H. Gall and M. Krajewski. CVS release history data for detecting logical couplings. Proc. International Workshop on Principles of Software Evolution. 13--23, 2003.
[GKMS00]
T. L. Graves, A. F. Karr, J. S. Marron, and H Siy. Predicting fault incidence using software change history. Software Engineering, IEEE Transactions on. 26[7], 2000.
[Gla92]
Robert L. Glass. Facts and Fallacies of Software Engineering. Addison-Wesley Professional, Boston, MA, 1992.
[Har10]
S. Harrison. The Diary of Jack the Ripper: The Chilling Confessions of James Maybrick. John Blake, London, UK, 2010.
[HGH08]
A. Hindle, M.W. Godfrey, and R.C. Holt. Reading Beside the Lines: Indentation as a Proxy for Complexity Metric. Program Comprehension, 2008. ICPC 2008. The 16th IEEE International Conference on. IEEE Computer Society Press, Washington, DC, 2008.
[HSSH12]
K. Hotta, Y. Sasaki, Y. Sano, Y. Higo, and S. Kusumoto. An Empirical Study on the Impact of Duplicate Code. Advances in Software Engineering. Special issue on Software Quality Assurance Methodologies and Techniques, 2012.
[KG85]
W. Kintsch and J. G. Greeno. Understanding and solving word arithmetic problems. Psychological Review. 92(1):109--129, 1985.
[Leh80]
M. M. Lehman. On Understanding Laws, Evolution, and Conservation in the Large-Program Life Cycle. Journal of Systems and Software. 1:213--221, 1980.
[LR90]
J. H. Langlois and L. A. Roggman. Attractive faces are only average. Psychological Science. 1:115--121, 1990.
[MW09]
A. Meneely and L. Williams. Secure open source collaboration: an empirical study of Linus’ law. Proceedings of the 16th ACM conference on computer and communications security. 453--462, 2009.
[NB05]
N. Nagappan and T. Ball. Use of relative code churn measures to predict system defect density. Proceedings of the 27th international conference on software engineering. 284--292, 2005.
[NMB08]
N. Nagappan, B. Murphy, and V. Basili. The Influence of Organizational Structure on Software Quality. International Conference on Software Engineering, Proceedings. 521--530, 2008.
[OW10]
A. Oram and G. Wilson. Making Software: What Really Works, and Why We Believe It. O’Reilly & Associates, Inc., Sebastopol, CA, 2010.
[PM00]
J.F. Pane and B.A. Myers. The Influence of the Psychology of Programming on a Language Design. Proceedings of the 12th Annual Meeting of the Psychology of Programmers Interest Group. 193--205, 2000.
[SEKH09]
C.M. Schweik, R.C. English, M. Kitsing, and S. Haire. Brooks’ versus Linus’ law: an empirical test of open source projects. Proceedings of the 2008 international conference on digital government research. 423--424, 2009.
[SF08]
V. Swami and A. Furnham. The Psychology of Physical Attraction. Routledge, New York, NY, USA, 2008.
[SFL88]
P. Slovic, B. Fischhoff, and S. Lichtenstein. Decision Making: Descriptive, Normative, and Prescriptive Interactions. Cambridge University Press, Cambridge, United Kingdom, 1988.
[TT89]
B. Tversky and M. Tuchin. A reconciliation of the evidence on eyewitness testimony: Comments on McCloskey and Zaragoza. Journal of Experimental Psychology: General. [118]:86--91, 1989.
[VDC94]
J.S. Valacich, A.R. Dennis, and T. Connolly. Idea Generation in Computer-Based Groups: A New Ending to an Old Story. Organizational Behavior and Human Decision Processes. 57[3]:448--467, 1994.
[WMGS07]
K. Weaver, D.T. Miller, S.M. Garcia, and N. Schwarz. Inferring the popularity of an opinion from its familiarity: A repetitive voice can sound like a chorus. Journal of Personality and Social Psychology. [92]:821--833, 2007.
[YMNC04]
A. T. T. Ying, G. C. Murphy, R. Ng, and M. C. Chu-Carroll. Predicting source code changes by mining change history. IEEE Trans. Software Engineering. 9[30], 2004.