Friday, July 13, 2007

Using interface hierarchies to enforce access protection



1 comment:

  1. Would this be an accurate UML picture of the original design, before you tweaked it? Please view the picture here, http://pcolanet.spaces.live.com/

    Just trying to learn how to model code artefacts like yours, which I find interesting and vital towards flexible designs.

    Thanks,

    Danny Rosales

    ReplyDelete