TorBT - Torrents and Magnet Links Search Engine

[ FreeCourseWeb.com ] PluralSight - Advanced Defensive Programming Techniques

File Name
Size
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/01. The Reasons to Avoid Enumerations.mp4
16 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/01. The Reasons to Avoid Enumerations.vtt
6.9 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/02. Alternatives to Enumerations.mp4
7.6 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/02. Alternatives to Enumerations.vtt
5.2 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/03. Converting Enumeration to a Class.mp4
25 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/03. Converting Enumeration to a Class.vtt
6.4 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/04. The Reasons to Never Stringify Data.mp4
27 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/04. The Reasons to Never Stringify Data.vtt
7.7 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/05. Reaping the Benefits of String Encapsulation.mp4
15 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/05. Reaping the Benefits of String Encapsulation.vtt
3.3 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/06. Avoiding Primitive Types Altogether.mp4
4.8 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/06. Avoiding Primitive Types Altogether.vtt
4.1 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/07. Example - Modeling Money.mp4
11 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/07. Example - Modeling Money.vtt
4.7 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/08. Persistence - Small-scale CQRS and DDD.mp4
9.8 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/08. Persistence - Small-scale CQRS and DDD.vtt
6.7 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/09. Demonstrating Persistence.mp4
23 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/09. Demonstrating Persistence.vtt
8.7 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/10. Summary.mp4
4.6 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/10. Summary.vtt
3.9 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/01. Understanding the Role of Null.mp4
12 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/01. Understanding the Role of Null.vtt
5.4 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/02. Why Compilers Still Rely on Null.mp4
11 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/02. Why Compilers Still Rely on Null.vtt
5.5 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/03. Do Not Return Null from a Method.vtt
8.5 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/04. Using Callback on Optional Content.mp4
13 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/04. Using Callback on Optional Content.vtt
4.9 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/05. Overloading Existing APIs to Never Return Null.mp4
14 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/05. Overloading Existing APIs to Never Return Null.vtt
5.9 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/06. Returning an Optional Object.mp4
19 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/06. Returning an Optional Object.vtt
6.4 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/07. Implementing Custom Option Type.mp4
19 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/07. Implementing Custom Option Type.vtt
6.2 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/08. Consuming the Option.mp4
26 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/08. Consuming the Option.vtt
8.0 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/09. Persistence - Creating Complex Domain Objects.mp4
22 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/09. Persistence - Creating Complex Domain Objects.vtt
5.6 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/10. Summary.mp4
3.4 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/10. Summary.vtt
3.0 kB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
3.2 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
1.9 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/1. What’s Wrong with Status Codes.mp4
12 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/1. What’s Wrong with Status Codes.vtt
6.8 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/2. Understanding Effects of Throwing Exceptions.mp4
12 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/2. Understanding Effects of Throwing Exceptions.vtt
5.2 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/3. What Exceptions Are Not Meant to Do.mp4
18 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/3. What Exceptions Are Not Meant to Do.vtt
9.3 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/4. Leave Nothing Exceptional in Exceptions.mp4
24 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/4. Leave Nothing Exceptional in Exceptions.vtt
9.7 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/5. Returning a Polymorphic Type Instead of an Excep.mp4
18 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/5. Returning a Polymorphic Type Instead of an Excep.vtt
6.0 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/6. Separating Positive and Negative Return Values.mp4
20 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/6. Separating Positive and Negative Return Values.vtt
6.0 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/7. Inventing the Either Type.mp4
22 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/7. Inventing the Either Type.vtt
7.4 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/8. Consuming the Either Type.mp4
12 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/8. Consuming the Either Type.vtt
4.2 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/9. Summary.mp4
6.8 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/9. Summary.vtt
5.7 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/1. The First Law of Defensive Programming.mp4
11 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/1. The First Law of Defensive Programming.vtt
7.1 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/2. Version Check.mp4
532 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/2. Version Check.vtt
7 B
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/3. What Follows in This Course.mp4
17 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/3. What Follows in This Course.vtt
9.9 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/4. Traditional Defensive Techniques.mp4
9.7 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/4. Traditional Defensive Techniques.vtt
7.1 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/5. Defensive Design - An Experiment.mp4
16 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/5. Defensive Design - An Experiment.vtt
10 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/6. Called Method Cannot Defend.mp4
10 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/6. Called Method Cannot Defend.vtt
8.1 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/7. Defining Function Domains.mp4
9.6 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/7. Defining Function Domains.vtt
8.3 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/8. Summary.mp4
3.7 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/8. Summary.vtt
3.1 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/1. Creating Objects.mp4
6.0 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/1. Creating Objects.vtt
5.1 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/2. Creating Consistent Objects.mp4
9.9 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/2. Creating Consistent Objects.vtt
7.1 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/3. Pros and Cons of Multiple Constructors.mp4
