Software testing

Results: 9347



#Item
701Software / Application software / Software testing / Testbed / ROOT / Experiment

PDF Document

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2009-06-02 13:53:59
702

Trainings Systematic and automatic software testing of ECUs with ECU-TEST Our training courses provide a comprehensive insight into the world of test automation with ECU-TEST,

Add to Reading List

Source URL: www.tracetronic.com

Language: English
    703

    This article is provided courtesy of STQE, the software testing and quality engineering magazine. Process & Techniques INFO TO GO ■

    Add to Reading List

    Source URL: www.wirfs-brock.com

    Language: English - Date: 2005-03-22 23:33:30
      704

      Help, Help, I’m Being Suppressed! The Significance of Suppressors in Software Testing Alex Groce Chaoqiang Zhang

      Add to Reading List

      Source URL: www.cs.utah.edu

      Language: English - Date: 2013-09-21 15:08:13
        705Formal methods / Mathematics / Software engineering / Software development / Model checking / Graph rewriting / RCOS

        Svetlana Arifulina, Chiristian Soltenborn and Gregor Engels. Coverage Criteria for Testing DMM Specifications

        Add to Reading List

        Source URL: cs.ioc.ee

        Language: English - Date: 2012-03-18 17:20:03
        706Computer network security / Software testing / National security / Secure communication / Vulnerability / Application security / Software bug / Threat / Cross-site scripting / Cyberwarfare / Computer security / Security

        A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division

        Add to Reading List

        Source URL: cwe.mitre.org

        Language: English - Date: 2006-09-13 14:57:13
        707Cyberwarfare / Concurrency control / Software testing / Lock / OWASP / Vulnerability / Application security / Deadlock / Computing / Computer security / Threads

        CONCURRENCY VULNERABILITIES OWASP BOOKS OWASP Testing Guide : ~NZ$18 + pp

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2011-12-11 14:43:29
        708Computer network security / Software testing / Hacking / Vulnerability / Validation / Computer security / Cyberwarfare / Security

        Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

        Add to Reading List

        Source URL: www.spacios.eu

        Language: English - Date: 2011-12-21 03:32:12
        709Hacking / Software testing / Vulnerability / Image scanner / Network vulnerability scan / Social vulnerability / SAINT / Port scanner / Computer security / Computing / Cyberwarfare

        FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide   Version 1.0

        Add to Reading List

        Source URL: www.fedramp.gov

        Language: English - Date: 2015-06-03 09:58:42
        710Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

        =================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

        Add to Reading List

        Source URL: cwe.mitre.org

        Language: English - Date: 2006-09-13 14:57:16
        UPDATE