TorBT - Torrents and Magnet Links Search Engine

Pluralsight - Encapsulation and SOLID

File Name
Size
8. The Coffee Maker Code Example/04. Demo - Coffe Maker Example Implementation.mp4
116 MB
encapsulation-solid.zip
65 MB
5. The Liskov Substitution Principle/04. Refactoring the Code Toward the Lisko Substitution Principle.mp4
64 MB
4. The Open Closed Principle/01. SOLID Concrete.mp4
56 MB
3. The Single Responsibility Principle/01. Introduction and Motivation.mp4
49 MB
7. The Dependency Inversion Principle/01. Next Step - Functional.mp4
37 MB
5. The Liskov Substitution Principle/01. Append-Only.mp4
37 MB
3. The Single Responsibility Principle/04. Single Responsibility Principle.mp4
36 MB
5. The Liskov Substitution Principle/03. Breaking the LSP - Removal of Features.mp4
34 MB
2. Encapsulation/20. Synthesis.mp4
33 MB
6. The Interface Segregation Principle/02. The Interface Segregation Principle.mp4
33 MB
6. The Interface Segregation Principle/01. SOLID Isn't.mp4
32 MB
7. The Dependency Inversion Principle/05. Refactoring the Read Example Method to a Decorator.mp4
29 MB
4. The Open Closed Principle/03. Refactoring the Example Code Towards the Open Closed Principle.mp4
28 MB
2. Encapsulation/05. Why Care About Code That Sucks.mp4
27 MB
2. Encapsulation/12. Postel's Law.mp4
27 MB
7. The Dependency Inversion Principle/04. Decorator.mp4
27 MB
7. The Dependency Inversion Principle/06. Final Clean-Up.mp4
24 MB
6. The Interface Segregation Principle/04. Refactoring With ISP.mp4
24 MB
4. The Open Closed Principle/02. The Open Closed Principle.mp4
22 MB
2. Encapsulation/06. Classic OO Definition of Encapsulation.mp4
20 MB
5. The Liskov Substitution Principle/02. The Liskov Substitution Principle.mp4
18 MB
2. Encapsulation/16. Output.mp4
18 MB
7. The Dependency Inversion Principle/02. Favor Composition Over Inheritance.mp4
14 MB
2. Encapsulation/19. Maybe.mp4
14 MB
7. The Dependency Inversion Principle/03. Composite.mp4
14 MB
1. Course introduction/01. Introduction.mp4
13 MB
2. Encapsulation/08. Commands and Queries.mp4
13 MB
2. Encapsulation/07. Alternative Encapsulation Techniques.mp4
12 MB
6. The Interface Segregation Principle/03. Refactoring the Code Toward the Interface Segregation Principle.mp4
10 MB
2. Encapsulation/13. Input.mp4
10 MB
2. Encapsulation/09. Queries.mp4
9.1 MB
2. Encapsulation/15. Fail Fast.mp4
9.0 MB
2. Encapsulation/10. Commands.mp4
8.7 MB
7. The Dependency Inversion Principle/07. SOLID Summary.mp4
8.5 MB
2. Encapsulation/04. Example - Code That Sucks.mp4
8.3 MB
2. Encapsulation/18. TryRead.mp4
7.1 MB
8. The Coffee Maker Code Example/06. Course Conclusion.mp4
7.1 MB
2. Encapsulation/03. Most Code Sucks.mp4
6.8 MB
3. The Single Responsibility Principle/03. Refactored Sample Problem Class.mp4
6.8 MB
2. Encapsulation/14. Nullable References Are Evil.mp4
5.6 MB
2. Encapsulation/17. Tester-Doer.mp4
5.3 MB
3. The Single Responsibility Principle/02. The Five SOLID Principles.mp4
5.1 MB
8. The Coffee Maker Code Example/01. Introduction to the Coffee Maker Code Example.mp4
4.9 MB
8. The Coffee Maker Code Example/02. Coffee Maker Problem Statement.mp4
4.5 MB
2. Encapsulation/11. CQS Makes it Easier to Reason About Code.mp4
4.2 MB
2. Encapsulation/02. Reusable Components.mp4
3.7 MB
8. The Coffee Maker Code Example/05. Demo Recap.mp4
3.2 MB
2. Encapsulation/01. Introduction.mp4
855 kB
8. The Coffee Maker Code Example/03. Demo Introduction.mp4
792 kB