Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: The State of Software Testing Today
Some of the Standards That Have Improved Software and Systems
Chapter 3: Approaches to Managing Software Testing
Assumption #1. The developers have unit-tested the code.
Chapter 4: The Most Important Tests (MITs) Method
Fact: Maturity Is Independent of Method
Agile Development Values
My Perspective on DSDM
eXtreme Programming (XP): A Thumbnail Sketch
Chapter 7: How to Build a Test Inventory
The Expendable Tester Ploy
About "Big Bang" Efforts
Chapter 8: Tools to Automate the Test Inventory
The Office Tools: Collaboration and High-Function Web Sites
Testing Is Not a Project-Or Is It?
Fundamental Principle: Never Rekey Data
Chapter 9: Risk Analysis
Reproducibility and Savings Estimates
Chapter 10: Applied Risk Analysis
Which Comes First? The Analysis or the Plan?
Some Thoughts about Test Coverage
Chapter 11: Path Analysis
In the case statement, the number of paths required for 100 percent coverage:
If-then-else-structure paths for 100 percent coverage:
Chapter 12: Applied Path Analysis
It turns out that it is not a trivial case
Tip for Microsoft Word
Chapter 13: Data Analysis Techniques
A Survivalist View of Boundary Analysis
Drop-Down Selection Boxes Only Keep Out Honest People
Previous page
Table of content
Software Testing Fundamentals: Methods and Metrics
ISBN: 047143020X
EAN: 2147483647
Year: 2005
Pages: 132
Authors:
Marnie L. Hutcheson
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Security Architecture and Design
Physical (Environmental) Security
Understanding Certification and Accreditation
Appendix B Glossary of Terms and Acronyms
C++ GUI Programming with Qt 3
Hello Qt
Event Processing
Reimplementing Event Handlers
Painting with QPainter
Drag and Drop
SQL Hacks
Hack 23. Second Tuesday of the Month
Hack 43. Add Navigation Features to Web Applications
Hack 87. Generate a Calendar
Hack 90. Implement Application-Level Accounts
Hack 91. Export and Import Table Definitions
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity I
Unauthorized Activity II
Incident Response
Laws, Standards, and Organizations
Extending and Embedding PHP
Life Cycles
Declaring and Accessing INI Settings
Extension Generators
Exceptions
Code Pantry
Special Edition Using FileMaker 8
Defining and Working with Fields
Relational Integrity
Importing from an XML Data Source
FileMaker and Web Services
FileMaker Extra: Soliant Development Standards
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies