Summary
Whew, that was quite the ride! Now that we have the basics of memory allocation operator overloading handy, we will start to use them to our advantage. Our first application will be a leak detector (Chapter 8) using the global forms of these operators, followed by simplified examples of exotic memory management (Chapter 9) using specialized, custom forms of the global operators, and arena-based memory management (Chapter 10) with member versions of the operators that will perform very satisfying optimizations.
Unlock this book’s exclusive benefits nowThis book comes with additional benefits designed to elevate your learning experience. |
|
|
Note: Have your purchase invoice ready before you begin. |