25 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/3. Pros and Cons of Multiple Constructors.vtt
8.0 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/4. Understanding Limitations of the Constructor.mp4
9.0 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/4. Understanding Limitations of the Constructor.vtt
5.8 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/5. Promoting Constructor into Builder.mp4
8.4 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/5. Promoting Constructor into Builder.vtt
4.2 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/6. Variations in the Builder Implementation.mp4
24 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/6. Variations in the Builder Implementation.vtt
7.9 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/7. Summary.mp4
6.6 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/7. Summary.vtt
5.1 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/1. Reaping the Benefits of Constructor Validation.mp4
20 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/1. Reaping the Benefits of Constructor Validation.vtt
6.3 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/2. Defending in Property Setters.mp4
17 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/2. Defending in Property Setters.vtt
6.1 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/3. Understanding Distinct Kinds of Properties.mp4
6.4 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/3. Understanding Distinct Kinds of Properties.vtt
4.0 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/4. Defending in Complex Mutations.mp4
22 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/4. Defending in Complex Mutations.vtt
5.8 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/5. Function Domains Revisited.mp4
11 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/5. Function Domains Revisited.vtt
5.0 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/6. When Constructor Depends on Multiple Objects.mp4
13 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/6. When Constructor Depends on Multiple Objects.vtt
5.2 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/7. Creating Objects in Small Steps.mp4
10 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/7. Creating Objects in Small Steps.vtt
9.0 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/8. Persistence and Parameterized Constructors.mp4
11 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/8. Persistence and Parameterized Constructors.vtt
8.6 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/9. Summary.mp4
4.5 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/9. Summary.vtt
3.6 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/1. Introducing Guard Clauses.mp4
11 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/1. Introducing Guard Clauses.vtt
7.5 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/2. Guarding Against Null Only.mp4
15 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/2. Guarding Against Null Only.vtt
8.8 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/3. Dont Guard Business Rules.mp4
31 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/3. Dont Guard Business Rules.vtt
7.7 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/4. Removing Guards Through Design.mp4
26 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/4. Removing Guards Through Design.vtt
6.1 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/5. Turning Domain Rules into Rule Objects.mp4
11 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/5. Turning Domain Rules into Rule Objects.vtt
3.1 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/6. Turning Rule Objects into Active Elements.mp4
27 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/6. Turning Rule Objects into Active Elements.vtt
6.5 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/7. Completing the Students Filter.mp4
22 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/7. Completing the Students Filter.vtt
5.5 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/8. Persistence - Querying View Models.mp4
30 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/8. Persistence - Querying View Models.vtt
9.4 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/9. Summary.mp4
4.2 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/9. Summary.vtt
3.5 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/1. Encapsulating State.mp4
18 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/1. Encapsulating State.vtt
9.8 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/2. Keeping Related Data Together.mp4
21 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/2. Keeping Related Data Together.vtt
7.9 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/3. Turning Chained Ifs into the Chain of Rules.mp4
20 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/3. Turning Chained Ifs into the Chain of Rules.vtt
7.1 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/4. Making Friends with Regular Expressions.mp4
8.4 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/4. Making Friends with Regular Expressions.vtt
4.3 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/5. Replacing Branching with Regular Expressions.mp4
29 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/5. Replacing Branching with Regular Expressions.vtt
7.5 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/6. Moving Expressions out to Configuration.mp4
24 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/6. Moving Expressions out to Configuration.vtt
5.9 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/7. Persistence - Creating and Updating Domain Objects.mp4
35 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/7. Persistence - Creating and Updating Domain Objects.vtt
9.9 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/8. Summary.mp4
5.1 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/8. Summary.vtt
3.7 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/1. Reconsidering Immutable Objects.mp4
26 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/1. Reconsidering Immutable Objects.vtt
9.4 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/2. Turning Classes Immutable.mp4
12 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/2. Turning Classes Immutable.vtt
4.4 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/3. Avoiding Aliasing Bugs Altogether.mp4
22 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/3. Avoiding Aliasing Bugs Altogether.vtt
5.6 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/4. The Downside of Immutability.mp4
19 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/4. The Downside of Immutability.vtt
5.2 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/5. Constrained Mutability with Set-once Properties.mp4
19 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/5. Constrained Mutability with Set-once Properties.vtt
8.3 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/6. Consuming Semi-mutable Objects.mp4
18 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/6. Consuming Semi-mutable Objects.vtt
4.6 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/7. Using Historical Model.mp4
13 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/7. Using Historical Model.vtt
5.9 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/8. Implementing Simple Historical Model.mp4
39 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/8. Implementing Simple Historical Model.vtt
9.2 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/9. Summary.mp4
5.8 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/9. Summary.vtt
5.0 kB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/playlist.m3u
7.8 kB