Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is discussed in Chapter 1 (or maybe 2), I think, which suggests to me that the author should probably read a little bit more of it.

Mind you, it's a wonderful book, and I recommend that people should just read it in general (you may not be able to do very many of the exercises, but it's still worth it).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: