Tips
Tips
-
Web application security testing checklist
Testing your Web application security is something that needs be taken seriously. The best way to be successful is to prepare in advance and know what to look for. Here's an essential elements checklist to help you get the most out of your Web ... Continue Reading
-
How to avoid requirements creep
Despite all the attention placed on defining requirements, creep continues to plague software projects. Learn how a different approach to requirements can curtail that creep. Continue Reading
-
Making requirements walkthroughs more effective (and fun)
Do you have to twist arms to get people to attend your requirements review sessions? It doesn't have to be this way. Learn how to use a simulation model to get everyone engaged in the walkthrough. Continue Reading
-
Using proactive test design methods to catch requirements issues early
Proactive test design allows QA testers to identify requirements and design problems at an earlier stage than with traditional test cases. Continue Reading
-
Clean Code: A Handbook of Agile Software Craftsmanship, Chapter 1 -- What Is Clean Code?
Agile software development calls on developers to write clean code, according to Robert "Uncle Bob" Martin. This free chapter introduces the concepts and methods programmers can adopt to write truly clean code. Continue Reading
-
Software testers: Identity crisis or delusions of grandeur?
Without a clear understanding of what software testers do, it's only natural that people try to interpret what they do from their job title. The problem is the number of different titles people have creates confusion, says Scott Barber. Continue Reading
-
Testing for performance, part 1: Assess the problem space
In the first article of this series on testing for performance, Mike Kelly outlines ways for you to understand your content and the system and figure out where to start testing. Continue Reading
-
Testers' involvement in requirements gathering important
In this increasingly complex software development era, it is important to include testing as early in the project as possible. And that means starting with requirements gathering. Continue Reading
-
The state of performance testing
Some might say 2007 was the year the software industry started taking performance testing seriously. In this month's Peak Performance column, Scott Barber takes a look at what happened in the performance testing field in 2007 that made that so, and ... Continue Reading
-
How to define the scope of functional security testing
With a many internal threats originating from applications, functional security testing is one of the most reliable ways to identify internal security vulnerabilities. Continue Reading
-
Cracking passwords the Web application way
Don't make the mistake of thinking your Web site is secure just because it uses SSL. If you don't have proper login controls in place, attackers can crack passwords and get into the application. Continue Reading
-
Five steps for performing an effective software product review
Review or inspection is an important activity in any project implementation. Performing a good review of the developed product, along with capturing metrics, helps in building a quality product. In this member-submitted article, Murugan Srinivasa ... Continue Reading
-
How to write an effective test report
This member-submitted tip provides a guideline for essential information that should be included in a test report. Continue Reading
-
Don't mistake user acceptance testing for acceptance testing
Despite the many references that concur on the definition of acceptance testing, people still get confused. Scott Barber clarifies things in this month's Peak Performance column. Continue Reading
-
Watch the metrics during your load tests
In this member-submitted tip, Steve Cam says monitoring the metrics during your load tests will help you detect performance-related issues. Continue Reading
-
Who does what in a Testing Center of Excellence?
With a Testing Center of Excellence (TCE) an organization can improve its software testing. Learn how and what each TCE participant does in this article from David W. Johnson Continue Reading
-
What to look for in a Web application security testing tool
If you do a lot of Web application security scanning, any testing tool you use must have these features, says security expert Kevin Beaver. They will save you lots of time and effort and will increase the number of valid vulnerabilities found. Continue Reading
-
How to test Web site login security
Input validation is critical for the security of Web sites. Here's a techniques you can use to make sure your site isn't vulnerable to SQL injection. Continue Reading
-
Software testing deliverables: From test plans to status reports
Core sets of deliverable are required for any software testing phase. In many cases they include a test plan, test case, defect documentation and status report. Learn what is required for each in this tip from David W. Johnson. Continue Reading
-
How to document system, software requirements
There are various formats you can use to document system and software requirements. However, no single one is sufficient to represent all requirements. You need to follow an integrated approach. Continue Reading
-
The role of a software test manager
Effective software test managers not only understand the discipline of testing, but they are also able to manage and implement a testing process in their organizations. That requires team leading skills, communication skills, and being able to ... Continue Reading
-
Software requirements: Using models to understand users' needs
Successful software projects involve users early and often to explore and reach closure on requirements. Using analysis models you can depict user needs with a combination of diagrams and structure text such as tables or templated text. Continue Reading
-
I don't want a Web application security product; I want a solution
The number of Web application security products available is enough to make your head spin. A better option is a total solution that handles all of your Web application security needs, says application security expert Anurag Agarwal. Continue Reading