| 000 | 02065nam a2200277Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20250716122528.0 | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9781466575301 | ||
| 037 | _cTextbook | ||
| 040 | _aCSL _beng _cCSL | ||
| 041 | _aeng | ||
| 084 | _aD65,8(B):81 Q4;1 TD _qCSL | ||
| 100 | _aHager, Jon Duncan _eauthor _9815737 | ||
| 245 | 0 | _aSoftware test attacks to break mobile and embedded devices _c/ by Jon Duncan Hagar | |
| 260 | _aBoca Raton : _bCRC Press, _c2014. | ||
| 300 | _axxxiii, 343p. _b: ill. | ||
| 500 | _aAppendix 279-318p.; References 319-322p.; Glossary 323-328p.; Index 329-343p. | ||
| 520 | _aAddress Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices. | ||
| 650 | _a Generic attacks _9815738 | ||
| 650 | _a Some parting _9815739 | ||
| 650 | _a Time attacks _9815740 | ||
| 650 | _aDeveloper attacks _9815741 | ||
| 942 | _hD65,8(B):81 Q4;1 TD _cTB _2CC _n0 | ||
| 999 | _c6549 _d6549 | ||