Get Free Shipping on orders over $79
Understanding and Using C Pointers : Core Techniques for Memory Management - Richard M Reese

Understanding and Using C Pointers

Core Techniques for Memory Management

By: Richard M Reese

eText | 1 May 2013 | Edition Number 1

At a Glance

eText


$30.79

or 4 interest-free payments of $7.70 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Improve your programming through a solid understanding of C pointers and memory management. With this practical book, you’ll learn how pointers provide the mechanism to dynamically manipulate memory, enhance support for data structures, and enable access to hardware. Author Richard Reese shows you how to use pointers with arrays, strings, structures, and functions, using memory models throughout the book.

Difficult to master, pointers provide C with much flexibility and power—yet few resources are dedicated to this data type. This comprehensive book has the information you need, whether you’re a beginner or an experienced C or C++ programmer or developer.

  • Get an introduction to pointers, including the declaration of different pointer types
  • Learn about dynamic memory allocation, de-allocation, and alternative memory management techniques
  • Use techniques for passing or returning data to and from functions
  • Understand the fundamental aspects of arrays as they relate to pointers
  • Explore the basics of strings and how pointers are used to support them
  • Examine why pointers can be the source of security problems, such as buffer overflow
  • Learn several pointer techniques, such as the use of opaque pointers, bounded pointers and, the restrict keyword
on
Desktop
Tablet
Mobile

More in Programming & Scripting Languages

Forty-Four Esolangs : The Art of Esoteric Code - Daniel Temkin

eBOOK

Investing for Programmers - Stefan Papp

eBOOK

Agile Web Development with Rails 8 - Sam Ruby

eBOOK

RRP $97.96

$78.99

19%
OFF