{"id":11223,"date":"2024-06-22T12:07:44","date_gmt":"2024-06-22T04:07:44","guid":{"rendered":"https:\/\/www.chenqing.work\/?p=11223"},"modified":"2024-06-22T14:38:29","modified_gmt":"2024-06-22T06:38:29","slug":"%e7%a8%8b%e5%ba%8f%e5%91%98%e8%bf%9b%e9%98%b6%e4%b9%a6%e5%8d%95","status":"publish","type":"post","link":"https:\/\/www.chenqing.work\/?p=11223","title":{"rendered":"\u63a8\u8350\u4e00\u4e9b\u4e0d\u9519\u7684\u7f16\u7a0b\u4e66\u7c4d"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1240\" src=\"https:\/\/www.chenqing.work\/wp-content\/uploads\/2024\/06\/daria-nepriakhina-xY55bL5mZAM-unsplash.jpg\" alt=\"\" class=\"wp-image-11230\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Zlibrary \u88ab\u7f8e\u5e1d\u56f4\u8ffd\u5835\u622a\u4e5f\u4e0d\u662f\u4e00\u5929\u4e24\u5929\u4e86\uff0c\u4f53\u9a8c\u4e5f\u662f\u8d77\u8d77\u4f0f\u4f0f\uff0c\u6700\u8fd1\u627e\u5230\u4e00\u4e2a\u975e\u5e38\u4e0d\u9519\u7684\u5e73\u66ff \u2014\u2014 <strong><a href=\"https:\/\/annas-archive.org\/\" data-type=\"link\" data-id=\"https:\/\/annas-archive.org\/\">\u5b89\u5a1c\u7684\u6863\u6848\u9986<\/a><\/strong>\uff0c\u63a8\u8350\u5165\u5751\u3002<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>\u7ffb\u904d\u77e5\u4e4e\u8ba8\u8bba\u8d34\u3001hackernews \u5439\u6c34\u533a\u3001amazon best seller\u3001\u8c46\u74e3\u4e66\u5355\u3001\u5927\u4f6c\u535a\u5ba2\uff0c\u7ecf\u8fc7\u4e00\u756a\u4e0d\u61c8\u52aa\u529b\uff0c\u6c47\u603b\u4e86\u4e00\u4efd\u8d28\u91cf\u8fc7\u786c\u7684\u7a0b\u5e8f\u5458\u8fdb\u9636\u4e66\u5355\uff0c\u5404\u4f4d\u8001\u94c1\u5148\u7801\u4f4f\uff0c\u6162\u6162\u770b\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u6bbf\u5802\u7ea7<\/h2>\n\n\n\n<p>The Art of Computer Programming\uff08 \u8ba1\u7b97\u673a\u7a0b\u5e8f\u8bbe\u8ba1\u827a\u672f \uff09<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u7cbe\u54c1\u7ea7<\/h2>\n\n\n\n<p><strong>\u8ba1\u7b97\u673a\u7cfb\u7edf<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Computer Organization and Design<\/li>\n\n\n\n<li>Operating Systems: Principles and Practice<\/li>\n\n\n\n<li>Operating Systems: Three Easy Pieces\uff08 \u64cd\u4f5c\u7cfb\u7edf\u5bfc\u8bba \uff09<\/li>\n\n\n\n<li>Computer Systems: A Programmer&#8217;s Perspective\uff08 \u6df1\u5165\u7406\u89e3\u8ba1\u7b97\u673a\u7cfb\u7edf \uff09<\/li>\n\n\n\n<li>Computer Networking: A Top-Down Approach\uff08 \u8ba1\u7b97\u673a\u7f51\u7edc\uff1a\u81ea\u9876\u5411\u4e0b\u65b9\u6cd5 \uff09<\/li>\n\n\n\n<li>Computer Architecture: A Quantitative Approach\uff08 \u8ba1\u7b97\u673a\u4f53\u7cfb\u7ed3\u6784\uff1a\u91cf\u5316\u7814\u7a76\u65b9\u6cd5 \uff09<\/li>\n<\/ul>\n\n\n\n<p><strong>\u8bed\u8a00<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u5192\u53f7\u8bfe\u5802<\/li>\n\n\n\n<li>Concepts, Techniques, and Models of Computer Programming<\/li>\n\n\n\n<li>Structure and Interpretation of Computer Programs\uff08 \u8ba1\u7b97\u673a\u7a0b\u5e8f\u7684\u6784\u9020\u4e0e\u89e3\u91ca \uff09<\/li>\n<\/ul>\n\n\n\n<p><strong>\u7f16\u7a0b<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Debugging<\/li>\n\n\n\n<li>Effective Java<\/li>\n\n\n\n<li>Programming on Purpose I<\/li>\n\n\n\n<li>Spring in Action\uff08 Spring \u5b9e\u6218 \uff09<\/li>\n\n\n\n<li>Programming Pearls\uff08 \u7f16\u7a0b\u73e0\u7391 \uff09<\/li>\n\n\n\n<li><strong>A Philosophy of Software Design<\/strong><\/li>\n\n\n\n<li><strong>Thinking in Java<\/strong>\uff08 Java \u7f16\u7a0b\u601d\u60f3 \uff09<\/li>\n\n\n\n<li>Working Effectively with Legacy Code<\/li>\n\n\n\n<li>Elements of Programming\uff08 \u7f16\u7a0b\u539f\u672c \uff09<\/li>\n\n\n\n<li>Unit Testing Principles, Practices, and