Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 5: Fundamental Metrics for Software Testing
Table 5.1: Severity Metrics and Ranking Criteria
Table 5.2: Bug Find Rates and Costs, Week 1
Table 5.3: Bug Find Rates and Costs, Week 4
Table 5.4: Relative Seriousness (Composition) of Bugs Found
Table 5.5: Determining If the Test Effort Was Adequate
Chapter 6: The Test Inventory
Table 6.1: Comparison of Two Releases of the Same Application
Chapter 7: How to Build a Test Inventory
Table 7.1: Preliminary Test Inventory from the Billing System Example, Sorted by PDR
Table 7.2: Preliminary Billing Inventory with the Interview Input, Dependencies, Environmental Description, and Test Requirements
Table 7.3: Preliminary Inventory from a Web Project
Table 7.4: Environment Description Matrix
Chapter 8: Tools to Automate the Test Inventory
Table 8.1: Preliminary Inventory from a Web Project
Chapter 9: Risk Analysis
Table 9.1: MITs Rank Index Description and Criteria
Table 9.2: MITs Risk Criteria Samples
Chapter 10: Applied Risk Analysis
Table 10.1: Sample Preliminary Inventory with Ranking
Table 10.2: Data from the MITs Totals Worksheet
Table 10.3: Tester's Paradise Test Sizing Worksheet
Chapter 12: Applied Path Analysis
Table 12.1: Tester's Paradise Test Inventory
Table 12.2: Record from Portable System Monitor
Table 12.3: Sample Test Inventory 3
Chapter 13: Data Analysis Techniques
Table 13.1: The Credit Authorization Truth Table
Table 13.2: Data Set Validation Table
Table 13.3: Sample Test Inventory 3
Chapter 14: What Our Analysis Tells Us and What's in Store in the Near Future
Table 14.1: The Total Tests Identified for the Effort through MITs Analysis
Table 14.2: The Testers Paradise Release 2.0 Sizing Worksheet with MITs
Previous page
Table of content
Next page
Software Testing Fundamentals: Methods and Metrics
ISBN: 047143020X
EAN: 2147483647
Year: 2005
Pages: 132
Authors:
Marnie L. Hutcheson
BUY ON AMAZON
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Using Keys and Constraints to Maintain Database Integrity
Working with Comparison Predicates and Grouped Queries
Working with SQL JOIN Statements and Other Multiple-table Queries
Understanding Triggers
A Practitioners Guide to Software Test Design
Boundary Value Testing
Use Case Testing
When to Stop Testing
Section V - Some Final Thoughts
Appendix A Brown & Donaldson Case Study
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Analysis and Design
The Test Organization
Improving the Testing Process
Appendix E Simplified Unit Test Plan
The Complete Cisco VPN Configuration Guide
Overview of VPNs
Packet Authentication
ISAKMP/IKE Phase 2
WebVPN Remote Access
PIX Deployment Scenarios
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 33. Georeference an Arbitrary Tourist Map
Hack 67. Seamless Data Download from the USGS
Hack 74. Plot Wireless Network Viewsheds with GRASS
Hacks 78-86
Hack 78. What to Do if Your Government Is Hoarding Geographic Data
802.11 Wireless Networks: The Definitive Guide, Second Edition
11 Network Operations
11g: The Extended-Rate PHY (ERP)
11 Hardware
1X on the AirPort
Planning Access-Point Placement
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies