Computer Science Wiki
Search
Search
Dark mode
Light mode
Explorer
Cloud Computing
AWS
Compute
EC2
Amazon Machine Image (AMI)
Connect to an EC2 instance
EC2 - Elastic Compute Cloud
EC2 Image Builder
EC2 Purchase Options
EC2 Sizing and Configuration Options
Security and Permissions
Types of EC2 Instances
ASG - Auto Scaling Group
ECR - Elastic Container Registry
ECS - Elastic Container Service
ELB - Elastic Load Balancer
Database
Amazon Athena
Amazon Aurora
Amazon ElastiCache
Amazon Glue
Amazon Managed Blockchain
Amazon Neptune
Amazon QLDB
Amazon QuickSight
Amazon Timestream
DMS - Database Migration Service
DocumentDB
DynamoDB
EMR - Elastic MapReduce
RDS - Relational Database Service
RDS Deployment Options
Redshift
IAM
AWS Identity and Access Management (IAM)
IAM Guidelines and Best Practices
IAM Security Tools
IAM Users, Groups, Roles, and Policies
Other services
Serverless and AWS Lambda
Storage
EC2 Instance Storage
Amazon FSx
EBS - Elastic Block Store
EBS Snapshot
EC2 Instance Store
EFS - Elastic File System
S3
Amazon S3
Amazon S3 Bucket Policies
Amazon S3 Encryption
Amazon S3 Replication (CRR & SRR)
Amazon S3 Security
Amazon S3 Static Website Hosting
Amazon S3 Storage Class
Amazon S3 Versioning
AWS Snow Family
AWS Storage Gateway
Edge Computing with AWS Snow Family
AWS Command Line Interface (CLI)
AWS Region and Availability Zone
AWS Shared Responsibility Model
Pricing of the AWS
Cloud Computing
Scalability and High Availability in Cloud Computing
The Delivery of Cloud Services
The Deployment Models of the Cloud
Traditional Computing VS Cloud Computing
Types of Cloud Computing Services
Computer Networks
Internet Protocol Suite
Address Resolution Protocol (ARP)
Application Layer
Border Gateway Protocol (BGP)
Determine if destination outside the LAN
DNS Nameserver
DNS Record
DNS Resolution
Domain Name System (DNS)
Hypertext Transfer Protocol (HTTP)
Internet Control Message Protocol (ICMP)
Internet Layer
Internet Protocol (IP)
Internet Protocol Suite
Link Layer
Reaching destinations outside the LAN
Simple Mail Transfer Protocol (SMTP)
SMTP Commands
TCP Port
Transport Layer
Circuit Switching VS Packet Switching
Computer Networks
Ethernet
LAN and WAN
Network Layered Architecture
Computing Research and Cross-Disciplinary Studies
Computing Research
Role of Management and Board in the Cybersecurity Picture
Cross-Disciplinary Studies
Business Information Systems (BIS)
Business Information System Ethics
Business Information Systems (BIS)
Business Process (BP)
Business Process Management (BPM)
Business Process Model and Notation (BPMN)
Databases and Data Modelling
Information System (IS)
IS Five Components Example
Porter's Five Forces Analysis
Porter's Four Competitive Strategies
Porter's Value Chain Model
Process Improvement
Strategy and Competitive Advantage
What Is Business
Computing Project Management
Computing Project Mangement
Project management process groups
Human Computer Interaction (HCI)
Usability
Information Architecture (IA)
Understanding Users - Information Collection
What is Usability
Human Computer Interaction (HCI)
Interview
Computing Research and Cross-Disciplinary Studies
Cyber Security
Network Security
Asymmetric Cryptography
Caesar Cipher
Diffie-Hellman Key Exchange
Digital Certificate
Digital Signature
Hash Algorithms
Hash Extension Attack
HMAC Key Derivation Function (HKDF)
HTTP Secure (HTTPS)
Key Distribution
Message Authentication Code (MAC)
Network Attacks and Preventions
Network Security and Cryptography
One-Time Pad (OTP)
Password Based Attacks
RSA Algorithm
Secure Shell (SSH)
Stream Cipher and Block Cipher
Symmetric Cryptography
Transport Layer Security (TLS)
Vigenère Cipher
Cyber Security and Security Engineering
Cybersecurity Culture and Framework
Human Factors in Cybersecurity
Number Theory and Abstract Algebra in Cryptography
Principle of Psychological Acceptability
Security Concepts
System Security and Access Control
Usability and Security of Passwords
Data Science and AI
Artificial Intelligence (AI)
Search Problems
Informed Search - Greedy Search
Problem Solving and Search
Uninformed Search - Breadth-First Search (BFS)
Uninformed Search - Depth-First Search (DFS)
Uninformed Search - Iterative Deepening Search (IDS)
Uninformed Search - Uninformed Cost Search (UCS)
Computational Data Science and Artificial Intelligence (AI)
Data Structures and Algorithms
Algorithms
Divide and Conquer
Divide and Conquer
Divide and Conquer Master theorem Examples
Divide and Conquer Unrolling Examples
Integer Multiplication
Maxima Set
Searching Algorithms
Binary Search
Graph Breadth-First Search (BFS)
Graph Depth-First Search (DFS)
Sorting Algorithms
Bubble Sort
Merge Sort
