BT种子基本信息
- 种子哈希:a01535b297fdd580340820e23fc399f95de699a2
- 文档大小:1.3 GB
- 文档个数:162个文档
- 下载次数:2次
- 下载速度:极快
- 收录时间:2025-02-19
- 最近下载:2025-02-19
- DMCA/屏蔽:DMCA/屏蔽
文档列表
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/8. Implementing Simple Historical Model.mp4 40.7 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/7. Persistence - Creating and Updating Domain Objects.mp4 36.5 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/3. Dont Guard Business Rules.mp4 32.6 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/8. Persistence - Querying View Models.mp4 31.4 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/5. Replacing Branching with Regular Expressions.mp4 30.3 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/6. Turning Rule Objects into Active Elements.mp4 28.2 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/04. The Reasons to Never Stringify Data.mp4 27.9 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/4. Removing Guards Through Design.mp4 27.8 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/1. Reconsidering Immutable Objects.mp4 27.4 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/08. Consuming the Option.mp4 27.3 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/3. Pros and Cons of Multiple Constructors.mp4 26.4 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/03. Converting Enumeration to a Class.mp4 26.0 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/4. Leave Nothing Exceptional in Exceptions.mp4 25.7 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/6. Variations in the Builder Implementation.mp4 25.6 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/6. Moving Expressions out to Configuration.mp4 25.4 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/09. Demonstrating Persistence.mp4 23.7 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/7. Inventing the Either Type.mp4 23.6 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/09. Persistence - Creating Complex Domain Objects.mp4 23.0 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/4. Defending in Complex Mutations.mp4 22.8 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/3. Avoiding Aliasing Bugs Altogether.mp4 22.7 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/7. Completing the Students Filter.mp4 22.5 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/2. Keeping Related Data Together.mp4 21.9 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/3. Turning Chained Ifs into the Chain of Rules.mp4 21.3 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/6. Separating Positive and Negative Return Values.mp4 20.7 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/1. Reaping the Benefits of Constructor Validation.mp4 20.5 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/4. The Downside of Immutability.mp4 20.4 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/5. Constrained Mutability with Set-once Properties.mp4 19.9 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/07. Implementing Custom Option Type.mp4 19.8 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/06. Returning an Optional Object.mp4 19.8 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/6. Consuming Semi-mutable Objects.mp4 19.3 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/5. Returning a Polymorphic Type Instead of an Excep.mp4 19.1 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/3. What Exceptions Are Not Meant to Do.mp4 18.9 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/1. Encapsulating State.mp4 18.4 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/3. What Follows in This Course.mp4 18.3 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/2. Defending in Property Setters.mp4 17.6 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/01. The Reasons to Avoid Enumerations.mp4 16.8 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/5. Defensive Design - An Experiment.mp4 16.6 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/2. Guarding Against Null Only.mp4 16.0 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/05. Reaping the Benefits of String Encapsulation.mp4 15.9 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/05. Overloading Existing APIs to Never Return Null.mp4 15.0 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/6. When Constructor Depends on Multiple Objects.mp4 14.0 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/04. Using Callback on Optional Content.mp4 13.2 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/7. Using Historical Model.mp4 13.2 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/2. Turning Classes Immutable.mp4 13.0 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/1. What’s Wrong with Status Codes.mp4 12.8 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/01. Understanding the Role of Null.mp4 12.7 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/2. Understanding Effects of Throwing Exceptions.mp4 12.2 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/8. Consuming the Either Type.mp4 12.2 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/1. Introducing Guard Clauses.mp4 11.9 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/02. Why Compilers Still Rely on Null.mp4 11.8 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/5. Turning Domain Rules into Rule Objects.mp4 11.5 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/5. Function Domains Revisited.mp4 11.5 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/1. The First Law of Defensive Programming.mp4 11.5 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/8. Persistence and Parameterized Constructors.mp4 11.3 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/07. Example - Modeling Money.mp4 11.2 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/7. Creating Objects in Small Steps.mp4 10.9 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/6. Called Method Cannot Defend.mp4 10.9 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/2. Creating Consistent Objects.mp4 10.3 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/08. Persistence - Small-scale CQRS and DDD.mp4 10.2 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/4. Traditional Defensive Techniques.mp4 10.2 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/7. Defining Function Domains.mp4 10.1 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/4. Understanding Limitations of the Constructor.mp4 9.4 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/5. Promoting Constructor into Builder.mp4 8.9 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/4. Making Friends with Regular Expressions.mp4 8.8 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/02. Alternatives to Enumerations.mp4 7.9 MB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/9. Summary.mp4 7.1 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/7. Summary.mp4 6.9 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/3. Understanding Distinct Kinds of Properties.mp4 6.7 MB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/1. Creating Objects.mp4 6.3 MB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/9. Summary.mp4 6.1 MB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/8. Summary.mp4 5.4 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/06. Avoiding Primitive Types Altogether.mp4 5.0 MB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/10. Summary.mp4 4.8 MB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/9. Summary.mp4 4.8 MB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/9. Summary.mp4 4.4 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/8. Summary.mp4 3.9 MB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/10. Summary.mp4 3.5 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 3.4 MB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/2. Version Check.mp4 544.8 