Computer-based testing

Results: 254



#Item
101Object-oriented programming / Smalltalk / Self / Object / Reification / Software design pattern / KeY / Object database / Data /  context and interaction / Software engineering / Computer programming / Computing

Object-Oriented Legacy System Trace-based Logic Testing In Proceedings of European Conference on Software Maintenance and Reengineering (CSMR[removed]St´ephane Ducasse LISTIC, Universit´e de Savoie

Add to Reading List

Source URL: scg.unibe.ch

Language: English - Date: 2006-04-30 08:07:20
102Theoretical computer science / Software development process / Mathematical proof / KeY / B-Method / Scientific modelling / Model-based testing / Formal verification / Formal methods / Science / Software development

Formal Methods in Industry: Achievements, Problems, Future Jean-Raymond Abrial Swiss Federal Institute of Technology Zurich [removed]

Add to Reading List

Source URL: www.irisa.fr

Language: English - Date: 2006-05-20 23:41:24
103Knowledge / Actuary / Insurance / Occupations / Risk / Final examination / Institute and Faculty of Actuaries / Society of Actuaries / Actuarial exam / Education / Examinations / Actuarial science

2015 EXAMINATION SCHEDULE Exams for Online Courses 1 and 2 by Computer-Based Testing EXAM DATES DURATION

Add to Reading List

Source URL: www.casact.org

Language: English - Date: 2015-01-08 13:08:10
104Computer network security / Software testing / Metasploit Project / Rapid7 / Penetration test / Exploit / HD Moore / Software / Computer security / System software

case study | Offensive Security Saves Time on Penetration Testing Engagements with Rapid7 Metasploit Pro Choosing Tools for the Security Consulting Practice Offensive Security offers performance-based security certifica

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:54:09
105Software / Model checkers / Software testing / Model checking / Simulink / Java Pathfinder / SPIN model checker / Constraint automaton / Software verification / Automata theory / Theoretical computer science / Computing

1 Rapid Property Specification and Checking for Model-Based Formalisms Daniel Balasubramanian, Gabor Pap, Harmon Nine, Gabor Karsai

Add to Reading List

Source URL: www.isis.vanderbilt.edu

Language: English - Date: 2011-04-21 15:55:05
106Computer network security / Crime prevention / National security / Software testing / Cyc / Vulnerability / Network vulnerability scan / Computer network / Douglas Lenat / Security / Cyberwarfare / Computer security

A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment Blake Shepard, Cynthia Matuszek, C. Bruce Fraser, William Wechtenhiser, David Crabbe, Zelal Güngördü, John Jantos,

Add to Reading List

Source URL: www.cyc.com

Language: English - Date: 2013-01-04 15:23:34
107Computer network security / Software testing / Rapid7 / Electronic commerce / Metasploit Project / Vulnerability / Computer security / Software / System software

case study | Prairie North Regional Health Authority Uses Automated Security Reporting to Free Up Resources Saskatchewan-based Prairie North Regional Health Authority (PNRHA) knows firsthand the benefits that a vulnerab

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:54:10
108Arguments / Critical thinking / Educational psychology / Education reform / Charles Sanders Peirce / Inquiry-based learning / Abductive reasoning / Psychology / Education / Behavior / Knowledge

Toward supporting hypothesis formation and testing in an interpretive domain Vincent Aleven1 and Kevin Ashley2 1 Human-Computer Interaction Institute

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-11-26 09:13:08
109Computing / Global Information Assurance Certification / Penetration test / White hat / SANS Institute / Computer security / Hacking / Computer network security

Penetration Testing & Ethical Hacking Graduate Certificate The SANS Technology Institute’s post-baccalaureate certificate program in Penetration Testing & Ethical Hacking is based entirely upon four courses already ava

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2014-03-27 18:16:16
110Knowledge / System usability scale / Likert scale / Human factors / Questionnaire for User Interaction Satisfaction / Scale / User / Usability testing / Component-based usability testing / Usability / Science / Human–computer interaction

SUS - A quick and dirty usability scale John Brooke Redhatch Consulting Ltd., 12 Beaconsfield Way, Earley, READING RG6 2UX United Kingdom

Add to Reading List

Source URL: hell.meiert.org

Language: English - Date: 2014-08-19 05:38:44
UPDATE