Software test attacks to break mobile and embedded devices (Record no. 6549)

MARC details
000 -LEADER
fixed length control field 02065nam a2200277Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250716122528.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220909b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466575301
037 ## - SOURCE OF ACQUISITION
Terms of availability Textbook
040 ## - CATALOGING SOURCE
Original cataloging agency CSL
Language of cataloging eng
Transcribing agency CSL
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
084 ## - COLON CLASSIFICATION NUMBER
Classification number D65,8(B):81 Q4;1 TD
Assigning agency CSL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Hager, Jon Duncan
Relator term author
9 (RLIN) 815737
245 #0 - TITLE STATEMENT
Title Software test attacks to break mobile and embedded devices
Statement of responsibility, etc. / by Jon Duncan Hagar
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. 2014.
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 343p.
Other physical details : ill.
500 ## - GENERAL NOTE
General note Appendix 279-318p.; References 319-322p.; Glossary 323-328p.; Index 329-343p.
520 ## - SUMMARY, ETC.
Summary, etc. Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test.<br/>The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Generic attacks
9 (RLIN) 815738
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Some parting
9 (RLIN) 815739
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Time attacks
9 (RLIN) 815740
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Developer attacks
9 (RLIN) 815741
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Classification part D65,8(B):81 Q4;1 TD
Koha item type Textbook
Source of classification or shelving scheme Colon Classification (CC)
Suppress in OPAC No
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Central Science Library Central Science Library 2022-09-12 437, 11/03/2015, Limpid Book Service   D65,8(B):81 Q4;1 TD SL1598030 2022-09-12 2022-09-12 Textbook