RAR-files |
rebar-pluralsight.defensive.coding.in.java.rar |
15,000,000 |
00906D26 |
rebar-pluralsight.defensive.coding.in.java.r00 |
15,000,000 |
CA6A73D0 |
rebar-pluralsight.defensive.coding.in.java.r01 |
15,000,000 |
03748DCF |
rebar-pluralsight.defensive.coding.in.java.r02 |
15,000,000 |
0F175B3A |
rebar-pluralsight.defensive.coding.in.java.r03 |
15,000,000 |
DD41E460 |
rebar-pluralsight.defensive.coding.in.java.r04 |
15,000,000 |
F011BAAE |
rebar-pluralsight.defensive.coding.in.java.r05 |
15,000,000 |
CA745093 |
rebar-pluralsight.defensive.coding.in.java.r06 |
15,000,000 |
B088DB10 |
rebar-pluralsight.defensive.coding.in.java.r07 |
15,000,000 |
3892B234 |
rebar-pluralsight.defensive.coding.in.java.r08 |
15,000,000 |
DA73FE96 |
rebar-pluralsight.defensive.coding.in.java.r09 |
15,000,000 |
1957918C |
rebar-pluralsight.defensive.coding.in.java.r10 |
15,000,000 |
04503F0A |
rebar-pluralsight.defensive.coding.in.java.r11 |
15,000,000 |
ED3B9D02 |
rebar-pluralsight.defensive.coding.in.java.r12 |
15,000,000 |
A4280FD2 |
rebar-pluralsight.defensive.coding.in.java.r13 |
15,000,000 |
84C9A9BC |
rebar-pluralsight.defensive.coding.in.java.r14 |
2,324,473 |
F084BA13 |
|
Total size: |
227,324,473 |
|
|
Archived
files |
01 - Course Overview\01 - Course Overview.mp4
[bf0bc670d1c5ff02]
|
2,341,141 |
0B4D48C8 |
02 - Why Defensive Coding Matters\02 - Course Introduction.mp4
[3c2c1dc04ceaaf7d]
|
1,572,402 |
F0C0BFF5 |
02 - Why Defensive Coding Matters\03 - What is Defensive Coding.mp4
[f8858eabd773dcff]
|
6,524,120 |
33C75035 |
02 - Why Defensive Coding Matters\04 - Why Apply Defensive Coding.mp4
[d148c931c340b513]
|
2,657,345 |
0CB1B0D4 |
02 - Why Defensive Coding Matters\05 - Prerequisites.mp4
[1f2681c088867aa4]
|
795,930 |
B420F6B1 |
02 - Why Defensive Coding Matters\06 - Course Overview.mp4
[802d24a5ce64222f]
|
1,756,193 |
63F5E1AC |
03 - Validating Method Input\07 - Module Overview.mp4
[6da667d0ddf00e6c]
|
2,138,947 |
1A3C4418 |
03 - Validating Method Input\08 - Code Project Introduction.mp4
[807aaa37aaa61f84]
|
10,555,454 |
963559B9 |
03 - Validating Method Input\09 - Choosing the Right Exceptions.mp4
[6c210ec93e845a47]
|
2,802,069 |
4BA09E43 |
03 - Validating Method Input\10 - What We Didn't Cover.mp4
[10246d5f4ebbdaef]
|
3,759,812 |
407D5B43 |
03 - Validating Method Input\11 - Module Wrap Up.mp4
[234ba17fc2710323]
|
3,096,520 |
9652CD4B |
03 - Validating Method Input\12 - Lambdas Crash Course.mp4
[a0625be580beaa74]
|
6,256,545 |
C1604B26 |
03 - Validating Method Input\13 - Fail Fast with Guard Clauses.mp4
[62c8eec595147690]
|
5,482,480 |
517D7BFD |
03 - Validating Method Input\14 - Validating null.mp4
[71c55b83ceedc112]
|
14,637,376 |
99C05453 |
03 - Validating Method Input\15 - Validating Number Ranges.mp4
[6b9d9ce1690e6aae]
|
8,972,195 |
A92A276A |
03 - Validating Method Input\16 - Validating Strings.mp4
[ad6aa5b98f23729a]
|
11,583,355 |
241D8980 |
03 - Validating Method Input\17 - Handling Dates.mp4
[6f4b67f8baf5fd49]
|
9,298,482 |
88D34335 |
