11 results (0,17537 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Software Testing A Craftsman’s Approach Fifth Edition

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test or ethical hack from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools which are required to complete a penetration test. The book covers a wide range of tools including Backtrack Linux Google reconnaissance MetaGooFil dig Nmap Nessus Metasploit Fast Track Autopwn Netcat and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools it details a four-step methodology for conducting an effective penetration test or hack. Providing an accessible introduction to penetration testing and hacking the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

GBP 170.00
1

The Web Accessibility Project Development and Testing Best Practices

The Web Accessibility Project Development and Testing Best Practices

Approximately 15% of the global population is affected by some sort of disability according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software’s and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design development and extensive accessibility testing which are essential for most of the customer-facing websites. In a fast-paced world incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit accessibility functional tests and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book developers can help their organizations rise to a whole new level of accessibility adherence innovation and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users. | The Web Accessibility Project Development and Testing Best Practices

GBP 66.99
1

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software: Requirements Test Cases and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:Pre-developed nonfunctional requirements that can be reused for any software development project Documented test cases that go along with the requirements and can be used to develop a Test Plan for the softwareTesting methods that can be applied to the test cases provided Downloadable resources with all security requirements and test cases as well as MS Word versions of the checklists requirements and test cases covered in the bookOffering ground-level already-developed software nonfunctional requirements and corresponding test cases and methods this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying downloadable resources filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis design and testing phases of your software development lifecycle. Some Praise for the Book:This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation . . —Doug Cavit Chief Security Strategist Microsoft Corporation. provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC). —Jeff Weekes Sr. Security Architect at Terra Verde Services. full of useful insights and practical advice from two au | Secure and Resilient Software Requirements Test Cases and Testing Methods

GBP 56.99
1

Agile Software Development

Architecting Secure Software Systems

Architecting Secure Software Systems

Traditionally software engineers have defined security as a non-functional requirement. As such all too often it is only considered as an afterthought making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase continuing this sharp focus into security design secured programming security testing and secured deployment. Outlines Protection Protocols for Numerous ApplicationsThrough the use of examples this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX . NET Java mobile and Web environments. Finally they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation. Define a Security Methodology from the Initial Phase of Development Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers engineers and architects to approach security in a holistic fashion at the beginning of the software development li

GBP 56.99
1

Telecommunications Cost Management

Telecommunications Cost Management

Our world is rapidly becoming an Internet-based world with tens of millions of homes millions of businesses and within a short period of time possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users ranging from individual professionals to networking managers and administrators is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to advanced topics in subnetting network address translation and configuring workstations servers and routers. The book contains network tools that prepare you for testing and troubleshooting and highlights the need for techniques that conserve the use of IP addressing as well as the creation of a next generation IP addressing structure. While structured on a chapter by chapter basis wherever possible each chapter was written to be independent making the book convenient and easy to use in a hectic work environment. While you may find it possible to design a network or configure a workstation to operate without a detailed knowledge of IP addressing the end results are not very efficient. And in the quickly changing global business environment inefficiency wastes your time and money both valuable resources for gaining and maintaining the competitive edge. With The ABCs of IP Addressing you get the comprehensive coverage of applications and protocols that help you do your job faster and more effectively. | Telecommunications Cost Management

GBP 160.00
1

Android Security Attacks and Defenses

Android Security Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture the book describes Android permissions including Manifest permissions to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system including import directories and files so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www. androidinsecurity. com. It explains how to crack SecureApp. apk discussed in the text and also makes the application available on its site. The book includes coverage of advanced topics such as reverse engineering and forensics mobile device pen-testing methodology malware analysis secure coding and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes. The book’s site includes a resource section where readers can access downloads for applications tools created by users and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text wherever needed. Visit www. androidinsecurity. com for more information. | Android Security Attacks and Defenses

GBP 56.99
1

Requirements Engineering for Software and Systems

Requirements Engineering for Software and Systems

Solid requirements engineering has increasingly been recognized as the key to improved on-time and on-budget delivery of software and systems projects. New software tools are emerging that are empowering practicing engineers to improve their requirements engineering habits. However these tools are not usually easy to use without significant training. Requirements Engineering for Software and Systems Fourth Edition is intended to provide a comprehensive treatment of the theoretical and practical aspects of discovering analyzing modeling validating testing and writing requirements for systems of all kinds with an intentional focus on software-intensive systems. It brings into play a variety of formal methods social models and modern requirements writing techniques to be useful to practicing engineers. The book is intended for professional software engineers systems engineers and senior and graduate students of software or systems engineering. Since the first edition there have been made many changes and improvements to this textbook. Feedback from instructors students and corporate users was used to correct expand and improve the materials. The fourth edition features two newly added chapters: On Non-Functional Requirements and Requirements Engineering: Road Map to the Future. The latter provides a discussion on the relationship between requirements engineering and such emerging and disruptive technologies as Internet of Things Cloud Computing Blockchain Artificial Intelligence and Affective Computing. All chapters of the book were significantly expanded with new materials that keep the book relevant to current industrial practices. Readers will find expanded discussions on new elicitation techniques agile approaches (e. g. Kanpan SAFe and DEVOps) requirements tools requirements representation risk management approaches and functional size measurement methods. The fourth edition also has significant additions of vignettes exercises and references. Another new feature is scannable QR codes linked to sites containing updates tools videos and discussion forums to keep readers current with the dynamic field of requirements engineering.

GBP 59.99
1

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched new variants of it are already on the way. IT Security teams in businesses and corporations are struggling daily to fight off any cyberthreats that they are experiencing. On top of this they are also asked by their CIO or CISO to model what future Cyberattacks could potentially look like and ways as to how the lines of defenses can be further enhanced. IT Security teams are overburdened and are struggling to find ways in order to keep up with what they are being asked to do. Trying to model the cyberthreat landscape is a very laborious process because it takes a lot of time to analyze datasets from many intelligence feeds. What can be done to accomplish this Herculean task? The answer lies in Artificial Intelligence (AI). With AI an IT Security team can model what the future Cyberthreat landscape could potentially look like in just a matter of minutes. As a result this gives valuable time for them not only to fight off the threats that they are facing but to also come up with solutions for the variants that will come out later. Practical AI for Cybersecurity explores the ways and methods as to how AI can be used in cybersecurity with an emphasis upon its subcomponents of machine learning computer vision and neural networks. The book shows how AI can be used to help automate the routine and ordinary tasks that are encountered by both penetration testing and threat hunting teams. The result is that security professionals can spend more time finding and discovering unknown vulnerabilities and weaknesses that their systems are facing as well as be able to come up with solid recommendations as to how the systems can be patched up quickly.

GBP 44.99
1