This updated and reorganized fourth edition of Software Testing: A Craftsman's Approach applies the strong mathematics content of previous editions to a coherent treatment of Model-Based Testing for both code-based (structural) and specification-based (functional) testing. These techniques are extended from the usual unit testing discussions to full coverage of less understood levels integration and system testing.
The Fourth Edition:
* Emphasizes technical inspections and is supplemented by an appendix with a full package of documents required for a sample Use Case technical inspection
* Introduces an innovative approach that merges the Event-Driven Petri Nets from the earlier editions with the "Swim Lane" concept from the Unified Modeling Language (UML) that permits model-based testing for four levels of interaction among constituents in a System of Systems
* Introduces model-based development and provides an explanation of how to conduct testing within model-based development environments
* Presents a new section on methods for testing software in an Agile programming environment
* Explores test-driven development, reexamines all-pairs testing, and explains the four contexts of software testing
Thoroughly revised and updated, Software Testing: A Craftsman’s Approach, Fourth Edition is sure to become a standard reference for those who need to stay up to date with evolving technologies in software testing. Carrying on the tradition of previous editions, it will continue to serve as a valuable reference for software testers, developers, and engineers.
This updated and reorganized fourth edition of Software Testing: A Craftsman's Approach applies the strong mathematics content of previous editions to a coherent treatment of…
This guide demonstrates how to secure sensitive data and comply with internal and eternal audit regulations using "Oracle 10g and 11g". It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that should be taken to enable, configure, or administer security-related features. It includes best practices in securing Oracle and on Oracle security options and products. By providing specific instructions and examples this book bridges the gap between the individuals who install and configure a security feature and those who secure and audit it.
Формат: 18 см x 26 см.
This guide demonstrates how to secure sensitive data and comply with internal and eternal audit regulations using "Oracle 10g and 11g". It provides the hands-on guidance required…
"Software Architecture Design Patterns in Java" provides a detailed explanation of how to apply design patterns and develop software architectures. Offers in-depth examples and presents 42 design patterns
"Software Architecture Design Patterns in Java" provides a detailed explanation of how to apply design patterns and develop software architectures. Offers in-depth examples and…
This book illustrates how to develop the related standards, procedures, and guidelines for implementing policy. Each chapter provides advice on the structural mechanics of the various documents as well as an example of each form. This new edition
This book illustrates how to develop the related standards, procedures, and guidelines for implementing policy. Each chapter provides advice on the structural mechanics of the…
Until now, it has been difficult to find the right source of information on LDAP and directory server implementations: books on the subject are overly product-specific, and a search on the Web results in information overload. The ABCs of LDAP: How
Until now, it has been difficult to find the right source of information on LDAP and directory server implementations: books on the subject are overly product-specific, and a…
The Ethical Hack: A Framework for Business Value Penetration Testing lays out the underlying methodologies and concepts required for performing successful and valuable penetration testing. The author discusses the process of penetration
The Ethical Hack: A Framework for Business Value Penetration Testing lays out the underlying methodologies and concepts required for performing successful and valuable…
Like no other book before it, "Global Information Warfare" illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and of their dependence on advances in technology. This book sheds light on the "Achilles heel" that these dependencies on advanced computing and information technologies create. It underscores how hostile countries, business competitors, terrorists, hacktivists and others are waging Information Warfare (IW) against their adversaries. This may sound like science fiction, but it has been happening for years and continues to this day-anyone and everyone can be a target and a casualty.
Like no other book before it, "Global Information Warfare" illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and…