Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Python Design Patterns - Third Edition

You're reading from  Mastering Python Design Patterns - Third Edition

Product type Book
Published in May 2024
Publisher Packt
ISBN-13 9781837639618
Pages 296 pages
Edition 3rd Edition
Languages
Authors (2):
Kamon Ayeva Kamon Ayeva
Profile icon Kamon Ayeva
Sakis Kasampalis Sakis Kasampalis
Profile icon Sakis Kasampalis
View More author details
Toc

Table of Contents (17) Chapters close

Preface 1. Part 1: Start with Principles
2. Chapter 1: Foundational Design Principles 3. Chapter 2: SOLID Principles 4. Part 2: From the Gang of Four
5. Chapter 3: Creational Design Patterns 6. Chapter 4: Structural Design Patterns 7. Chapter 5: Behavioral Design Patterns 8. Part 3: Beyond the Gang of Four
9. Chapter 6: Architectural Design Patterns 10. Chapter 7: Concurrency and Asynchronous Patterns 11. Chapter 8: Performance Patterns 12. Chapter 9: Distributed Systems Patterns 13. Chapter 10: Patterns for Testing 14. Chapter 11: Python Anti-Patterns 15. Index 16. Other Books You May Enjoy

The proxy pattern

The proxy design pattern gets its name from the proxy (also known as surrogate) object used to perform an important action before accessing the actual object. There are four well-known types of proxy. They are as follows:

  1. A virtual proxy, which uses lazy initialization to defer the creation of a computationally expensive object until the moment it is actually needed.
  2. A protection/protective proxy, which controls access to a sensitive object.
  3. A remote proxy, which acts as the local representation of an object that really exists in a different address space (for example, a network server).
  4. A smart (reference) proxy, which performs extra actions when an object is accessed. Examples of such actions are reference counting and thread-safety checks.

Real-world examples

Chip cards offer a good example of how a protective proxy is used in real life. The debit/credit card contains a chip that first needs to be read by the ATM or card reader. After...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime