Tutorials
Tutorials
-
Project management tools and strategies: Gantt charts, PERT charts and PM planning tools
In project management, charts can visualize work in progress -- and there are many ways to do so. Learn how Agile teams use Gantt, PERT, burn down and other charts to stay on track. Continue Reading
-
Pick up basic Git commands with a hands-on tutorial
To get things done in Git, know your commands. Open up the version control system and replicate this quick tutorial to learn how to run crucial inputs. Continue Reading
-
Pick up CI/CD, version control in this Azure DevOps tutorial
Microsoft's rebranded Azure DevOps helps teams take a software project from start to finish. Walk through the service's components, from project planning to pipelines and testing. Continue Reading
-
Load testing and performance testing with JMeter: Tutorial
JMeter, a free open source load testing tool, is straightforward to use and supports several programming languages, including HTTP/HTTPS, SOAP, JDBC, LDAP and JMS. In the following set of informative tips, expert Mike Kelly explores the capabilities... Continue Reading
-
Testing web services with soapUI
In this article, Mike Kelly details the finer points of web services testing using soapUI. Continue Reading
-
Agile Alliance 2011 conference news
The Agile Alliance 2011 conference hosted an array of experts. Learn about Agile development, exploratory testing, Scrum and software testing with Q&As and videos from the speakers. Continue Reading
-
Agile backlash series: Exploring Agile development problems and solutions
Experienced Agile testers and developers discuss development problems that cause backlash. Continue Reading
-
Full Spectrum of soapUI for open source software testing: Tutorial
In this four-part series on soapUI, learn tips and tricks to perform a number of different software testing operations using this widely-accepted open source tool. Continue Reading
-
Master core deliverables: Testing Center of Excellence tutorial
This installment discusses the core set of deliverables that a TCoE should be responsible for creating and maintaining. We'll examine testing workflows, methodologies and templates, as well as specific artifacts for its partners including: Test ... Continue Reading
-
Building a Testing Center of Excellence: A tutorial
In this tutorial, senior test architect David W. Johnson shares winning approaches he's learned from his work on several successful TCoE implementations. Johnson walks you through a TCoE's core concepts and benefits, getting started, key players on ... Continue Reading
-
Choosing, using software, tools for a Testing Center of Excellence tutorial
Lack of an overall test architecture can lead to product choices that may be effective in the short-term but lead to additional long-term costs or even replacement of a previously selected toolset. Learn what testing software and tool vendor your ... Continue Reading
-
PCI DSS compliance: Web application firewalls (WAFs)
Web application firewalls (WAFs) are one option for those seeking compliance with requirement 6.6 of the PCI DSS. The benefits, limitations and proper implementation of WAFs are discussed by security experts in this section. Continue Reading
-
Software testing fundamentals: Performance testing
Software performance testing is crucial to software development and very easy to mess up. These tips and expert opinions illustrate how to conduct performance tests effectively. Continue Reading
-
Software testing fundamentals: Testing basics
Software testing experts weigh in on creating test plans, writing test cases, choosing test models and other basic building blocks of software testing. Continue Reading
-
Better software through debugging and unit testing -- Unit testing, Extreme Programming and TDD
Unit testing is a key element of Extreme Programming (XP) and test-driven development (TDD). These tips, tutorials and articles will help you understand unit testing in the frame of other methodologies. Continue Reading
-
Addressing software quality issues with development models, methods
Each software development model has its own practices for building quality software. It is up to software makers to determine which model best fits their needs and to follow its practices so that they can deliver software on time that meets users' ... Continue Reading
-
A template for software requirements gathering techniques
Requirements gathering can be a difficult, exhaustive process. We've assembled information on the best methods for requirements engineering -- prototypes, storyboards, models, state transition diagrams and use cases -- in one guide. Continue Reading
-
Application threats: CSRF, injection attacks and cookie replay
Web application exploits come in a variety of forms. There are a few that stand out: XSS, for example. But what about XSRF, which is only recently garnering the press is deserves? There are comparatively little resources for less famous exploits. ... Continue Reading
-
Authentication & authorization: Secure ID and user privileges
Authentication and authorization work together to prevent a multitude of application security attacks. While the basic concepts behind these two methods may be simple, the technology is not. There is a vast array of authentication and authorization ... Continue Reading
-
How standards and regulations affect application security
Many standards and laws regulate security issues for companies. Often, however, what's expected is unclear -- especially when it comes to application security. But that is starting to change, as regulations begin including application security ... Continue Reading
-
Five application security threats and how to counter them
New threats emerge every day. In order to be secure, you must be able to identify the major threats and understand how to counter them. Here is a guide to the five most common and insidious threats to applications -– and what you can do about ... Continue Reading
-
Top 10 Web application security vulnerabilities
Based on the Open Web Application Security Project's top 10 project, this guide covers the 10 most critical Web application security vulnerabilities and how to protect your applications. Continue Reading