Software Quality Definitions

  • C

    content spoofing

    Content spoofing is a type of exploit used by a malicious hackers to present a faked or modified Web site to the user as if it were legitimate.

  • context-driven testing

    Context-driven testing is a paradigm for developing and debugging computer software that takes into account the ways in which the programs will be used or are expected to be used in the real world... (Continued)

  • continuous integration (CI)

    Continuous integration (CI) is a software engineering practice in which isolated changes are immediately tested and reported on when they are added to a larger code base. The goal of CI is to provide rapid feedback so that if a defect is introduced into the code base, it can be identified and corrected as soon as possible.

  • continuous software development

    Continuous software development is a blanket term that covers several aspects of an iterative application development process based on making each change when it is ready, rather than wrapping many changes into large batches.

  • cookie

    A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.

  • countermeasure

    A countermeasure is an action, process, device, or system that can prevent, or mitigate the effects of, threats to a computer, server or network.

  • cowboy coding

    Cowboy coding describes an undisciplined approach to software development. The cowboy approach to coding typically focuses on quick fixes and getting a working product into production as soon as possible.

  • cross-site request forgery (XSRF or CSRF)

    Cross-site request forgery (XSRF or CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user... (Continued)

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a security exploit which is carried out on Web applications that accept input, but do not properly separate data and executable code before the input is delivered back to a user’s browser.

  • cross-site tracing (XST)

    Cross-site tracing (XST) is a sophisticated form of cross-site scripting (XSS) that can bypass security countermeasures already put in place to protect against XSS... (Continued)

  • cruft

    Cruft is the elements of a program, system or product that are either useless, poorly designed or both. In computing, cruft describes areas of redundant, improper or simply badly written code, as well as old or inferior hardware and electronics. Cruft may also be used to describe a group of hackers, like a pod of whales, exultation of larks or murder of crows. (Continued...)

  • cryptography

    Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. The term is most often associated with scrambling plaintext (ordinary text, sometimes referred to as cleartext) into ciphertext (a process called encryption), then back again (known as decryption).

  • customer

    In agile software development, a customer is a person with an understanding of both the business needs and operational constraints for a project. (Continued...)

  • D

    daily stand-up meeting

    A daily stand-up meeting is a short organizational meeting that is held early each day. The practice is commonly used in the Scrum development methodology.

  • data center outsourcing (DCO)

    DCO (data center outsourcing) is the practice of outsourcing the day-to-day provisioning and management of computing and storage resources and environments to a third party provider.

-ADS BY GOOGLE

SearchMicroservices

TheServerSide.com

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close