03 - Validating Method Input\18 - Considering Combinations.mp4
[c8e25ff68412e886]
|
4,779,453 |
67C7BCE4 |
03 - Validating Method Input\19 - Implementing Class Invariants.mp4
[b73551ea6df15a39]
|
8,664,505 |
1468F07B |
04 - Using Frameworks for Validation\20 - Module Overview.mp4
[ae31c6351a434b13]
|
1,996,558 |
30DDD3F4 |
04 - Using Frameworks for Validation\21 - Objects API.mp4
[dcd45dfb9ae1e47f]
|
8,904,381 |
5415F9C9 |
04 - Using Frameworks for Validation\22 - Using Google Guava.mp4
[aab339fc4c3aac2f]
|
11,391,204 |
E82F6F00 |
04 - Using Frameworks for Validation\23 - Comparing Apache Commons.mp4
[868c024dd478cf55]
|
3,978,243 |
56016A63 |
04 - Using Frameworks for Validation\24 - Leveraging Hamcrest and AssertJ.mp4
[c50a055ddcc3a3ab]
|
15,360,031 |
5BBC2FC2 |
04 - Using Frameworks for Validation\25 - Managing Libraries.mp4
[b2986582105d3f17]
|
4,596,858 |
4F08CAD1 |
04 - Using Frameworks for Validation\26 - Module Wrap Up.mp4
[9bc281f2a98b1f3b]
|
1,377,139 |
9701B917 |
05 - Improving Method Return Values\27 - Module Overview.mp4
[c093764e60494f1a]
|
3,274,233 |
26908BC9 |
05 - Improving Method Return Values\28 - Magic Numbers.mp4
[17c848d3019cdde3]
|
1,967,245 |
D8309C9A |
05 - Improving Method Return Values\29 - Method Return Options.mp4
[b27c947a2e5ebaa0]
|
5,100,463 |
D1B318FA |
05 - Improving Method Return Values\30 - What Happens When You Return null.mp4
[ffbdea41de89746b]
|
5,902,660 |
B9903489 |
05 - Improving Method Return Values\31 - Sensible Defaults.mp4
[e53cf1f760e22329]
|
1,175,684 |
55E89C25 |
05 - Improving Method Return Values\32 - Empty Collections.mp4
[af0f1dd91b8a1c5]
|
3,271,525 |
D52607A3 |
05 - Improving Method Return Values\33 - Java Optional.mp4
[81b0222a10307489]
|
14,329,253 |
7B100F5F |
05 - Improving Method Return Values\34 - Module Wrap Up.mp4
[be51b3f3debef552]
|
2,356,229 |
A422F6BB |
06 - Using Other Defensive Practices\35 - Module Overview.mp4
[7ebd88b6c22e30bc]
|
1,565,639 |
EBE5510B |
06 - Using Other Defensive Practices\36 - Strive for Better Encapsulation.mp4
[efa2d2638f97b493]
|
6,467,301 |
1FA9AE8B |
06 - Using Other Defensive Practices\37 - Be Careful with Method Side Effects.mp4
[3a6105ed1b856277]
|
5,208,715 |
D9C32946 |
06 - Using Other Defensive Practices\38 - Improve Your Exception Handling.mp4
[8ba21bfd55efaa6b]
|
8,850,281 |
F641D0D4 |
06 - Using Other Defensive Practices\39 - Use Static Analysis Tools.mp4
[6384312c28876a3e]
|
6,385,243 |
632B8FE8 |
06 - Using Other Defensive Practices\40 - Further Recommendations.mp4
[ed70ab7ec8826a07]
|
3,004,878 |
DF222B39 |
06 - Using Other Defensive Practices\41 - Module Wrap Up.mp4
[1940b2c5d389fded]
|
1,366,510 |
0EA2F23A |
defensive-programming-java.zip |
1,813,375 |
9A1EF869 |
01 - Course Overview |
0 |
00000000 |
02 - Why Defensive Coding Matters |
0 |
00000000 |
03 - Validating Method Input |
0 |
00000000 |
04 - Using Frameworks for Validation |
0 |
00000000 |
05 - Improving Method Return Values |
0 |
00000000 |
06 - Using Other Defensive Practices |
0 |
00000000 |
|
Total size: |
227,317,972 |
|
|