000 02065nam a2200277Ia 4500
003 OSt
005 20250716122528.0
008 220909b |||||||| |||| 00| 0 eng d
020 _a9781466575301
037 _cTextbook
040 _aCSL
_beng
_cCSL
041 _aeng
084 _aD65,8(B):81 Q4;1 TD
_qCSL
100 _aHager, Jon Duncan
_eauthor
_9815737
245 0 _aSoftware test attacks to break mobile and embedded devices
_c/ by Jon Duncan Hagar
260 _aBoca Raton :
_bCRC Press,
_c2014.
300 _axxxiii, 343p.
_b: ill.
500 _aAppendix 279-318p.; References 319-322p.; Glossary 323-328p.; Index 329-343p.
520 _aAddress Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.
650 _a Generic attacks
_9815738
650 _a Some parting
_9815739
650 _a Time attacks
_9815740
650 _aDeveloper attacks
_9815741
942 _hD65,8(B):81 Q4;1 TD
_cTB
_2CC
_n0
999 _c6549
_d6549