CodePudding
Home
front end
Back-end
Net
Software design
Enterprise
Blockchain
Mobile
Software engineering
database
OS
other
Tags
>
design-principles
09-02
Software design
when to use design patterns and when to apply which solid principle?
09-02
Software design
Is the virtual keyword inherently in-violation of the Liskov Substitution principle?
09-01
Blockchain
How to restrict access privilege between two classes in java?
04-26
Back-end
Introducing a new subclass to an established system using inheritance which violates the Liskov Subs
11-04
Enterprise
python class operations on members vs static methods
Links:
CodePudding