Professional software testers Broekman and Notenboom provide an overview of testing strategies used in a range of industries. They cover testing techniques as well as institutional organization and infrastructure issues. The emphasis is on the organizational level of the entire testing process. Topi
Software Test Attacks to Break Mobile and Embedded Devices
β Scribed by Jon Duncan Hagar
- Publisher
- Chapman and Hall/CRC
- Year
- 2013
- Tongue
- English
- Leaves
- 364
- Series
- Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of Β«smartΒ» devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test.
The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.
π SIMILAR VOLUMES
<p><span>Design safe and reliable software for embedded systems and explore the internals of device drivers, RTOS, and TEE</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Identify and overcome challenges in embedded environments</span></span></li><li><span><span>Understand and implem
<p><span>Design safe and reliable software for embedded systems and explore the internals of device drivers, RTOS, and TEE</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Identify and overcome challenges in embedded environments</span></span></li><li><span><span>Understand and implem
This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book pro
This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book pro