How to Break Software: A Practical Guide to Testing
James A. Whittaker
- 出版商: Addison Wesley
- 出版日期: 2002-05-09
- 售價: $1,530
- 貴賓價: 9.5 折 $1,454
- 語言: 英文
- 頁數: 208
- 裝訂: Paperback
- ISBN: 0201796198
- ISBN-13: 9780201796193
$650CMMI: Guidelines for Process Integration and Product Improvement (Harcover)
How to Break Software takes a very applied and non-rigid approach to teaching how to test software for common bugs. It is a departure from conventional testing in which testers prepare a written test plan and then use it as a script when testing the software. Instead of relying on a rigid plan, it should be intelligence, insight, experience and a “nose for where the bugs are hiding” that guide testers. This book helps testers develop this insight.
The techniques presented in this book not only allow testers to go off-script, they encourage them to do so. Don't blindly follow a document that may be out of date and that was written before the product was even testable. Instead, use your head! Open your eyes! Think a little, test a little and then think a little more.
Table of Contents
1. A Fault Model to Guide Software Testing.
Understanding Software Behavior.
Understanding Software's Environment.
File System User.
The Operating System User.
The Software User.
Understanding Software's Capabilities.
Summary and Conclusion.
II. USER INTERFACE ATTACKS.
2. Testing from the User Interface: Inputs and Outputs.
Exploring the Input Domain.
Second Attack: Apply inputs that force the software to establish default values.
Third Attack: Explore allowable character sets and data types.
Fourth Attack: Overflow input buffers.
Fifth Attack: Find inputs that may interact and test various combinations of their values.
Sixth Attack: Repeat the same input or series of inputs numerous times.
Eighth Attack: Force invalid outputs to be generated.
Ninth Attack: Force properties of an output to change.
Tenth Attack: Force the screen to refresh.
3. Testing from the User Interface: Data and Computation.
Exploring Stored Data.
Twelfth Attack: Force a data structure to store too many/too few values.
Thirteenth Attack: Investigate alternate ways to modify internal data constraints.
Exploring Computation and Feature Interaction.
Sixteenth Attack: Force computation results to be too large or too small.
Seventeenth Attack: Find features that share data or interact poorly.
III. SYSTEM INTERFACE ATTACKS.
4. Testing from the File System Interface.
Second Attack: Inject faults that simulate network problems.
Third Attack: Damage the media.
Fifth Attack: Vary file access permissions.
Sixth Attack: Vary/corrupt file contents.
5. Testing from the Software/OS Interface.
6. Some Parting Advice.
Friday Afternoon Bug Fests.
Annotated Glossary of Programming Terms.
Appendix A. Testing Exception and Error Cases Using Runtime Fault Injection.
A Mechanism for Runtime Fault Injection.
Appendix B. Using HEAT: The Hostile Environment Application Tester.
The Application Band.
The Monitor Band.
Fault Injection Bands and Their Functionality.
The Network Band.
Appendix C. What is Software Testing? And Why is it so Hard?
The Software Testing Process.
Phase One: Modeling the Software's Environment.
Phase Two: Selecting Test Scenarios.
Phase Three: Running and Evaluating Test Scenarios.
Phase Four: Measuring Testing Progress.
The Software Testing Problem.