Selection Sort
Trivals
Count Character
Dijkstras Shortest Path
MST - Kruskal's Algorithm
MST - Prim's Algorithm
Range Query in BST
Greedy Algorithm
Data Structures
Abstract Data Type (ADT)
ADT - Binary Tree
ADT - Disjoint Set
ADT - Graph
ADT - Map
ADT - Priority Queue
ADT - Set
ADT - Tree
AVL Tree
Binary Search Tree (BST)
Hash Table
Heap
Linked List
Big-O Notation and Algorithm Complexities
Data Structure and Algorithms Cheat Sheet
Data Structures and Algorithms
Pseudocode Conventions
Sequence and Series
Database Systems
Database Systems
Relational Database Management System (RDBMS)
Relational Database Normalisation
Operating System (OS)
Bash Scripting
Bash
Bash Basic Operators
Bash Process Management
File Manipulation
File Permission
Network Configuration and Troubleshooting
Regular Expressions (Regex)
Text Processing and Manipulation
Work with Variables
Bit Masking
Character Representation
Data Representation
Number System Conversion
Operating Systems (OS)
Process management and System calls
Processes and Memory Management
Shell
Unix Systems
Web and App Development
DevOps
Version Control
Git
Basic Git Commands
Getting a Git repository
Git
Git Configuration
Git Distributed Workflows
Git Internals 1 - Introduction to Git
Git Internals 2 - Git Objects
Git Internals 3 - Git Branches
Git Internals 4 - Git Merge
Git Transfer Protocol
Record Changes to the Repository
Version Control System
DevOps
Docker
GitHub Actions
YAML
Front-End Development
HTML
Programming Languages
Java
Java API
Java Database Connectivity (JDBC)
Reflection API
Stream API
Java Build Tool
Apache Maven
Apache Maven
Java Frameworks
Spring
IoC Container
Java-Based Configuration 1 - Intro & Bean Annotation
Java-Based Configuration 2 - Dependency Injection (DI) & Wiring
XML-Based Configuration 1 - Intro & Spring Bean
XML-Based Configuration 2 - Dependency Injection (DI) & Wiring
XML-Based Configuration 3 - Autowiring
Spring
Spring Boot
Java Programming Advanced
Annotation
Enum 1 - Enum Class
Enum 2 - Natural Ordering
Exception
Exception Hierarchy
Lambda Expressions
User Input using BufferReader and Scanner
Java Programming Core
Java Collections Framework
Collections Class
Comparable Interface
Comparator Interface
Generics
Java Collections Framework Overview
Vector
Java Data Types
Character
Integer Class
Literals
String Class
StringBuffer
StringBuilder
Type Casting
Java OOP
Abstraction
Class and Object
Dynamic Method Dispatch (Runtime Polymorphism)
Encapsulation
Inheritance
Nested Class
Object Class
Polymorphism
Miscellaneous
Access Modifier
Autoboxing and Unboxing
Do-While Loop
Final Keyword
Static Keyword
Java Standard Edition (Java SE) and Java Programming
JVM Performance Tuning
JVM Performance Tuning
Multithreading Programming
Java Threads and Multiple Threads
Thread Safety
The Java Platform
Compile Time VS Runtime
How Does Java Work
Java Platform
Java Platform Overview
JIT Compilation and Java bytecode
JVM Class Loader Sub-System
JVM Overview
JVM Runtime Data Area
Java
Software Design Principles and Patterns
Software Design Patterns
Behavioural Patterns
Behavioural Patterns - Memento Pattern
Behavioural Patterns - Observer Pattern
Behavioural Patterns - State Pattern
Behavioural Patterns - Strategy Pattern
Creational Patterns
Creational Patterns - Builder Pattern
Creational Patterns - Factory Method Pattern
Creational Patterns - Prototype Pattern
Creational Patterns - Singleton Pattern
Software Design Patterns
Structural Patterns
Structural Patterns - Adapter Pattern
Structural Patterns - Decorator Pattern
Structural Patterns - Facade Pattern
Code Reviews
GRASP Design Principles
Low Coupling Principle
SOLID Design Principles
Software Development Life Cycle (SDLC)
Analysis Modelling
Analysis Modelling
Behavioural Modelling
Behavioural State Machine
Class Responsibility Collaboration (CRC) Cards
Functional Modelling
Structural Modelling
UML Diagrams
UML - Activity Diagram
UML - Class Diagram
UML - Use Case Diagram
UML Diagrams
UML-Sequence Diagram
Design
Implementation
Planing
Software Development Life Cycle (SDLC)
Software Development Methodologies
Software Requirement Engineering
Coupling and Cohesion
Dependency
Web and Application Development
CODE_OF_CONDUCT
Contributor Manual
Design Specifications
First Time Contributor
Tired?
Wiki Design Principles
Home
❯
tags
❯
Tag: Open
Tag: Open
1 item with this tag.
Mar 18, 2025
SOLID Design Principles
Design_Principle
Design_Pattern
Dependency
Maintainability
Reusability
Scalability
Loose_Coupling
Single_Responsibility_Principle_SRP
Open/Closed_Principle_OCP
Liskov_Substitution_Principle_LSP
Interface_Segregation_Principle_ISP
Dependency_Inversion_Principle_DIP
SOFT2201