Linked e-resources
Details
Table of Contents
Preface; Acknowledgments; Contents; About the Editors; About the Book; 1 Understanding Test Debt; Abstract; 1 Introduction; 1.1 Technical Debt; 1.2 Importance of Test Debt; 1.3 General Causes of Test Debt; 2 Classification of Test Debt; 2.1 Unit Testing; 2.2 Exploratory Testing; 2.3 Manual Testing; 2.4 Automation Testing; 3 Managing Test Debt; 3.1 General Process for Repaying Test Debt; 3.2 Strategic Approaches Towards Managing Test Debt; 3.2.1 Applying Effective Coding Practices for Test Code; 3.2.2 Applying Effective Testing Practices; 4 Case Studies; 4.1 Case Study I; 4.2 Case Study II
5 Future DirectionsReferences; 2 Agile Testing; Abstract; 1 Introduction; 2 Traditional Testing Practices; 3 Agile-based Software Engineering; 3.1 Agile Manifesto [3]; 3.2 Agile Processes; 3.3 Extreme Programming (XP); 3.4 Scrum; 4 Agile-based Testing; 5 Illustration; 6 Engineering of Agile Testing; 6.1 Continuous Integration; 6.2 Automated Build System; 7 Agile Testing: An Analysis; 7.1 Comparison of Agile and Spiral Model; 7.2 Advantages of Agile Testing; 7.3 Disadvantages of Agile Testing; 8 Conclusion; References; 3 Security Testing; Abstract; 1 Introduction; 2 Current Security Challenges
2.1 Software Complexity2.2 Third-Party Code; 2.3 Dynamic Security Policies; 3 Significance of Security Testing; 3.1 Software Industry Perspective; 3.1.1 Preserved Brand Image; 3.1.2 Reduced Time to Market; 3.1.3 Lower Development Costs; 3.2 Client Perspective; 3.2.1 Attack Resistant Product; 3.2.2 Better Quality Software; 3.2.3 Minimizes Extra Cost; 3.3 End-user Perspective; 3.3.1 Uninterrupted Service; 3.3.2 Minimizes Chance of Loss of Personal Data and Credentials; 4 Secure Software Development Life Cycle; 4.1 Security Requirement; 4.2 Secure Design; 4.3 Secure Coding; 4.4 Security Testing
4.5 Secure Deployment and Maintenance5 Security Issues and Related Concerns; 5.1 Cross-Site Scripting (XSS); 5.2 SQL Injection (SQLI); 5.3 Cross-Site Request Forgery (CSRF); 5.4 Denial of Services (DoS); 5.5 Buffer Overflow (BOF); 5.6 File Inclusion; 6 Security Testing Approaches; 6.1 Static Security Testing; 6.1.1 Code Review; 6.1.2 Model Checking; 6.1.3 Symbolic Execution; 6.1.4 Case Study; 6.2 Dynamic Security Testing; 6.2.1 Fuzz Testing; 6.2.2 Concolic Testing; 6.2.3 Search-Based Security Testing; 6.2.4 Case Study; 7 Phase Embedded Security Testing; 8 A Discussion on Industry Practices
9 Industry Requirement and Future Trend10 Conclusion; References; 4 Uncertainty in Software Testing; Abstract; 1 Introduction; 2 Uncertainty Preliminaries; 2.1 Types of Uncertainty; 2.2 Uncertainty Principle; 3 Sources of Uncertainty; 4 Uncertainties in Testing Process; 4.1 Test Planning; 4.2 Test Selection and Classification; 4.3 Test Execution; 4.4 Error Tracing; 5 Prioritization of Uncertainty; 5.1 Distributed Transactions Example; 5.2 Correctness to Utility; 5.3 Open Loop to Closed Loop; 5.4 Precise to Approximate; 6 Modeling Uncertainties; 6.1 Bayesian Approach
5 Future DirectionsReferences; 2 Agile Testing; Abstract; 1 Introduction; 2 Traditional Testing Practices; 3 Agile-based Software Engineering; 3.1 Agile Manifesto [3]; 3.2 Agile Processes; 3.3 Extreme Programming (XP); 3.4 Scrum; 4 Agile-based Testing; 5 Illustration; 6 Engineering of Agile Testing; 6.1 Continuous Integration; 6.2 Automated Build System; 7 Agile Testing: An Analysis; 7.1 Comparison of Agile and Spiral Model; 7.2 Advantages of Agile Testing; 7.3 Disadvantages of Agile Testing; 8 Conclusion; References; 3 Security Testing; Abstract; 1 Introduction; 2 Current Security Challenges
2.1 Software Complexity2.2 Third-Party Code; 2.3 Dynamic Security Policies; 3 Significance of Security Testing; 3.1 Software Industry Perspective; 3.1.1 Preserved Brand Image; 3.1.2 Reduced Time to Market; 3.1.3 Lower Development Costs; 3.2 Client Perspective; 3.2.1 Attack Resistant Product; 3.2.2 Better Quality Software; 3.2.3 Minimizes Extra Cost; 3.3 End-user Perspective; 3.3.1 Uninterrupted Service; 3.3.2 Minimizes Chance of Loss of Personal Data and Credentials; 4 Secure Software Development Life Cycle; 4.1 Security Requirement; 4.2 Secure Design; 4.3 Secure Coding; 4.4 Security Testing
4.5 Secure Deployment and Maintenance5 Security Issues and Related Concerns; 5.1 Cross-Site Scripting (XSS); 5.2 SQL Injection (SQLI); 5.3 Cross-Site Request Forgery (CSRF); 5.4 Denial of Services (DoS); 5.5 Buffer Overflow (BOF); 5.6 File Inclusion; 6 Security Testing Approaches; 6.1 Static Security Testing; 6.1.1 Code Review; 6.1.2 Model Checking; 6.1.3 Symbolic Execution; 6.1.4 Case Study; 6.2 Dynamic Security Testing; 6.2.1 Fuzz Testing; 6.2.2 Concolic Testing; 6.2.3 Search-Based Security Testing; 6.2.4 Case Study; 7 Phase Embedded Security Testing; 8 A Discussion on Industry Practices
9 Industry Requirement and Future Trend10 Conclusion; References; 4 Uncertainty in Software Testing; Abstract; 1 Introduction; 2 Uncertainty Preliminaries; 2.1 Types of Uncertainty; 2.2 Uncertainty Principle; 3 Sources of Uncertainty; 4 Uncertainties in Testing Process; 4.1 Test Planning; 4.2 Test Selection and Classification; 4.3 Test Execution; 4.4 Error Tracing; 5 Prioritization of Uncertainty; 5.1 Distributed Transactions Example; 5.2 Correctness to Utility; 5.3 Open Loop to Closed Loop; 5.4 Precise to Approximate; 6 Modeling Uncertainties; 6.1 Bayesian Approach