Home
Chang Wan
Cancel

Threat Modelling

Contents Ways to find Security Issues: Threat Modelling Basic Concepts & Terminology Basic Design Patterns for Secure Systems Properties of a Good System Model...

Software Testing

Contents Main Types of Testing Black-Box Testing Advantages Disadvantages White-Box Testing Advantages ...

Bad Smells in Code

Bad smells in refactoring refer to certain patterns or characteristics in code that suggest a need for refactoring. They are called “smells” because they are not necessarily bugs or errors, but the...

Limitations in Refactoring

We know the benefits of refactoring. We know the palpable difference they can make to our work. But we must also be clear about the limitations. Contents Refactoring with Databases ...

Principles in Refactoring

Contents The Two Hats The Rule of Three Understanding the Rule of Three The Essence of the Rule Example the Rule of Three in Practic...

What is Refactoring? Why do We Need Refactoring?

Refactoring isn’t just about cleaning up code; it’s a vital process for maintaining the health, efficiency, and sustainability of a software system. Contents What is Refactoring? ...

Why do We Need to Use More Composition and Less Inheritance?

While inheritance is a fundamental OOP concept, its overuse can lead to various problems. Many people think that inheritance is an Anti-Pattern and should rarely be used, or even not used at all. ...

What gets inverted in DIP?

This Dependency Inversion Principle is relatively simple to use, but the related concepts are harder to understand. For example, What gets inverted in the Dependency Inversion Principle? What is th...

Lists and Collections in Event-B

Contents Collection of Lists Modelling a list of items Queues Modelling a Printer Queue Relating jobs and queue positions Ass...

Proof-Based Verification in Event-B

Contents Validation and Verification Validation Verification What is Formal Verification? Proof Obligations (PO) ...

ip