Filename Size ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/01. The Reasons to Avoid Enumerations.mp4 16 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/01. The Reasons to Avoid Enumerations.vtt 6.9 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/02. Alternatives to Enumerations.mp4 7.6 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/02. Alternatives to Enumerations.vtt 5.2 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/03. Converting Enumeration to a Class.mp4 24.8 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/03. Converting Enumeration to a Class.vtt 6.4 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/04. The Reasons to Never Stringify Data.mp4 26.6 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/04. The Reasons to Never Stringify Data.vtt 7.7 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/05. Reaping the Benefits of String Encapsulation.mp4 15.2 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/05. Reaping the Benefits of String Encapsulation.vtt 3.3 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/06. Avoiding Primitive Types Altogether.mp4 4.8 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/06. Avoiding Primitive Types Altogether.vtt 4.1 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/07. Example - Modeling Money.mp4 10.7 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/07. Example - Modeling Money.vtt 4.7 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/08. Persistence - Small-scale CQRS and DDD.mp4 9.8 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/08. Persistence - Small-scale CQRS and DDD.vtt 6.7 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/09. Demonstrating Persistence.mp4 22.6 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/09. Demonstrating Persistence.vtt 8.7 KB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/10. Summary.mp4 4.6 MB ~Get Your Files Here !/05. Dismissing Defensive Code by Avoiding Primitive Types/10. Summary.vtt 3.9 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/01. Understanding the Role of Null.mp4 12.1 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/01. Understanding the Role of Null.vtt 5.4 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/02. Why Compilers Still Rely on Null.mp4 11.2 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/02. Why Compilers Still Rely on Null.vtt 5.5 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/03. Do Not Return Null from a Method.vtt 8.5 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/04. Using Callback on Optional Content.mp4 12.6 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/04. Using Callback on Optional Content.vtt 4.9 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/05. Overloading Existing APIs to Never Return Null.mp4 14.3 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/05. Overloading Existing APIs to Never Return Null.vtt 5.9 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/06. Returning an Optional Object.mp4 18.8 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/06. Returning an Optional Object.vtt 6.4 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/07. Implementing Custom Option Type.mp4 18.9 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/07. Implementing Custom Option Type.vtt 6.2 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/08. Consuming the Option.mp4 26 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/08. Consuming the Option.vtt 8 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/09. Persistence - Creating Complex Domain Objects.mp4 22 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/09. Persistence - Creating Complex Domain Objects.vtt 5.6 KB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/10. Summary.mp4 3.4 MB ~Get Your Files Here !/08. The Principle of Working with Objects, Not with Nulls/10. Summary.vtt 3 KB ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 3.2 MB ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 1.9 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/1. What’s Wrong with Status Codes.mp4 12.2 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/1. What’s Wrong with Status Codes.vtt 6.8 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/2. Understanding Effects of Throwing Exceptions.mp4 11.7 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/2. Understanding Effects of Throwing Exceptions.vtt 5.2 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/3. What Exceptions Are Not Meant to Do.mp4 18 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/3. What Exceptions Are Not Meant to Do.vtt 9.3 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/4. Leave Nothing Exceptional in Exceptions.mp4 24.5 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/4. Leave Nothing Exceptional in Exceptions.vtt 9.7 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/5. Returning a Polymorphic Type Instead of an Excep.mp4 18.2 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/5. Returning a Polymorphic Type Instead of an Excep.vtt 6 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/6. Separating Positive and Negative Return Values.mp4 19.8 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/6. Separating Positive and Negative Return Values.vtt 6 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/7. Inventing the Either Type.mp4 22.5 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/7. Inventing the Either Type.vtt 7.4 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/8. Consuming the Either Type.mp4 11.7 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/8. Consuming the Either Type.vtt 4.2 KB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/9. Summary.mp4 6.8 MB ~Get Your Files Here !/10. Designing Alternative Workflows Instead of Defending from Errors/9. Summary.vtt 5.7 KB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/1. The First Law of Defensive Programming.mp4 10.9 MB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/1. The First Law of Defensive Programming.vtt 7.1 KB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/2. Version Check.mp4 532.1 KB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/2. Version Check.vtt 7 B ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/3. What Follows in This Course.mp4 17.4 MB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/3. What Follows in This Course.vtt 9.9 KB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/4. Traditional Defensive Techniques.mp4 9.7 MB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/4. Traditional Defensive Techniques.vtt 7.1 KB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/5. Defensive Design - An Experiment.mp4 15.9 MB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/5. Defensive Design - An Experiment.vtt 10.5 KB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/6. Called Method Cannot Defend.mp4 10.4 MB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/6. Called Method Cannot Defend.vtt 8.1 KB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/7. Defining Function Domains.mp4 9.6 MB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/7. Defining Function Domains.vtt 8.3 KB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/8. Summary.mp4 3.7 MB ~Get Your Files Here !/2. Understanding Limitations of Traditional Defensive Code/8. Summary.vtt 3.1 KB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/1. Creating Objects.mp4 6 MB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/1. Creating Objects.vtt 5.1 KB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/2. Creating Consistent Objects.mp4 9.9 MB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/2. Creating Consistent Objects.vtt 7.1 KB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/3. Pros and Cons of Multiple Constructors.mp4 25.2 MB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/3. Pros and Cons of Multiple Constructors.vtt 8 KB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/4. Understanding Limitations of the Constructor.mp4 9 MB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/4. Understanding Limitations of the Constructor.vtt 5.8 KB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/5. Promoting Constructor into Builder.mp4 8.4 MB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/5. Promoting Constructor into Builder.vtt 4.2 KB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/6. Variations in the Builder Implementation.mp4 24.4 MB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/6. Variations in the Builder Implementation.vtt 7.9 KB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/7. Summary.mp4 6.6 MB ~Get Your Files Here !/3. Removing Corruption by Only Creating Consistent Objects/7. Summary.vtt 5.1 KB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/1. Reaping the Benefits of Constructor Validation.mp4 19.5 MB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/1. Reaping the Benefits of Constructor Validation.vtt 6.3 KB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/2. Defending in Property Setters.mp4 16.8 MB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/2. Defending in Property Setters.vtt 6.1 KB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/3. Understanding Distinct Kinds of Properties.mp4 6.4 MB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/3. Understanding Distinct Kinds of Properties.vtt 4 KB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/4. Defending in Complex Mutations.mp4 21.7 MB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/4. Defending in Complex Mutations.vtt 5.8 KB ~Get Your Files Here !/4. Removing Corruption by Only Making Valid State Transitions/5. Function Domains Revisited.mp4 10.9 MB