𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Software Test Attacks to Break Mobile and Embedded Devices

✍ Scribed by Jon Duncan Hagar


Publisher
Chapman and Hall/CRC
Year
2013
Tongue
English
Leaves
364
Series
Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of Β«smartΒ» devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test.
The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.


πŸ“œ SIMILAR VOLUMES


Testing Embedded Software
✍ Bart Broekman, Edwin Notenboom πŸ“‚ Library πŸ“… 2003 πŸ› Addison-Wesley 🌐 English

Professional software testers Broekman and Notenboom provide an overview of testing strategies used in a range of industries. They cover testing techniques as well as institutional organization and infrastructure issues. The emphasis is on the organizational level of the entire testing process. Topi

Embedded Systems Architecture: Design an
✍ Daniele Lacamera πŸ“‚ Library πŸ“… 2023 πŸ› Packt Publishing 🌐 English

<p><span>Design safe and reliable software for embedded systems and explore the internals of device drivers, RTOS, and TEE</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Identify and overcome challenges in embedded environments</span></span></li><li><span><span>Understand and implem

Embedded Systems Architecture: Design an
✍ Daniele Lacamera πŸ“‚ Library πŸ› Packt Publishing 🌐 English

<p><span>Design safe and reliable software for embedded systems and explore the internals of device drivers, RTOS, and TEE</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Identify and overcome challenges in embedded environments</span></span></li><li><span><span>Understand and implem

Embedded Java Security: Security for Mob
✍ Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua, πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book pro

Embedded Java Security: Security for Mob
✍ Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua πŸ“‚ Library πŸ“… 2007 πŸ› Springer 🌐 English

This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book pro