Flylib.com
Software Testing Fundamentals: Methods and Metrics
Software Testing Fundamentals: Methods and Metrics
ISBN: 047143020X
EAN: 2147483647
Year: 2005
Pages: 132
Authors:
Marnie L. Hutcheson
BUY ON AMAZON
Table of Contents
BackCover
Software Testing Fundamentals-Methods and Metrics
Introduction
Industry and Technology Trends: Why I Think It s Time to Publish This Book
Changing Times
Scope of This Book and Who Will Find It Useful
How This Book Is Organized
The Standard for Definitions in This Book
Chapter 1: The State of Software Testing Today
A Quick Look at How We Got Where We Are
The Challenges a Tester Faces Today
Summary
Chapter 2: Maintaining Quality Assurance in Today s Software Testing Environment
What s Wrong with This Picture?
Problems with Traditional Quality Assurance
What s Not Working: The Traditional Tools for Controlling Quality
Solution: Improving the Quality Process
Summary
Chapter 3: Approaches to Managing Software Testing
Some Myths about Art, Science, and Software
The Engineering Approach
The Eclectic Approach to Integration and Testing: Balancing Art and Engineering
Current Testing Strategies
The Best Approach
Summary
Chapter 4: The Most Important Tests (MITs) Method
Overview of MITs
The Steps for the MITs Method
Real-World Example: Heavyweight, Middleweight, and Lightweight Development Efforts
Summary
Chapter 5: Fundamental Metrics for Software Testing
Measures and Metrics
What to Measure in Software Testing
Summary
Chapter 6: The Test Inventory
The Goal: A Successful Test Effort
Planning for Adequate Testing: How Much Is Enough?
Determining the Scope of Testing: How Big Is It?
Reasons for Using an Inventory
The Sources of the Tests on the Inventory
Summary
Chapter 7: How to Build a Test Inventory
Identifying and Listing the Test Environments
Adding Detail and Process Layers
Summary
For Further Exploration
Chapter 8: Tools to Automate the Test Inventory
The Evolving Test Inventory
Summary
Chapter 9: Risk Analysis
The Risk Analysis Process in Brief
Benefits of Risk Analysis
Project Management Strategies and Risk
MITs Risk Analysis
Case Study: The 401(k) Web Project
Summary
Chapter 10: Applied Risk Analysis
Applying Risk Analysis to the Inventory
Risk Criteria for Picking Tests
Summary
Chapter 11: Path Analysis
The Legend of the Maze of the Minotaur
Calculating the Number of Paths through a System
Summary
Path Analysis Samples for Further Exploration
Exercise 1
Exercise 2
Exercise 3
Exercise 4
Chapter 12: Applied Path Analysis
Divide and Conquer
The Paths Not Counted
Building Path Test Estimates Quickly
Path and Data Dependencies
Summary
Chapter 13: Data Analysis Techniques
Testing Data Input by Users (the GUI)
Boundary Value Analysis
Caveats
Summary
Chapter 14: What Our Analysis Tells Us and What s in Store in the Near Future
Testing: The Next Generation
Appendix A: Answers to Exercises
Chapter 11: Path Analysis
Exercise 2
Exercise 3
Exercise 4
Appendix B: Software Testing Questionnaire, Survey and Results
The Test Questionnaire
The State of Knowledge in Commercial Software Testing
Results of the Seminar Evaluations
Results of the Written Test Survey
Results of the Voice Survey
Conclusions Drawn from the Surveys
Appendix C: Test Collateral Samples and Templates
Sample Project Inventory and Test Questionnaire for the Interviews
References
Glossary
D-E
F-I
K-P
Q-S
T-U
V-W
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
List of Sidebars
Software Testing Fundamentals: Methods and Metrics
ISBN: 047143020X
EAN: 2147483647
Year: 2005
Pages: 132
Authors:
Marnie L. Hutcheson
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to a Microsoft Excel Workbook
Connecting to a Named Instance of SQL Server or Microsoft Data Engine (MSDE)
Searching and Analyzing Data
Finding Rows in a DataTable
Listing Installed OLE DB Providers
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 1. Start and Navigate Outlook
Formatting and Organizing Text
Using Special Document Formats, Columns, and Mail Merge
Business Running Case
Objective 13. Group Data and Calculate Statistics in a Query
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 56. Send Power over Your Ethernet
Hack 75. Capture Wireless Users on a Small Scale
Hack 89. Cut a Cable Omni Antenna
Hacks 94100: Introduction
Section A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Firewall Technologies
Defining an Authentication Server
Summary
Transparent Firewalls
QoS
Comparing, Designing, and Deploying VPNs
Deploying AToM Pseudowires
Using Clientless SSL Remote Access VPNs (WebVPN) on the Cisco VPN 3000 Concentrator
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
Designing and Building SSL Remote Access VPNs (WebVPN)
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Oracle and PL/SQL
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies