Pluralsight - Encapsulation and SOLID
- 8. The Coffee Maker Code Example04. Demo - Coffe Maker Example Implementation.mp4115.52 MB
- encapsulation-solid.zip65.42 MB
- 5. The Liskov Substitution Principle04. Refactoring the Code Toward the Lisko Substitution Principle.mp463.57 MB
- 4. The Open Closed Principle01. SOLID Concrete.mp456.42 MB
- 3. The Single Responsibility Principle01. Introduction and Motivation.mp449.11 MB
- 7. The Dependency Inversion Principle01. Next Step - Functional.mp436.57 MB
- 5. The Liskov Substitution Principle01. Append-Only.mp436.56 MB
- 3. The Single Responsibility Principle04. Single Responsibility Principle.mp436.07 MB
- 5. The Liskov Substitution Principle03. Breaking the LSP - Removal of Features.mp433.96 MB
- 2. Encapsulation20. Synthesis.mp433.33 MB
- 6. The Interface Segregation Principle02. The Interface Segregation Principle.mp433.1 MB
- 6. The Interface Segregation Principle01. SOLID Isn't.mp431.99 MB
- 7. The Dependency Inversion Principle05. Refactoring the Read Example Method to a Decorator.mp429.01 MB
- 4. The Open Closed Principle03. Refactoring the Example Code Towards the Open Closed Principle.mp427.73 MB
- 2. Encapsulation05. Why Care About Code That Sucks.mp426.95 MB
- 2. Encapsulation12. Postel's Law.mp426.8 MB
- 7. The Dependency Inversion Principle04. Decorator.mp426.55 MB
- 7. The Dependency Inversion Principle06. Final Clean-Up.mp424.28 MB
- 6. The Interface Segregation Principle04. Refactoring With ISP.mp424.02 MB
- 4. The Open Closed Principle02. The Open Closed Principle.mp422.44 MB
- 2. Encapsulation06. Classic OO Definition of Encapsulation.mp419.97 MB
- 5. The Liskov Substitution Principle02. The Liskov Substitution Principle.mp418.02 MB
- 2. Encapsulation16. Output.mp417.55 MB
- 7. The Dependency Inversion Principle02. Favor Composition Over Inheritance.mp414.21 MB
- 2. Encapsulation19. Maybe.mp413.89 MB
- 7. The Dependency Inversion Principle03. Composite.mp413.58 MB
- 1. Course introduction01. Introduction.mp413.05 MB
- 2. Encapsulation08. Commands and Queries.mp413.02 MB
- 2. Encapsulation07. Alternative Encapsulation Techniques.mp412.47 MB
- 6. The Interface Segregation Principle03. Refactoring the Code Toward the Interface Segregation Principle.mp410.41 MB
- 2. Encapsulation13. Input.mp410.3 MB
- 2. Encapsulation09. Queries.mp49.12 MB
- 2. Encapsulation15. Fail Fast.mp49 MB
- 2. Encapsulation10. Commands.mp48.71 MB
- 7. The Dependency Inversion Principle07. SOLID Summary.mp48.47 MB
- 2. Encapsulation04. Example - Code That Sucks.mp48.31 MB
- 2. Encapsulation18. TryRead.mp47.09 MB
- 8. The Coffee Maker Code Example06. Course Conclusion.mp47.09 MB
- 2. Encapsulation03. Most Code Sucks.mp46.84 MB
- 3. The Single Responsibility Principle03. Refactored Sample Problem Class.mp46.83 MB
- 2. Encapsulation14. Nullable References Are Evil.mp45.61 MB
- 2. Encapsulation17. Tester-Doer.mp45.34 MB
- 3. The Single Responsibility Principle02. The Five SOLID Principles.mp45.14 MB
- 8. The Coffee Maker Code Example01. Introduction to the Coffee Maker Code Example.mp44.86 MB
- 8. The Coffee Maker Code Example02. Coffee Maker Problem Statement.mp44.54 MB
- 2. Encapsulation11. CQS Makes it Easier to Reason About Code.mp44.15 MB
- 2. Encapsulation02. Reusable Components.mp43.66 MB
- 8. The Coffee Maker Code Example05. Demo Recap.mp43.22 MB
- 2. Encapsulation01. Introduction.mp4854.67 KB
- 8. The Coffee Maker Code Example03. Demo Introduction.mp4791.78 KB