×

Advanced Defensive Programming Techniques

Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare+
Duration

6h 22m

level

Intermediate

Course Creator

Zoran Horvat

Last Updated

06-Sep-17

This course will lead you step by step through the process of developing defensive design practices, which can substitute common defensive coding, for the better of software design and implementation.

Add your review

How often do you have to defend from nulls, zeros, surprising cases hitting switch instruction, impossible else branches, and so on? Is your life a struggle with issues caused by unexpected data or invalid system state? In this course, Advanced Defensive Programming Techniques, you’ll learn how to defend by means of design, so that almost all explicit defensive code can be happily removed. First, you’ll discover how to build validation. Next, you’ll explore how exactly to design a public interface. Finally, you’ll cover how to unify error flows, so nothing unpredictable can take you by surprise. By the end of this course, you’ll have the necessary knowledge to efficiently develop your own defensive design practice.
Author Name: Zoran Horvat
Author Description:
Zoran Horvat is Principal consultant at Coding Helmet Consultancy, speaker and author of 100+ articles, and independent trainer on .NET technology stack. He can often be found speaking at conferences and user groups, promoting object-oriented development style and clean coding practices and techniques that improve longevity of complex business applications.

Table of Contents

  • Course Overview
    1min
  • Understanding Limitations of Traditional Defensive Code
    40mins
  • Removing Corruption by Only Creating Consistent Objects
    31mins
  • Removing Corruption by Only Making Valid State Transitions
    40mins
  • Dismissing Defensive Code by Avoiding Primitive Types
    45mins
  • Defining Function Domains as the Primary Line of Defense
    44mins
  • Building Defensive Design Instead of Writing Defensive Code
    42mins
  • The Principle of Working with Objects, Not with Nulls
    46mins
  • Building Rich Domain Model as an Effective Defense by Design
    43mins
  • Designing Alternative Workflows Instead of Defending from Errors
    46mins

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Advanced Defensive Programming Techniques”

Your email address will not be published. Required fields are marked *

Advanced Defensive Programming Techniques
Advanced Defensive Programming Techniques
Edcroma
Logo
Compare items
  • Total (0)
Compare
0
https://login.stikeselisabethmedan.ac.id/produtcs/
https://hakim.pa-bangil.go.id/
https://lowongan.mpi-indonesia.co.id/toto-slot/
https://cctv.sikkakab.go.id/
https://hakim.pa-bangil.go.id/products/
https://penerimaan.uinbanten.ac.id/
https://ssip.undar.ac.id/
https://putusan.pta-jakarta.go.id/
https://tekno88s.com/
https://majalah4dl.com/
https://nana16.shop/
https://thamuz12.shop/
https://dprd.sumbatimurkab.go.id/slot777/
https://dprd.sumbatimurkab.go.id/
https://cctv.sikkakab.go.id/slot-777/
https://hakim.pa-kuningan.go.id/
https://hakim.pa-kuningan.go.id/slot-gacor/
https://thamuz11.shop/
https://thamuz15.shop/
https://thamuz14.shop/
https://ppdb.smtimakassar.sch.id/
https://ppdb.smtimakassar.sch.id/slot-gacor/
slot777
slot dana
majalah4d
slot thailand
slot dana
rtp slot
toto slot
slot toto
toto4d
slot gacor
slot toto
toto slot
toto4d
slot gacor
tekno88
https://lowongan.mpi-indonesia.co.id/
https://thamuz13.shop/
https://www.alpha13.shop/
https://perpustakaan.smkpgri1mejayan.sch.id/
https://perpustakaan.smkpgri1mejayan.sch.id/toto-slot/
https://nana44.shop/
https://sadps.pa-negara.go.id/
https://sadps.pa-negara.go.id/slot-777/
https://peng.pn-baturaja.go.id/
https://portalkan.undar.ac.id/
https://portalkan.undar.ac.id/toto-slot/
https://penerimaan.ieu.ac.id/
https://sid.stikesbcm.ac.id/