Pluralsight - Tactical Design Patterns in .NET - Managing Responsibilities
- 收录时间:2018-03-03 14:58:22
- 文件大小:876MB
- 下载次数:248
- 最近下载:2021-01-17 13:37:37
- 磁力链接:
-
文件列表
- 01 The Right Time to Apply a Design Pattern/01 04 Evolving the Observer.mp4 44MB
- 07 Calling Protocols and the Visitor/07 04 Implementing the Command Visitor.mp4 36MB
- 05 Object Composition Using Chain of Responsibility/05 06 Applying Chain of Responsibility.mp4 35MB
- 08 Using Mixin to Move Responsibilities Out/08 03 Moving Responsibility to the Mixin.mp4 31MB
- 02 Cascading Factories to Eliminate Dependencies/02 02 Pulling the Abstract Factory Out.mp4 30MB
- 06 Visitor Design Pattern and Encapsulation/06 04 The Usual Way of the Visitor.mp4 27MB
- 04 Compositing the Control Role/04 04 Capitalizing on the Refactoring.mp4 26MB
- 04 Compositing the Control Role/04 02 Refactoring the Initial Solution.mp4 25MB
- 07 Calling Protocols and the Visitor/07 05 Accept Method as Coordinator.mp4 24MB
- 03 Real World Composition Pitfalls/03 02 Evolving the Graphic Elements Example.mp4 24MB
- 08 Using Mixin to Move Responsibilities Out/08 05 Mixing Responsibilities into Unrelated Classes.mp4 23MB
- 02 Cascading Factories to Eliminate Dependencies/02 01 Vacation Builder Example.mp4 23MB
- 05 Object Composition Using Chain of Responsibility/05 03 Initial Solution.mp4 22MB
- 01 The Right Time to Apply a Design Pattern/01 03 Supporting Different Notifications.mp4 21MB
- 08 Using Mixin to Move Responsibilities Out/08 02 Basic Example.mp4 20MB
- 06 Visitor Design Pattern and Encapsulation/06 05 Preserving Encapsulation in the Visited Object.mp4 20MB
- 06 Visitor Design Pattern and Encapsulation/06 02 Before the Visitor.mp4 18MB
- 07 Calling Protocols and the Visitor/07 03 Commanding Visitors vs. Querying Visitors.mp4 18MB
- 01 The Right Time to Apply a Design Pattern/01 06 When Is the Right Time to Apply a Design Pattern.mp4 18MB
- 01 The Right Time to Apply a Design Pattern/01 01 Introduction.mp4 18MB
- 04 Compositing the Control Role/04 01 Approaching the Problem.mp4 17MB
- 06 Visitor Design Pattern and Encapsulation/06 03 Encapsulating the Model Data.mp4 17MB
- 08 Using Mixin to Move Responsibilities Out/08 07 Summary.mp4 17MB
- 08 Using Mixin to Move Responsibilities Out/08 01 Introducing Mixins.mp4 17MB
- 06 Visitor Design Pattern and Encapsulation/06 06 Preserving Encapsulation of Elements.mp4 16MB
- 07 Calling Protocols and the Visitor/07 02 Calling Protocol on the Accept Method.mp4 15MB
- 05 Object Composition Using Chain of Responsibility/05 08 Compositing Objects at Run Time.mp4 15MB
- 01 The Right Time to Apply a Design Pattern/01 05 Design Patterns Backed by .NET Framework.mp4 15MB
- 01 The Right Time to Apply a Design Pattern/01 02 Implementing the Observer.mp4 15MB
- 04 Compositing the Control Role/04 03 Simplifying the Composite Element.mp4 14MB
- 07 Calling Protocols and the Visitor/07 01 A Word About Information Hiding.mp4 13MB
- 08 Using Mixin to Move Responsibilities Out/08 06 Polymorphic Behavior of Mixins.mp4 13MB
- 02 Cascading Factories to Eliminate Dependencies/02 04 Cascading Factories Explained.mp4 13MB
- 06 Visitor Design Pattern and Encapsulation/06 01 Introduction to Visitor Design Pattern.mp4 13MB
- 05 Object Composition Using Chain of Responsibility/05 02 Problem Statement.mp4 12MB
- 05 Object Composition Using Chain of Responsibility/05 05 Implementing the Object Composition.mp4 12MB
- 05 Object Composition Using Chain of Responsibility/05 04 Object Composition Instead of Class Inheritance.mp4 11MB
- 02 Cascading Factories to Eliminate Dependencies/02 03 Using Inversion of Control to Resolve Dependencies.mp4 11MB
- 03 Real World Composition Pitfalls/03 03 Discussing the Detailed Model.mp4 10MB
- 04 Compositing the Control Role/04 06 Command-query Separation and Composite.mp4 10MB
- 03 Real World Composition Pitfalls/03 05 Summary.mp4 9MB
- 08 Using Mixin to Move Responsibilities Out/08 04 Mixin with Abstract Factories.mp4 9MB
- 03 Real World Composition Pitfalls/03 01 Introduction to Composite Design Pattern.mp4 9MB
- 03 Real World Composition Pitfalls/03 04 Abstraction vs. Implementation.mp4 9MB
- 05 Object Composition Using Chain of Responsibility/05 01 Introducing Chain of Responsibility.mp4 8MB
- 04 Compositing the Control Role/04 05 Revisiting the Evolution of Composite.mp4 8MB
- 02 Cascading Factories to Eliminate Dependencies/02 05 Abstract and Concrete Factories.mp4 6MB
- 06 Visitor Design Pattern and Encapsulation/06 07 Summary.mp4 6MB
- 07 Calling Protocols and the Visitor/07 06 Summary.mp4 6MB
- Exercise Files.zip 5MB
- 04 Compositing the Control Role/04 07 Summary.mp4 5MB
- 01 The Right Time to Apply a Design Pattern/01 07 Summary.mp4 5MB
- 05 Object Composition Using Chain of Responsibility/05 07 Chain of Responsibility Class Diagram.mp4 4MB
- 02 Cascading Factories to Eliminate Dependencies/02 06 Summary.mp4 4MB
- 05 Object Composition Using Chain of Responsibility/05 09 Summary.mp4 3MB