Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: The State of Software Testing Today
Some of the Standards That Have Improved Software and Systems
Chapter 3: Approaches to Managing Software Testing
Assumption #1. The developers have unit-tested the code.
Chapter 4: The Most Important Tests (MITs) Method
Fact: Maturity Is Independent of Method
Agile Development Values
My Perspective on DSDM
eXtreme Programming (XP): A Thumbnail Sketch
Chapter 7: How to Build a Test Inventory
The Expendable Tester Ploy
About "Big Bang" Efforts
Chapter 8: Tools to Automate the Test Inventory
The Office Tools: Collaboration and High-Function Web Sites
Testing Is Not a Project-Or Is It?
Fundamental Principle: Never Rekey Data
Chapter 9: Risk Analysis
Reproducibility and Savings Estimates
Chapter 10: Applied Risk Analysis
Which Comes First? The Analysis or the Plan?
Some Thoughts about Test Coverage
Chapter 11: Path Analysis
In the case statement, the number of paths required for 100 percent coverage:
If-then-else-structure paths for 100 percent coverage:
Chapter 12: Applied Path Analysis
It turns out that it is not a trivial case
Tip for Microsoft Word
Chapter 13: Data Analysis Techniques
A Survivalist View of Boundary Analysis
Drop-Down Selection Boxes Only Keep Out Honest People
Previous page
Table of content
Software Testing Fundamentals: Methods and Metrics
ISBN: 047143020X
EAN: 2147483647
Year: 2005
Pages: 132
Authors:
Marnie L. Hutcheson
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Process for Assessing Risk
Four Ways in Which You Can Respond to Risk
Basic Security Principles
The Goals and Objectives of a Risk Assessment
SIRT Incident Report
Documenting Software Architectures: Views and Beyond
Overview
Deployment Style
Implementation Style
Summary Checklist
Allocation Deployment View
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity II
Internet Security Systems RealSecure
Snort
NFR Security
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Six Things Managers Must Do: How to Support Lean Six Sigma
Java Concurrency in Practice
Atomicity
Delegating Thread Safety
Why are GUIs Single-threaded?
Other Liveness Hazards
Testing for Correctness
Python Standard Library (Nutshell Handbooks) with
The md5 Module
The zlib Module
The code Module
Data Representation
The posix Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies