589689.xyz

Advanced Defensive Programming Techniques - Pluralsight

  • 收录时间:2018-06-26 08:16:29
  • 文件大小:1GB
  • 下载次数:46
  • 最近下载:2020-06-03 08:01:42
  • 磁力链接:

文件列表

  1. 69 - Implementing Simple Historical Model.mp4 39MB
  2. 50 - Persistence - Creating and Updating Domain Objects.mp4 35MB
  3. 37 - Don't Guard Business Rules.mp4 31MB
  4. 42 - Persistence - Querying View Models.mp4 30MB
  5. 48 - Replacing Branching with Regular Expressions.mp4 29MB
  6. 54 - Do Not Return Null from a Method.mp4 28MB
  7. 40 - Turning Rule Objects into Active Elements.mp4 27MB
  8. 28 - The Reasons to Never Stringify Data.mp4 27MB
  9. 38 - Removing Guards Through Design.mp4 27MB
  10. 62 - Reconsidering Immutable Objects.mp4 26MB
  11. 59 - Consuming the Option.mp4 26MB
  12. 11 - Pros and Cons of Multiple Constructors.mp4 25MB
  13. 27 - Converting Enumeration to a Class.mp4 25MB
  14. 74 - Leave Nothing Exceptional in Exceptions.mp4 24MB
  15. 14 - Variations in the Builder Implementation.mp4 24MB
  16. 49 - Moving Expressions out to Configuration.mp4 24MB
  17. 33 - Demonstrating Persistence.mp4 23MB
  18. 77 - Inventing the Either Type.mp4 22MB
  19. 60 - Persistence - Creating Complex Domain Objects.mp4 22MB
  20. 19 - Defending in Complex Mutations.mp4 22MB
  21. 64 - Avoiding Aliasing Bugs Altogether.mp4 22MB
  22. 41 - Completing the Students Filter.mp4 21MB
  23. 45 - Keeping Related Data Together.mp4 21MB
  24. 46 - Turning Chained Ifs into the Chain of Rules.mp4 20MB
  25. 76 - Separating Positive and Negative Return Values.mp4 20MB
  26. 65 - The Downside of Immutability.mp4 19MB
  27. 66 - Constrained Mutability with Set-once Properties.mp4 19MB
  28. 58 - Implementing Custom Option Type.mp4 19MB
  29. 57 - Returning an Optional Object.mp4 19MB
  30. 67 - Consuming Semi-mutable Objects.mp4 18MB
  31. 75 - Returning a Polymorphic Type Instead of an Exception.mp4 18MB
  32. 73 - What Exceptions Are Not Meant to Do.mp4 18MB
  33. 44 - Encapsulating State.mp4 18MB
  34. 17 - Defending in Property Setters.mp4 17MB
  35. 25 - The Reasons to Avoid Enumerations.mp4 16MB
  36. 05 - Defensive Design - An Experiment.mp4 16MB
  37. 36 - Guarding Against Null Only.mp4 15MB
  38. 63 - Turning Classes Immutable.mp4 15MB
  39. 29 - Reaping the Benefits of String Encapsulation.mp4 15MB
  40. 16 - Reaping the Benefits of Constructor Validation.mp4 14MB
  41. 56 - Overloading Existing APIs to Never Return Null.mp4 14MB
  42. 55 - Using Callback on Optional Content.mp4 13MB
  43. 68 - Using Historical Model.mp4 13MB
  44. 03 - What Follows in This Course.mp4 12MB
  45. 71 - What’s Wrong with Status Codes.mp4 12MB
  46. 52 - Understanding the Role of Null.mp4 12MB
  47. 72 - Understanding Effects of Throwing Exceptions.mp4 12MB
  48. 78 - Consuming the Either Type.mp4 12MB
  49. 35 - Introducing Guard Clauses.mp4 11MB
  50. 53 - Why Compilers Still Rely on Null.mp4 11MB
  51. 39 - Turning Domain Rules into Rule Objects.mp4 11MB
  52. 20 - Function Domains Revisited.mp4 11MB
  53. 02 - The First Law of Defensive Programming.mp4 11MB
  54. 23 - Persistence and Parameterized Constructors.mp4 11MB
  55. 31 - Example - Modeling Money.mp4 11MB
  56. 22 - Creating Objects in Small Steps.mp4 10MB
  57. 21 - When Constructor Depends on Multiple Objects.mp4 10MB
  58. 10 - Creating Consistent Objects.mp4 10MB
  59. 32 - Persistence - Small-scale CQRS and DDD.mp4 10MB
  60. 04 - Traditional Defensive Techniques.mp4 10MB
  61. 07 - Defining Function Domains.mp4 10MB
  62. 06 - Called Method Cannot Defend.mp4 10MB
  63. 01 - Course Overview.mp4 9MB
  64. 13 - Promoting Constructor into Builder.mp4 8MB
  65. 47 - Making Friends with Regular Expressions.mp4 8MB
  66. 12 - Understanding Limitations of the Constructor.mp4 8MB
  67. 26 - Alternatives to Enumerations.mp4 8MB
  68. 79 - Summary.mp4 7MB
  69. 15 - Summary.mp4 7MB
  70. 09 - Creating Objects.mp4 6MB
  71. 70 - Summary.mp4 6MB
  72. 51 - Summary.mp4 5MB
  73. 30 - Avoiding Primitive Types Altogether.mp4 5MB
  74. 18 - Understanding Distinct Kinds of Properties.mp4 5MB
  75. 34 - Summary.mp4 5MB
  76. 24 - Summary.mp4 5MB
  77. 43 - Summary.mp4 4MB
  78. 08 - Summary.mp4 4MB
  79. 61 - Summary.mp4 3MB
  80. PDF Files/08/the-principle-of-working-with-objects-not-with-nulls-slides.pdf 3MB
  81. PDF Files/02/understanding-limitations-of-traditional-defensive-code-slides.pdf 2MB
  82. 80 - Advanced Defensive Programming Techniques.mp4 2MB
  83. PDF Files/09/building-rich-domain-model-as-an-effective-defense-by-design-slides.pdf 1MB
  84. PDF Files/04/removing-corruption-by-only-making-valid-state-transitions-slides.pdf 1MB
  85. PDF Files/07/building-defensive-design-instead-of-writing-defensive-code-slides.pdf 779KB
  86. PDF Files/10/designing-alternative-workflows-instead-of-defending-from-errors-slides.pdf 644KB
  87. PDF Files/03/removing-corruption-by-only-creating-consistent-objects-slides.pdf 641KB
  88. PDF Files/05/dismissing-defensive-code-by-avoiding-primitive-types-slides.pdf 491KB
  89. PDF Files/08/demos.zip 445KB
  90. PDF Files/09/demos.zip 445KB
  91. PDF Files/07/demos.zip 421KB
  92. PDF Files/05/demos.zip 406KB
  93. PDF Files/04/demos.zip 382KB
  94. PDF Files/03/demos.zip 381KB
  95. PDF Files/06/defining-function-domains-as-the-primary-line-of-defense-slides.pdf 317KB
  96. 01 - Course Overview.jpeg 117KB
  97. PDF Files/10/demos.zip 8KB
  98. PDF Files/03/pcdownload.nfo 17B
  99. PDF Files/07/pcdownload.nfo 17B