Software Error Detection through Testing and Analysis

Software Error Detection through Testing and Analysis
Author: J. C. Huang
Publisher: John Wiley & Sons
Total Pages: 350
Release: 2009-08-06
Genre: Computers
ISBN: 0470464054

An in-depth review of key techniques in software error detection Software error detection is one of the most challenging problems in software engineering. Now, you can learn how to make the most of software testing by selecting test cases to maximize the probability of revealing latent errors. Software Error Detection through Testing and Analysis begins with a thorough discussion of test-case selection and a review of the concepts, notations, and principles used in the book. Next, it covers: Code-based test-case selection methods Specification-based test-case selection methods Additional advanced topics in testing Analysis of symbolic trace Static analysis Program instrumentation Each chapter begins with a clear introduction and ends with exercises for readers to test their understanding of the material. Plus, appendices provide a logico-mathematical background, glossary, and questions for self-assessment. Assuming a basic background in software quality assurance and an ability to write nontrivial programs, the book is free of programming languages and paradigms used to construct the program under test. Software Error Detection through Testing and Analysis is suitable as a professional reference for software testing specialists, software engineers, software developers, and software programmers. It is also appropriate as a textbook for software engineering, software testing, and software quality assurance courses at the advanced undergraduate and graduate levels.

EXCELSIOR!

EXCELSIOR!
Author: HAVISH MADHVAPATY, DR. ANUPAMA RAJESH, NAKUL BHARDWAJ
Publisher: Notion Press
Total Pages: 112
Release: 2017-12-28
Genre: Computers
ISBN: 1948372541

You probably know the basics of Excel and use it on a regular basis, and are looking to learn more. But how much more? And more importantly, learn what? Excel is arguably the most powerful application in the MS Office suite. The huge variety of tools and functionalities range from the basic SUM formula to advanced tools like Excel macros. While it would be pointless to try and cover everything Excel offers, the goal of the book is to introduce several of these advanced topics to the readers. The book is a result of the combined experience of Havish Madhvapaty and Dr. Anupama Rajesh. Havish is a Microsoft Office Specialist (MOS) Master for Office 2013 and 2016. He conducts workshops, quantitative intervention sessions and consulting assignments for clients including those from Fortune 500, Big Four and Unicorns. Dr. Anupama Rajesh has over a decade’s experience in the area of Business Intelligence & Analytics, has authored eight books, and presented award-winning research work internationally at some of the best management institutions. The book has been designed such that you can read it cover to cover or use it as a reference book, learning things in any order you wish.

Bulletin

Bulletin
Author: Catholic Educational Association
Publisher:
Total Pages: 574
Release: 1914
Genre: Education
ISBN:

Nov. issue includes Proceedings of the annual meeting.

Stepwise Refinement of Distributed Systems

Stepwise Refinement of Distributed Systems
Author: Jaco W. de Bakker
Publisher: Springer Science & Business Media
Total Pages: 832
Release: 1990-04-25
Genre: Computers
ISBN: 9783540525592

The stepwise refinement method postulates a system construction route that starts with a high-level specification, goes through a number of provably correct development steps, and ends with an executable program. The contributions to this volume survey the state of the art in this extremely active research area. The world's leading specialists in concurrent program specification, verification, and the theory of their refinement present latest research results and surveys of the fields. State-based, algebraic, temporal logic oriented and category theory oriented approaches are presented. Special attention is paid to the relationship between compositionality and refinement for distributed programs. Surveys are given of results on refinement in partial-order based approaches to concurrency. A unified treatment is given of the assumption/commitment paradigm in compositional concurrent program specification and verification, and the extension of these to liveness properties. Latest results are presented on specifying and proving concurrent data bases correct, and deriving network protocols from their specifications.

Path-Oriented Program Analysis

Path-Oriented Program Analysis
Author: J. C. Huang
Publisher: Cambridge University Press
Total Pages: 120
Release: 2007-12-24
Genre: Computers
ISBN: 1139468944

This book presents a unique method for decomposing a computer program along its execution paths, for simplifying the subprograms so produced, and for recomposing a program from its subprograms. This method enables us to divide and conquer the complexity involved in understanding the computation performed by a program by decomposing it into a set of subprograms and then simplifying them to the furthest extent possible. The resulting simplified subprograms are generally more understandable than the original program as a whole. The method may also be used to simplify a piece of source code by following the path-oriented method of decomposition, simplification, and recomposition. The analysis may be carried out in such a way that the derivation of the analysis result constitutes a correctness proof. The method can be applied to any source code (or portion thereof) that prescribes the computation to be performed in terms of assignment statements, conditional statements, and loop constructs, regardless of the language or paradigm used.

Oracle Database Application Security

Oracle Database Application Security
Author: Osama Mustafa
Publisher: Apress
Total Pages: 351
Release: 2019-10-31
Genre: Computers
ISBN: 1484253671

Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about identity preservation, policies and fine-grained audits. Moving on to virtual private databases, you’ll set up and configure a VPD to work in concert with other security features in Oracle, followed by tips on managing configuration drift, profiles, and default users. Shifting focus to coding, you will take a look at secure coding standards, multi-schema database models, code-based access control, and SQL injection. Finally, you’ll cover single sign-on (SSO), and will be introduced to Oracle Internet Directory (OID), Oracle Access Manager (OAM), and Oracle Identity Management (OIM) by installing and configuring them to meet your needs. Oracle databases hold the majority of the world’s relational data, and are attractive targets for attackers seeking high-value targets for data theft. Compromise of a single Oracle Database can result in tens of millions of breached records costing millions in breach-mitigation activity. This book gets you ready to avoid that nightmare scenario. What You Will LearnWork with Oracle Internet Directory using the command-line and the console Integrate Oracle Access Manager with different applications Work with the Oracle Identity Manager console and connectors, while creating your own custom one Troubleshooting issues with OID, OAM, and OIDDive deep into file system and network security concepts Who This Book Is For Oracle DBAs and developers. Readers will need a basic understanding of Oracle RDBMS and Oracle Application Server to take complete advantage of this book.