Information Technology Reference
In-Depth Information
[18] James A. Whittaker, What is software
testing? And why is it so hard? IEEE
Software (No. 1), 2000, 70-79.
[19] Website that contains the Software
Engineering Institute description
of their Capability Maturity Model
Integration (CMMi): www.sei.cmu.
edu/pub/documents/02.reports/pdf/
02tr011.pdf.
[20] James Bach, Rapid Software Testing ,
Satisfi ce Inc., www.satisfi ce.com.
[21] The IEEE Computer Society web site
www.ieee.org.
[22] The Tigris Open Source Software
Community project ReadySET web
site http://readyset.tigris.org/.
[23] M. Ramachandran. Requirements-
Driven Software Test: A Process
Oriented Approach, Software
Engineering Notes 21(4), 1996, 66-70.
[24] Alistair Cockburn, Writing Effective
Use Cases . Addison-Wesley, 2001
(ISBN 0-201-702258).
[25] James A. Whittaker, How To Break
Software: A Practical Guide To
Testing . Addison-Wesley, 2003 (ISBN
0-201-79619-8).
[26] H.K. Leung, L.A. White, A Study of
Regression Testing. Proceedings of
the 6th International Conference on
Testing Computer Software . USPDI,
Washington, D.C., May 1989.
[27] G. Rothermel, M.J. Harrold,
Analyzing Regression Test Selection
Te ch n iques, IEEE Transactions on
Software Engineering , 22(8), 1996,
529-551.
[28] John Watkins, Testing IT: An Off-
the-Shelf Software Testing Process .
Cambridge University Press, 2001
(Chapter 11, Regression Testing , ISBN
0-521-79546-X).
[29] A. Bertolino, M. Marre, Automatic
generation of path covers based on
the control fl ow analysis of computer
programs, IEEE Transactions on
Software Engineering , 21(12), 1994,
pp. 885-899.
[30] C.S. Chou, M.W. Du, Improved
Domain Strategies for Detecting Path
Selection Errors. In: Proceedings
of the Conference on Software
Maintenance , IEEE Computer Society,
Los Angeles, 1987, pp. 165-173.
[31] P.G. Frankl, E.J. Weyuker, Provable
improvements on branch testing. IEEE
Transactions on Software Engineering
19(10), 1993.
[32] R.D. Craig, S.P. Jaskiel, Systematic
Software Testing . SQE Publishing,
2002 (Chapter 5 section “White Box
Science'', ISBN 1-58053-508-9).
[33] B. Beizer, Software Testing
Techniques, 2nd Edition. International
Thomson Press, 1990 (Chapter 3
“Flowgraphs and Path Testing'', ISBN
1-85032-880-3).
[34] B. Biezerk, Black Box Testing . John
Wiley & Sons, 1995.
[35] R.D. Craig, S.P. Jaskiel, Systematic
Software Testing . SQE Publishing,
2002 (Chapter 5 section “Black Box
Art'', ISBN 1-58053-508-9).
[36] B. Beizer, Software Testing
Techniques, 2nd Edition. International
Thomson Press, 1990 (Chapter 4,
Transaction-Flow Testing, ISBN 1-
85032-880-3).
[37] Ronald L. Rivest, Testing
Implementations of DES . MIT
Laboratory for Computer Science,
Cambridge, Mass., February 1985.
[38] Lawrence E. Bassham III, The
Advanced Encryption Standard
Algorithm Validation Suite (AESAVS) .
National Institutes of Standards and
Technology, November 2002.
[39] Steven Splaine, Testing Web Security .
Wiley Publishing, Inc., 2002 (ISBN
0-471-23281-5).
[40] Ixia Introduces Gigabit Line Rate
Encryption Test Solution , Enterprise
Search WWH ::




Custom Search