Note: See the previous lectures notes for the majority of this lectures contents.
Defensive Copying and Privacy Leaks
Composition: external interference with the inner workings of the class are undersirable.
Aggregates: external changes are OK.
The method of Copy Constructors (previous lectures) is called defensive copying.
Welcome
Welcome to my blog.
I will be updating this blog with lecture notes and miscellaneous information for:
Prof. A. Eckford, Section-Z: MWF at 10:30 in R S137
Feel free to leave me a message or send me an e-mail at producap@yorku.ca.
Here is a link for MyMail, Hotmail, G-mail, and PRISM login.
On that note, you must have a PRISM account in order to write the lab tests.
If you have not created a PRISM account yet (e.g., if you received transfer credit for 1020), see the lab monitor in CSEB 1006 as soon as possible.
I will also leave the blog open to comments, etc. much like the CSE forums.
Thanks for visiting.
Phil.
Monday, February 4, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment