Information Technology Reference
In-Depth Information
[18] James A. Whittaker, What is software
testing? And why is it so hard?
IEEE
Software
(No. 1), 2000, 70-79.
[19] Website that contains the Software
Engineering Institute description
of their Capability Maturity Model
Integration (CMMi): www.sei.cmu.
edu/pub/documents/02.reports/pdf/
02tr011.pdf.
[20] James Bach,
Rapid Software Testing
,
Satisfi ce Inc., www.satisfi ce.com.
[21] The IEEE Computer Society web site
www.ieee.org.
[22] The Tigris Open Source Software
Community project ReadySET web
site http://readyset.tigris.org/.
[23] M. Ramachandran. Requirements-
Driven Software Test: A Process
Oriented Approach,
Software
Engineering Notes
21(4), 1996, 66-70.
[24] Alistair Cockburn,
Writing Effective
Use Cases
. Addison-Wesley, 2001
(ISBN 0-201-702258).
[25] James A. Whittaker,
How To Break
Software: A Practical Guide To
Testing
. Addison-Wesley, 2003 (ISBN
0-201-79619-8).
[26] H.K. Leung, L.A. White, A Study of
Regression Testing.
Proceedings of
the 6th International Conference on
Testing Computer Software
. USPDI,
Washington, D.C., May 1989.
[27] G. Rothermel, M.J. Harrold,
Analyzing Regression Test Selection
Te ch n iques,
IEEE Transactions on
Software Engineering
, 22(8), 1996,
529-551.
[28] John Watkins,
Testing IT: An Off-
the-Shelf Software Testing Process
.
Cambridge University Press, 2001
(Chapter 11,
Regression Testing
, ISBN
0-521-79546-X).
[29] A. Bertolino, M. Marre, Automatic
generation of path covers based on
the control fl ow analysis of computer
programs,
IEEE Transactions on
Software Engineering
, 21(12), 1994,
pp. 885-899.
[30] C.S. Chou, M.W. Du, Improved
Domain Strategies for Detecting Path
Selection Errors. In:
Proceedings
of the Conference on Software
Maintenance
, IEEE Computer Society,
Los Angeles, 1987, pp. 165-173.
[31] P.G. Frankl, E.J. Weyuker, Provable
improvements on branch testing.
IEEE
Transactions on Software Engineering
19(10), 1993.
[32] R.D. Craig, S.P. Jaskiel,
Systematic
Software Testing
. SQE Publishing,
2002 (Chapter 5 section “White Box
Science'', ISBN 1-58053-508-9).
[33] B. Beizer,
Software Testing
Techniques,
2nd Edition. International
Thomson Press, 1990 (Chapter 3
“Flowgraphs and Path Testing'', ISBN
1-85032-880-3).
[34] B. Biezerk,
Black Box Testing
. John
Wiley & Sons, 1995.
[35] R.D. Craig, S.P. Jaskiel,
Systematic
Software Testing
. SQE Publishing,
2002 (Chapter 5 section “Black Box
Art'', ISBN 1-58053-508-9).
[36] B. Beizer,
Software Testing
Techniques,
2nd Edition. International
Thomson Press, 1990 (Chapter 4,
Transaction-Flow Testing, ISBN 1-
85032-880-3).
[37] Ronald L. Rivest,
Testing
Implementations of DES
. MIT
Laboratory for Computer Science,
Cambridge, Mass., February 1985.
[38] Lawrence E. Bassham III,
The
Advanced Encryption Standard
Algorithm Validation Suite (AESAVS)
.
National Institutes of Standards and
Technology, November 2002.
[39] Steven Splaine,
Testing Web Security
.
Wiley Publishing, Inc., 2002 (ISBN
0-471-23281-5).
[40]
Ixia Introduces Gigabit Line Rate
Encryption Test Solution
,
Enterprise
Search WWH ::
Custom Search