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/5. Defensive Design - An Experiment.vtt 10.7 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/3. What Follows in This Course.vtt 10.2 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/7. Persistence - Creating and Updating Domain Objects.vtt 10.1 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/1. Encapsulating State.vtt 10.1 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/4. Leave Nothing Exceptional in Exceptions.vtt 9.9 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/8. Persistence - Querying View Models.vtt 9.7 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/1. Reconsidering Immutable Objects.vtt 9.6 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/3. What Exceptions Are Not Meant to Do.vtt 9.5 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/8. Implementing Simple Historical Model.vtt 9.5 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/7. Creating Objects in Small Steps.vtt 9.2 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/2. Guarding Against Null Only.vtt 9.0 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/09. Demonstrating Persistence.vtt 8.9 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/8. Persistence and Parameterized Constructors.vtt 8.8 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/03. Do Not Return Null from a Method.vtt 8.7 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/7. Defining Function Domains.vtt 8.5 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/5. Constrained Mutability with Set-once Properties.vtt 8.5 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/6. Called Method Cannot Defend.vtt 8.3 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/3. Pros and Cons of Multiple Constructors.vtt 8.2 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/08. Consuming the Option.vtt 8.2 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/2. Keeping Related Data Together.vtt 8.1 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/6. Variations in the Builder Implementation.vtt 8.1 kB
~Get Your Files Here !/playlist.m3u 7.9 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/04. The Reasons to Never Stringify Data.vtt 7.9 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/3. Dont Guard Business Rules.vtt 7.9 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/5. Replacing Branching with Regular Expressions.vtt 7.7 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/1. Introducing Guard Clauses.vtt 7.6 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/7. Inventing the Either Type.vtt 7.6 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/1. The First Law of Defensive Programming.vtt 7.3 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/4. Traditional Defensive Techniques.vtt 7.3 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/3. Turning Chained Ifs into the Chain of Rules.vtt 7.3 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/2. Creating Consistent Objects.vtt 7.2 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/01. The Reasons to Avoid Enumerations.vtt 7.1 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/1. What’s Wrong with Status Codes.vtt 7.0 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/08. Persistence - Small-scale CQRS and DDD.vtt 6.8 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/6. Turning Rule Objects into Active Elements.vtt 6.6 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/03. Converting Enumeration to a Class.vtt 6.5 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/06. Returning an Optional Object.vtt 6.5 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/1. Reaping the Benefits of Constructor Validation.vtt 6.5 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/07. Implementing Custom Option Type.vtt 6.4 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/2. Defending in Property Setters.vtt 6.3 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/4. Removing Guards Through Design.vtt 6.2 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/6. Separating Positive and Negative Return Values.vtt 6.1 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/5. Returning a Polymorphic Type Instead of an Excep.vtt 6.1 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/05. Overloading Existing APIs to Never Return Null.vtt 6.1 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/6. Moving Expressions out to Configuration.vtt 6.1 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/7. Using Historical Model.vtt 6.0 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/4. Understanding Limitations of the Constructor.vtt 5.9 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/4. Defending in Complex Mutations.vtt 5.9 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/9. Summary.vtt 5.8 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/3. Avoiding Aliasing Bugs Altogether.vtt 5.8 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/09. Persistence - Creating Complex Domain Objects.vtt 5.7 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/7. Completing the Students Filter.vtt 5.6 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/02. Why Compilers Still Rely on Null.vtt 5.6 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/01. Understanding the Role of Null.vtt 5.5 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/6. When Constructor Depends on Multiple Objects.vtt 5.4 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/2. Understanding Effects of Throwing Exceptions.vtt 5.4 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/4. The Downside of Immutability.vtt 5.3 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/02. Alternatives to Enumerations.vtt 5.3 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/7. Summary.vtt 5.2 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/1. Creating Objects.vtt 5.2 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/9. Summary.vtt 5.1 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/5. Function Domains Revisited.vtt 5.1 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/04. Using Callback on Optional Content.vtt 5.0 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/07. Example - Modeling Money.vtt 4.8 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/6. Consuming Semi-mutable Objects.vtt 4.7 kB
~Get Your Files Here !/9. Building Rich Domain Model as an Effective Defense by Design/2. Turning Classes Immutable.vtt 4.5 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/4. Making Friends with Regular Expressions.vtt 4.4 kB
~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/8. Consuming the Either Type.vtt 4.3 kB
~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/5. Promoting Constructor into Builder.vtt 4.3 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/06. Avoiding Primitive Types Altogether.vtt 4.2 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/3. Understanding Distinct Kinds of Properties.vtt 4.1 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/10. Summary.vtt 4.0 kB
~Get Your Files Here !/7. Building Defensive Design Instead of Writing Defensive Code/8. Summary.vtt 3.8 kB
~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/9. Summary.vtt 3.7 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/9. Summary.vtt 3.6 kB
~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/05. Reaping the Benefits of String Encapsulation.vtt 3.4 kB
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/8. Summary.vtt 3.2 kB
~Get Your Files Here !/6. Defining Function Domains as the Primary Line of Defense/5. Turning Domain Rules into Rule Objects.vtt 3.1 kB
~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/10. Summary.vtt 3.0 kB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 2.0 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/2. Version Check.vtt 7 Bytes
==查看完整文档列表==