Pluralsight - Encapsulation and SOLID

mp4   Hot:1379   Size:1.04 GB   Created:2017-08-26 10:51:25   Update:2021-12-11 10:45:10  

Download link

File List

  • 8. The Coffee Maker Code Example/04. Demo - Coffe Maker Example Implementation.mp4 115.52 MB
    encapsulation-solid.zip 65.42 MB
    5. The Liskov Substitution Principle/04. Refactoring the Code Toward the Lisko Substitution Principle.mp4 63.57 MB
    4. The Open Closed Principle/01. SOLID Concrete.mp4 56.42 MB
    3. The Single Responsibility Principle/01. Introduction and Motivation.mp4 49.11 MB
    7. The Dependency Inversion Principle/01. Next Step - Functional.mp4 36.57 MB
    5. The Liskov Substitution Principle/01. Append-Only.mp4 36.56 MB
    3. The Single Responsibility Principle/04. Single Responsibility Principle.mp4 36.07 MB
    5. The Liskov Substitution Principle/03. Breaking the LSP - Removal of Features.mp4 33.96 MB
    2. Encapsulation/20. Synthesis.mp4 33.33 MB
    6. The Interface Segregation Principle/02. The Interface Segregation Principle.mp4 33.1 MB
    6. The Interface Segregation Principle/01. SOLID Isn't.mp4 31.99 MB
    7. The Dependency Inversion Principle/05. Refactoring the Read Example Method to a Decorator.mp4 29.01 MB
    4. The Open Closed Principle/03. Refactoring the Example Code Towards the Open Closed Principle.mp4 27.73 MB
    2. Encapsulation/05. Why Care About Code That Sucks.mp4 26.95 MB
    2. Encapsulation/12. Postel's Law.mp4 26.8 MB
    7. The Dependency Inversion Principle/04. Decorator.mp4 26.55 MB
    7. The Dependency Inversion Principle/06. Final Clean-Up.mp4 24.28 MB
    6. The Interface Segregation Principle/04. Refactoring With ISP.mp4 24.02 MB
    4. The Open Closed Principle/02. The Open Closed Principle.mp4 22.44 MB
    2. Encapsulation/06. Classic OO Definition of Encapsulation.mp4 19.97 MB
    5. The Liskov Substitution Principle/02. The Liskov Substitution Principle.mp4 18.02 MB
    2. Encapsulation/16. Output.mp4 17.55 MB
    7. The Dependency Inversion Principle/02. Favor Composition Over Inheritance.mp4 14.21 MB
    2. Encapsulation/19. Maybe.mp4 13.89 MB
    7. The Dependency Inversion Principle/03. Composite.mp4 13.58 MB
    1. Course introduction/01. Introduction.mp4 13.05 MB
    2. Encapsulation/08. Commands and Queries.mp4 13.02 MB
    2. Encapsulation/07. Alternative Encapsulation Techniques.mp4 12.47 MB
    6. The Interface Segregation Principle/03. Refactoring the Code Toward the Interface Segregation Principle.mp4 10.41 MB
    2. Encapsulation/13. Input.mp4 10.3 MB
    2. Encapsulation/09. Queries.mp4 9.12 MB
    2. Encapsulation/15. Fail Fast.mp4 9 MB
    2. Encapsulation/10. Commands.mp4 8.71 MB
    7. The Dependency Inversion Principle/07. SOLID Summary.mp4 8.47 MB
    2. Encapsulation/04. Example - Code That Sucks.mp4 8.31 MB
    2. Encapsulation/18. TryRead.mp4 7.09 MB
    8. The Coffee Maker Code Example/06. Course Conclusion.mp4 7.09 MB
    2. Encapsulation/03. Most Code Sucks.mp4 6.84 MB
    3. The Single Responsibility Principle/03. Refactored Sample Problem Class.mp4 6.83 MB
    2. Encapsulation/14. Nullable References Are Evil.mp4 5.61 MB
    2. Encapsulation/17. Tester-Doer.mp4 5.34 MB
    3. The Single Responsibility Principle/02. The Five SOLID Principles.mp4 5.14 MB
    8. The Coffee Maker Code Example/01. Introduction to the Coffee Maker Code Example.mp4 4.86 MB
    8. The Coffee Maker Code Example/02. Coffee Maker Problem Statement.mp4 4.54 MB
    2. Encapsulation/11. CQS Makes it Easier to Reason About Code.mp4 4.15 MB
    2. Encapsulation/02. Reusable Components.mp4 3.66 MB
    8. The Coffee Maker Code Example/05. Demo Recap.mp4 3.22 MB
    2. Encapsulation/01. Introduction.mp4 854.67 KB
    8. The Coffee Maker Code Example/03. Demo Introduction.mp4 791.78 KB

Download Info

  • Tips

    “Pluralsight - Encapsulation and SOLID” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.