Advanced Defensive Programming Techniques - Pluralsight 收录时间:2018-06-26 08:16:29 文件大小:1GB 下载次数:46 最近下载:2020-06-03 08:01:42 磁力链接: magnet:?xt=urn:btih:2ee21c00761c6519bb6b8b07ee8459c8ff578691 立即下载 复制链接 文件列表 69 - Implementing Simple Historical Model.mp4 39MB 50 - Persistence - Creating and Updating Domain Objects.mp4 35MB 37 - Don't Guard Business Rules.mp4 31MB 42 - Persistence - Querying View Models.mp4 30MB 48 - Replacing Branching with Regular Expressions.mp4 29MB 54 - Do Not Return Null from a Method.mp4 28MB 40 - Turning Rule Objects into Active Elements.mp4 27MB 28 - The Reasons to Never Stringify Data.mp4 27MB 38 - Removing Guards Through Design.mp4 27MB 62 - Reconsidering Immutable Objects.mp4 26MB 59 - Consuming the Option.mp4 26MB 11 - Pros and Cons of Multiple Constructors.mp4 25MB 27 - Converting Enumeration to a Class.mp4 25MB 74 - Leave Nothing Exceptional in Exceptions.mp4 24MB 14 - Variations in the Builder Implementation.mp4 24MB 49 - Moving Expressions out to Configuration.mp4 24MB 33 - Demonstrating Persistence.mp4 23MB 77 - Inventing the Either Type.mp4 22MB 60 - Persistence - Creating Complex Domain Objects.mp4 22MB 19 - Defending in Complex Mutations.mp4 22MB 64 - Avoiding Aliasing Bugs Altogether.mp4 22MB 41 - Completing the Students Filter.mp4 21MB 45 - Keeping Related Data Together.mp4 21MB 46 - Turning Chained Ifs into the Chain of Rules.mp4 20MB 76 - Separating Positive and Negative Return Values.mp4 20MB 65 - The Downside of Immutability.mp4 19MB 66 - Constrained Mutability with Set-once Properties.mp4 19MB 58 - Implementing Custom Option Type.mp4 19MB 57 - Returning an Optional Object.mp4 19MB 67 - Consuming Semi-mutable Objects.mp4 18MB 75 - Returning a Polymorphic Type Instead of an Exception.mp4 18MB 73 - What Exceptions Are Not Meant to Do.mp4 18MB 44 - Encapsulating State.mp4 18MB 17 - Defending in Property Setters.mp4 17MB 25 - The Reasons to Avoid Enumerations.mp4 16MB 05 - Defensive Design - An Experiment.mp4 16MB 36 - Guarding Against Null Only.mp4 15MB 63 - Turning Classes Immutable.mp4 15MB 29 - Reaping the Benefits of String Encapsulation.mp4 15MB 16 - Reaping the Benefits of Constructor Validation.mp4 14MB 56 - Overloading Existing APIs to Never Return Null.mp4 14MB 55 - Using Callback on Optional Content.mp4 13MB 68 - Using Historical Model.mp4 13MB 03 - What Follows in This Course.mp4 12MB 71 - What’s Wrong with Status Codes.mp4 12MB 52 - Understanding the Role of Null.mp4 12MB 72 - Understanding Effects of Throwing Exceptions.mp4 12MB 78 - Consuming the Either Type.mp4 12MB 35 - Introducing Guard Clauses.mp4 11MB 53 - Why Compilers Still Rely on Null.mp4 11MB 39 - Turning Domain Rules into Rule Objects.mp4 11MB 20 - Function Domains Revisited.mp4 11MB 02 - The First Law of Defensive Programming.mp4 11MB 23 - Persistence and Parameterized Constructors.mp4 11MB 31 - Example - Modeling Money.mp4 11MB 22 - Creating Objects in Small Steps.mp4 10MB 21 - When Constructor Depends on Multiple Objects.mp4 10MB 10 - Creating Consistent Objects.mp4 10MB 32 - Persistence - Small-scale CQRS and DDD.mp4 10MB 04 - Traditional Defensive Techniques.mp4 10MB 07 - Defining Function Domains.mp4 10MB 06 - Called Method Cannot Defend.mp4 10MB 01 - Course Overview.mp4 9MB 13 - Promoting Constructor into Builder.mp4 8MB 47 - Making Friends with Regular Expressions.mp4 8MB 12 - Understanding Limitations of the Constructor.mp4 8MB 26 - Alternatives to Enumerations.mp4 8MB 79 - Summary.mp4 7MB 15 - Summary.mp4 7MB 09 - Creating Objects.mp4 6MB 70 - Summary.mp4 6MB 51 - Summary.mp4 5MB 30 - Avoiding Primitive Types Altogether.mp4 5MB 18 - Understanding Distinct Kinds of Properties.mp4 5MB 34 - Summary.mp4 5MB 24 - Summary.mp4 5MB 43 - Summary.mp4 4MB 08 - Summary.mp4 4MB 61 - Summary.mp4 3MB PDF Files/08/the-principle-of-working-with-objects-not-with-nulls-slides.pdf 3MB PDF Files/02/understanding-limitations-of-traditional-defensive-code-slides.pdf 2MB 80 - Advanced Defensive Programming Techniques.mp4 2MB PDF Files/09/building-rich-domain-model-as-an-effective-defense-by-design-slides.pdf 1MB PDF Files/04/removing-corruption-by-only-making-valid-state-transitions-slides.pdf 1MB PDF Files/07/building-defensive-design-instead-of-writing-defensive-code-slides.pdf 779KB PDF Files/10/designing-alternative-workflows-instead-of-defending-from-errors-slides.pdf 644KB PDF Files/03/removing-corruption-by-only-creating-consistent-objects-slides.pdf 641KB PDF Files/05/dismissing-defensive-code-by-avoiding-primitive-types-slides.pdf 491KB PDF Files/08/demos.zip 445KB PDF Files/09/demos.zip 445KB PDF Files/07/demos.zip 421KB PDF Files/05/demos.zip 406KB PDF Files/04/demos.zip 382KB PDF Files/03/demos.zip 381KB PDF Files/06/defining-function-domains-as-the-primary-line-of-defense-slides.pdf 317KB 01 - Course Overview.jpeg 117KB PDF Files/10/demos.zip 8KB PDF Files/03/pcdownload.nfo 17B PDF Files/07/pcdownload.nfo 17B