• gray box testing (gray box)

    Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program. A gray box is a device, program or system wh...

  • OWASP (Open Web Application Security Project)

    The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted.

  • application security

    Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Once an afterthought in software design, security is becoming an increas...

  • domain model

    In agile software development, a domain model describes the application domain responsible for creating a shared language between business and IT. (Continued...)

Software Quality Resources

Email Alerts

Register now to receive SearchSoftwareQuality.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Glitch author seeks mandated software quality controls

    In Part 2 of this SSQ interview with Glitch author Jeff Papows, we learn more about Papows' proposal for an IT Governance Manifesto which would mandate higher standards of quality for life-threatening software. Papows warns of the dangers of not taki... 

  • Rise in hidden software glitches caused by programmer retirements

    Undiscovered software glitches in complex systems are common, and one of the primary drivers is the loss of mainframe knowledge of a retiring workforce. Software glitches are lurking in many large systems, particularly mainframe systems, and the COBO... 

  • Scaling Agile software development: Challenges and solutions

    Software consultant Nari Kannan describes how agile practices and work can be scaled appropriately for success in large organizations. Using lean thinking, reduction of waste, and appropriately organizing work and people, agile can be successfully ad... 

  • Choosing the right defect tracking system for your organization

    Does your software organization need a purpose-built defect tracking system but you don't know where to turn? Expert John Overbaugh explains what criteria should determine the proper defect tracking tool selection for your organization. 

  • Seven quick tips for better performance requirements

    An expert tester explains seven useful tips for determining appropriate performance requirements that can be tested throughout the development cycle. Knowing the right conversations to have with stakeholders and project team members will lead to high... 

  • Professional development for software testers

    Karen Johnson suggests a variety of ways that testers can gain additional skills and experience, including social networking and open source testing. 

  • How important are SQL skills for a tester?

    Karen Johnson explains the situations in which SQL skills are important for a software tester as well as times when the expertise is not required. 

  • Agile expert explains various types of software tests

    An expert sheds light on the different ways to test applications and software in an agile organization and explains how requirements changes can affect test outcomes. 

  • What open source security tools experts stand by

    When it comes to selecting a good security testing tool from the open source offerings it is best to use highly-recommended choices. Expert John Overbaugh prefers using WebScarab for his application security testing needs. 

  • Test-driven development from an Agile perspective

    An expert sheds light on the different ways to test applications and software in an agile organization and explains how requirements changes can affect test outcomes. 

  • What are the different ways to elicit software requirements?

    There are a number of techniques that can be used to gather software requirements. In this expert response, you'll be pointed to a learning guide that explains the differences, it will teach additional techniques and find out the key to successful b... 

  • Where can I find software security test plan templates?

    Before defining a security test plan there are a few questions that need to be answered. What are the security features you are planning for, what vulnerabilities concern you most and what kind of testing do you need to do to accomplish your goals. 

  • How to gather security requirements for software projects and what to look for

    There are a many things to focus on when defining security requirements for any software development effort. But the most prominent should be long term ones like input validation, URL manipulation and logic. 

  • Lesser-known application security problems that testers should be aware of

    SQL injection and cross-site scripting seem to get the most attention in the application security space, but there are other flaws testers should be aware of. Problems like logic errors and weak passwords often fly under the radar and thus cause prob... 

  • Creating a secure login page

    How can you ensure your login page won't be vulnerable to SQL injection and other attacks? Application security expert Paul Holm explains how you can use SSL and encryption to fend off hackers. 

  • gray box testing (gray box)

    Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program. A gray box is a device, program or system whose workings are partially understood. 

  • OWASP (Open Web Application Security Project)

    The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted. 

  • application security

    Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Once an afterthought in software design, security is becoming an increasingly important concern during development as applica... 

  • domain model

    In agile software development, a domain model describes the application domain responsible for creating a shared language between business and IT. (Continued...) 

  • worst-case execution time (WCET)

    Worst-case execution time (WCET) is a software development metric that determines the maximum length of time a task or set of tasks requires on a specific hardware platform... (Continued) 

  • work breakdown structure (WBS)

    A work breakdown structure (WBS) is a chart in which the critical work elements, called tasks, of a project are illustrated to portray their relationships to each other and to the project as a whole... (Continued) 

  • iterative

    Iterative (prounounced IT-ter-a-teev) is an adjective that means repetitious. 

  • Unified Modeling Language (Unified Modeling Language)

    UML (Unified Modeling Language) is a standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology. 

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a security exploit in which the attacker inserts malicious coding into a link that appears to be from a trustworthy source... (Continued) 

  • NUnit

    NUnit is an evolving, open source framework designed for writing and running tests in Microsoft .NET programming languages... (Continued) 

  • See more Definitions on Software Quality Resources
  • gray box testing (gray box)

    Gray box testing, also called gray box analysis, is a strategy for software debugging based on limited knowledge of the internal details of the program. A gray box is a device, program or system whose workings are partially understood. 

  • OWASP (Open Web Application Security Project)

    The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted. 

  • application security

    Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Once an afterthought in software design, security is becoming an increasingly important concern during development as applica... 

  • domain model

    In agile software development, a domain model describes the application domain responsible for creating a shared language between business and IT. (Continued...) 

  • worst-case execution time (WCET)

    Worst-case execution time (WCET) is a software development metric that determines the maximum length of time a task or set of tasks requires on a specific hardware platform... (Continued) 

  • work breakdown structure (WBS)

    A work breakdown structure (WBS) is a chart in which the critical work elements, called tasks, of a project are illustrated to portray their relationships to each other and to the project as a whole... (Continued) 

  • iterative

    Iterative (prounounced IT-ter-a-teev) is an adjective that means repetitious. 

  • Unified Modeling Language (Unified Modeling Language)

    UML (Unified Modeling Language) is a standard notation for the modeling of real-world objects as a first step in developing an object-oriented design methodology. 

  • Glitch author seeks mandated software quality controls

    In Part 2 of this SSQ interview with Glitch author Jeff Papows, we learn more about Papows' proposal for an IT Governance Manifesto which would mandate higher standards of quality for life-threatening software. Papows warns of the dangers of not taki... 

  • Scaling Agile software development: Challenges and solutions

    Software consultant Nari Kannan describes how agile practices and work can be scaled appropriately for success in large organizations. Using lean thinking, reduction of waste, and appropriately organizing work and people, agile can be successfully ad... 

  • See more All on Software Quality Resources