售价: ¥536.00 待定配送费
此商品不能使用“一键下单”
前翻 后翻
正在播放... 已暂停   您正在聆听的 Audible 音频版本的样品。
了解更多信息
查看全部 2 张图片

How to Break Software: A Practical Guide to Testing (英语) 平装 – 2002年5月19日

| 天天低价·正品质优
|
分享
广告

显示所有 格式和版本 隐藏其他格式和版本
亚马逊价格
全新品最低价 非全新品最低价
平装
¥536.00
¥536.00
 

click to open popover

无需Kindle设备,下载免费Kindle阅读软件,即可在您的手机、电脑及平板电脑上畅享阅读。

  • iPhone/iPad/Mac
  • Android手机或平板电脑

请输入您的手机号码,获取Kindle阅读软件的下载链接。



基本信息

  • 出版社: Pearson; 1 (2002年5月19日)
  • 平装: 208页
  • 语种: 英语
  • ISBN: 0201796198
  • 条形码: 9780201796193
  • 商品尺寸: 17.3 x 1.8 x 22.9 cm
  • 商品重量: 363 g
  • ASIN: 0201796198
  • 用户评分: 分享我的评价
  • 亚马逊热销商品排名: 图书商品里排第1,152,219名 (查看图书商品销售排行榜)
  • 您想告诉我们您发现了更低的价格?

商品描述

作者简介

James A. Whittaker is a well-known speaker and consultant, as well as seasoned professor.

目录



Preface.


Dedication.


Chapter Summaries.

I. INTRODUCTION.

1. A Fault Model to Guide Software Testing.

The Purpose of Software Testing.

Understanding Software Behavior.

Understanding Software's Environment.

The Human User.

File System User.

The Operating System User.

The Software User.

Understanding Software's Capabilities.

Testing Input.

Testing Output.

Testing Data.

Testing Competition.

Summary and Conclusion.

Exercises.

References.

II. USER INTERFACE ATTACKS.

2. Testing from the User Interface: Inputs and Outputs.

Using the Fault Model to Guide Testing.

Exploring the Input Domain.

First Attack: Apply inputs that force all the error messages to occur.

Second Attack: Apply inputs that force the software to establish default values.

Third Attack: Explore allowable character sets and data types.

Fourth Attack: Overflow input buffers.

Fifth Attack: Find inputs that may interact and test various combinations of their values.

Sixth Attack: Repeat the same input or series of inputs numerous times.

Exploring Outputs.

Seventh Attack: Force different outputs to be generated for each input.

Eighth Attack: Force invalid outputs to be generated.

Ninth Attack: Force properties of an output to change.

Tenth Attack: Force the screen to refresh.

Conclusion.

Exercises.

References.

3. Testing from the User Interface: Data and Computation.

Testing Inside the Box.

Exploring Stored Data.

Eleventh Attack: Apply inputs using a variety of initial conditions.

Twelfth Attack: Force a data structure to store too many/too few values.

Thirteenth Attack: Investigate alternate ways to modify internal data constraints.

Exploring Computation and Feature Interaction.

Fifteenth Attack: Force a function to call itself recursively.

Sixteenth Attack: Force computation results to be too large or too small.

Seventeenth Attack: Find features that share data or interact poorly.

Conclusion.

Exercises.

III. SYSTEM INTERFACE ATTACKS.

4. Testing from the File System Interface.

Attacking Software from the File System Interface.

Media-based Attacks.

First Attack: Inject faults that simulate memory access problems.

Second Attack: Inject faults that simulate network problems.

Third Attack: Damage the media.

File-based Attacks.

Fourth Attack: Assign an invalid file name.

Fifth Attack: Vary file access permissions.

Sixth Attack: Vary/corrupt file contents.

Exercises.

5. Testing from the Software/OS Interface.

Attacking Software from Software Interfaces.

Record-and-Simulate Attacks.

Observe-and-Fail Attacks.

Conclusion.

Exercises.

IV. CONCLUSION.

6. Some Parting Advice.

You'll Never Know Everything.

Bug Hunts.

Friday Afternoon Bug Fests.

Conclusion.

References.

APPENDICES.

Annotated Glossary of Programming Terms.

Appendix A. Testing Exception and Error Cases Using Runtime Fault Injection.

Introduction.

A Mechanism for Runtime Fault Injection.

Fault Selection.

Conclusions.

Acknowledgments.

References.

Appendix B. Using HEAT: The Hostile Environment Application Tester.

Canned HEAT User Guide.

The Application Band.

The Monitor Band.

Fault Injection Bands and Their Functionality.

The Network Band.

Disk Storage.

Memory.

Appendix C. What is Software Testing? And Why is it so Hard?

Introduction.

The Software Testing Process.

Phase One: Modeling the Software's Environment.

Phase Two: Selecting Test Scenarios.

Phase Three: Running and Evaluating Test Scenarios.

Phase Four: Measuring Testing Progress.

Conclusion.

References.

The Software Testing Problem.


看过此商品后顾客买的其它商品?


买家评论

目前还没有用户评论
与其他买家分享您的想法

此商品在美国亚马逊上最有用的商品评论

美国亚马逊: 4.0 颗星,最多 5 颗星 27 条评论
Fauzia Lala
5.0 颗星,最多 5 颗星most thorough and organized book for beginners
2008年9月23日 - 已在美国亚马逊上发表
已确认购买
1 个人发现此评论有用.
Einzige
4.0 颗星,最多 5 颗星Great for Beginners
2005年4月16日 - 已在美国亚马逊上发表
已确认购买
8 个人发现此评论有用.
The Freelancer
5.0 颗星,最多 5 颗星Thanks.
2018年3月17日 - 已在美国亚马逊上发表
已确认购买
Caterina Pryde
4.0 颗星,最多 5 颗星Great for beginner or intermediate
2007年4月23日 - 已在美国亚马逊上发表
已确认购买
3 个人发现此评论有用.
mschu
5.0 颗星,最多 5 颗星Great book for IT professionals
2012年7月3日 - 已在美国亚马逊上发表
已确认购买