Patterns<\/li>\n\n\n\n<li>The Art of Unix Programming\uff08 Unix \u7f16\u7a0b\u827a\u672f \uff09 <\/li>\n\n\n\n<li>Java Concurrency in Practice\uff08 Java \u5e76\u53d1\u7f16\u7a0b\u5b9e\u6218 \uff09<\/li>\n\n\n\n<li>Refactoring: Improving the Design of Existing Code\uff08 \u91cd\u6784 \uff09<\/li>\n\n\n\n<li>Introduction to Reliable and Secure Distributed Programming<\/li>\n\n\n\n<li>Agile Software Development: Principles, Patterns, and Practices\uff08 \u654f\u6377\u8f6f\u4ef6\u5f00\u53d1 \uff09<\/li>\n<\/ul>\n\n\n\n<p><strong>\u7cfb\u7edf\u8bbe\u8ba1<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Streaming Systems\uff08 \u6d41\u5f0f\u7cfb\u7edf\uff09<\/li>\n\n\n\n<li>Principles of Computer System Design<\/li>\n\n\n\n<li>Distributed Systems for Fun and Profit<\/li>\n\n\n\n<li>Domain-Driven Design\uff08 \u9886\u57df\u9a71\u52a8\u8bbe\u8ba1 \uff09<\/li>\n\n\n\n<li>The Architecture of Open Source Applications<\/li>\n\n\n\n<li>Fault-Tolerant Message-Passing Distributed Systems<\/li>\n\n\n\n<li><strong>Designing Data-Intensive Applications<\/strong>\uff08 \u6570\u636e\u5bc6\u96c6\u578b\u5e94\u7528\u7cfb\u7edf\u8bbe\u8ba1 \uff09<\/li>\n\n\n\n<li>Patterns of Enterprise Application Architecture\uff08 \u4f01\u4e1a\u5e94\u7528\u67b6\u6784\u6a21\u5f0f \uff09<\/li>\n<\/ul>\n\n\n\n<p><strong>\u6570\u636e\u5e93<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Transactional Information Systems Theory<\/li>\n<\/ul>\n\n\n\n<p><strong>Kubernetes<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Core Kubernetes<\/li>\n\n\n\n<li>Kubernetes in Action\uff08 Kubernetes \u5b9e\u6218 \uff09<\/li>\n<\/ul>\n\n\n\n<p><strong>\u4e2a\u4eba &amp; \u9879\u76ee &amp; \u7ba1\u7406<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u77e5\u884c\uff1a\u6280\u672f\u4eba\u7684\u7ba1\u7406\u4e4b\u8def<\/li>\n\n\n\n<li>The Staff Engineer&#8217;s Path<\/li>\n\n\n\n<li>The Manager&#8217;s Path\uff08 \u6280\u672f\u4e3a\u5f84 \uff09<\/li>\n\n\n\n<li>The Pragmatic Programmer\uff08 \u7a0b\u5e8f\u5458\u4fee\u70bc\u4e4b\u9053 \uff09<\/li>\n\n\n\n<li>The Elegant Puzzle: Systems of Engineering Management<\/li>\n<\/ul>\n\n\n\n<p><strong>\u5176\u4ed6<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data and Reality 2nd<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zlibrary \u88ab\u7f8e\u5e1d\u56f4\u8ffd\u5835\u622a\u4e5f\u4e0d\u662f\u4e00\u5929\u4e24\u5929\u4e86\uff0c\u4f53\u9a8c\u4e5f\u662f\u8d77\u8d77\u4f0f\u4f0f\uff0c\u6700\u8fd1\u627e\u5230\u4e00\u4e2a\u975e\u5e38\u4e0d\u9519\u7684\u5e73\u66ff \u2014\u2014 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-11223","post","type-post","status-publish","format-standard","hentry","category-2"],"_links":{"self":[{"href":"https:\/\/www.chenqing.work\/index.php?rest_route=\/wp\/v2\/posts\/11223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.chenqing.work\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.chenqing.work\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.chenqing.work\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.chenqing.work\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11223"}],"version-history":[{"count":76,"href":"https:\/\/www.chenqing.work\/index.php?rest_route=\/wp\/v2\/posts\/11223\/revisions"}],"predecessor-version":[{"id":11304,"href":"https:\/\/www.chenqing.work\/index.php?rest_route=\/wp\/v2\/posts\/11223\/revisions\/11304"}],"wp:attachment":[{"href":"https:\/\/www.chenqing.work\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.chenqing.work\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.chenqing.work\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}