The Dependency Inversion Principle is a component of The SOLID Principles. These principles set out simple rules to follow that allow us to create maintainable and easily extensible codebases. The dependency inversion principle states that any entity should depend … Click to read more
Tag: computer science
Interface Segregation Principle
The Interface Segregation Principle is a component of The SOLID Principles. The SOLID principles are useful tips and rules to follow when writing software and code to create a maintainable and easily extensible codebase. The interface segregation principle states … Click to read more
Liskov Substitution Principle
The Liskov Substitution Principle is a component of The SOLID Principles which helps you create maintainable and extensible code. This principle states that any class should be able to be substituted for any of its subclasses without any issues. This … Click to read more
Open-Closed Principle
The Open-Closed Principle is a component of The SOLID Principles. These principles can help you write software that is easy to extend and maintain whilst also avoiding code smells and bad design in your codebase. The open-closed principle states … Click to read more
Single Responsibility Principle (SRP)
The Single Responsibility Principle (SRP) is one of the aspects of The SOLID Principles. It states that every class or object should have one purpose, one responsibility and effectively one reason for existence. This principle is concerned mainly with … Click to read more
The SOLID Principles
The SOLID principles are a set of 5 rules to follow for Object-Orientated Programming (OOP). These rules or principles can be used to create software that is easy to extend and maintain while avoiding code smells and allowing simple refactoring. … Click to read more
What is Steganography?
Steganography is the process of hiding a message, file, video, or picture within another message, file, video or picture. The key of steganography is that the medium that is used to hide the secret message, such as the image you … Click to read more
What is Defensive Coding?
Defensive coding is a way of ensuring your program or code continues to function under unforeseen or unintended circumstances. Imagine a hacker or malicious user is trying to find vulnerabilities in your program, such as seeing the contents of a … Click to read more
What is Code Obfuscation?
Code obfuscation is a way to disguise what code is actually doing while still allowing the code to be compiled or interpreted. Obfuscating code can be used to make it harder for someone else to understand and read the code. … Click to read more
What is Hashing?
Hashing is a way to convert readable information into a more secure non-readable format. You can use hashing to secure passwords or any other information you don’t want hackers to be able to access. Hashing can also be used to … Click to read more