Friday, July 13, 2007

Using interface hierarchies to enforce access protection

This content has moved permanently to:


demetriusrubicon said...

Would this be an accurate UML picture of the original design, before you tweaked it? Please view the picture here,

Just trying to learn how to model code artefacts like yours, which I find interesting and vital towards flexible designs.


Danny Rosales