Learn more about the V-Shaped Model in Software Engineering.
Also find me here:
Baeldung Author
Albert Stec
Experienced Java Developer with a demonstrated history of working in the information technology and services industry. Strong engineering professional graduated from Rzeszów University of Technology, Poland. I work full-time as a Fullstack Developer with Java and React. On weekends I share my knowledge as Programming Coach during coding bootcamps.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Programming (9)
- Security (7)
- Networking (3)
- Software Architecture (2)
- OS (2)
- Core Concepts (1)
- Computer Vision (1)
Extreme Programming
Filed under Programming
Learn more about Extreme Programming.
Software Engineering: SCRUM Vs. XP
Filed under Programming
Learn more about the difference between SCRUM and XP.
Software Engineering: The Waterfall Model
Filed under Core Concepts
Learn more about the waterfall model
What Is a Keylogger?
Filed under Security
Learn more about keyloggers.
An Introduction to Computer Vision
Filed under Computer Vision
Learn the basics of Computer Vision.
What is CAPTCHA and How Does It Work?
Filed under Security
Learn about CAPTCHA security and how it works.
RSA SecurID Tokens
Filed under Security
Learn more about RSA SecurID Tokens
MD5 vs. SHA Algorithms
Filed under Security
Have a closer look at two cryptographic algorithms: MD5 (message-digest algorithm) and SHA (Secure Hash Algorithm) and how they compare.
Unit Testing vs Test-Driven Development
Filed under Programming
Learn the difference between Unit Tests and Test-Driven Development.
Introduction to SAML
Filed under Security
Learn about SAML 2.0, one of the most common standards used when implementing SSO solutions.
The REST Architecture
Filed under Software Architecture
Learn about the REST architecture and its most common applications.
Technical Debt
Filed under Programming
In this article, we’ll elaborate on technical debt and its dangers.
Symmetric Cryptography vs Asymmetric Cryptography
Filed under Networking
Learn about the difference between symmetric and asymmetric cryptography.
Database Design in a Microservices Architecture
Filed under Software Architecture
Learn about database design in a microservices architecture.
Virtual Memory
Filed under OS
Explore the virtual memory concept in detail.
SSL vs. SSH
Filed under Networking, Security
Understand how the SSH and SSL protocols compare.
Understanding BDD
Filed under Programming
Learn about Behaviour-Drive Development (BDD) and how it differs from TDD
Guide to Single Sign-On (SSO)
Filed under Security
Learn about Single Sign-On in detail.
GIT vs. SVN
Filed under Programming
Explore two most popular version control systems, namely GIT and SVN.
REST vs SOAP
Filed under Programming
Analyze the two most known approaches to building APIs called REST and SOAP.
UDP vs TCP
Filed under Networking
Explore UDP and TCP networking protocols in detail.
Deep Dive into Hashing
Filed under Programming
Dive deeply into the topic of hashing: how it works, hash functions, algorithms, and potential attacks.
How Compilers Work
Filed under OS
Understand the compilation process which converts high-level source code to low-level machine code.