Chitika

Software Quality Engineering

Friday, February 4, 2011

PART I OVERVIEW AND BASICS
1 Overview
1.1 Meeting People’s Quality Expectations
1.2 Book Organization and Chapter Overview
1.3 Dependency and Suggested Usage
1.4 Reader Preparation and Background Knowledge

2 What Is Software Quality?
2.1 Quality: Perspectives and Expectations
2.2 Quality Frameworks and ISO-9126
2.3 Correctness and Defects: Definitions, Properties, and Measurements
2.4 A Historical Perspective of Quality
2.5 So, What Is Software Quality?

3 Quality Assurance
3.1 Classification: QA as Dealing with Defects
3.2 Defect Prevention
3.2.1 Education and training
3.2.2 Formal method
3.2.3 Other defect prevention techniques
3.3.1 Inspection: Direct fault detection and removal
3.3.2 Testing: Failure observation and fault removal
3.3.3 Other techniques and risk identification
3.4.1 Software fault tolerance
3.4.2 Safety assurance and failure containment
3.3 Defect Reduction
3.4 Defect Containment
3.5 Concluding Remarks

4 Quality Assurance in Context
4.1 Handling Discovered Defect During QA Activities
4.2 QA Activities in Software Processes
4.3 Verification and Validation Perspectives
4.4 Reconciling the Two Views
4.5 Concluding Remarks
Problems

5 Quality Engineering
5.1 Quality Engineering: Activities and Process
5.2 Quality Planning: Goal Setting and Strategy Formation
5.3 Quality Assessment and Improvement
5.4 Quality Engineering in Software Processes
5.5 Concluding Remarks

PART II SOFTWARETESTING
6 Testing: Concepts, Issues, and Techniques
6.1 Purposes, Activities, Processes, and Context
6.2 Questions About Testing
6.3 Functional vs. Structural Testing: What to Test?
6.4 Coverage-Based vs. Usage-Based Testing: When to Stop Testing?
6.5 Concluding Remarks








 Test Activities, Management, and Automation
7.1 Test Planning and Preparation
7.1.1 Test planning: Goals, strategies, and techniques
7.1.2 Testing models and test cases
7.1.3 Test suite preparation and management
7.1.4 Preparation of test procedure
7.2 Test Execution, Result Checking, and Measurement
7.3 Analysis and Follow-up
7.4 Activities, People, and Management
7.5 Test Automation
7.6 Concluding Remarks
Problems

8 Coverage and Usage Testing Based on Checklists and Partitions
8.1 Checklist-Based Testing and Its Limitations
8.2 Testing for Partition Coverage
8.3 Usage-Based Statistical Testing with Musa’s Operational Profiles
8.4 Constructing Operational Profiles
8.5 Case Study: OP for the Cartridge Support Software
8.6 Concluding Remarks
8.2.1 Some motivational examples
8.2.2 Partition: Concepts and definitions
8.2.3 Testing decisions and predicates for partition coverage
8.3.1 The cases for usage-based statistical testing
8.3.2 Musa OP: Basic ideas
8.3.3 Using OPs for statistical testing and other purposes
8.4.1 Generic methods and participants
8.4.2 OP development procedure: Musa-1
8.4.3 OP development procedure: Musa-2
8.5.1 Background and participants
8.5.2 OP development in five steps
8.5.3 Metrics collection, result validation, and lessons learned

9. Input Domain Partitioning and Boundary Testing
9.1 Input Domain Partitioning and Testing
9.2 Simple Domain Analysis and the Extreme Point Combination Strategy
9.3 Testing Strategies Based on Boundary Analysis
9.1.1 Basic concepts, definitions, and terminology
9.1.2 Input domain testing for partition and boundary problems
9.3.2 Other Boundary Test Strategies and Applications
9.4.1 Strong and approximate strategies
9.4.2 Other types of boundaries and extensions
9.4.3 Queuing testing as boundary testing
9.4 Weak 1 x 1 strategy
9.5 Concluding Remarks

10 Coverage and Usage Testing Based on Finite-State Machines
and Markov Chains
10.1 Finite-State Machines and Testing
10.1.1 Overcoming limitations of simple processing models
10.1.2 FSMs: Basic concepts and examples
10.1.3 Representations of FSMs
10.2 FSM Testing: State and Transition Coverage
10.2.1 Some typical problems with systems modeled by FSMs
10.2.2 Model construction and validation
10.2.3 Testing for correct states and transitions
10.2.4 Applications and limitations
10.3 Case Study: FSM-Based Testing of Web-Based Applications
10.3.1 Characteristics of web-based applications
10.3.2 What to test: Characteristics of web problems
10.3.3 FSMs for web testing
10.4.1 Markov chains and operational profiles
10.4.2 From individual Markov chains to unified Markov models
10.4.3 UMM construction
10.4 Markov Chains and Unified Markov Models for Testing
10.5 Using UMMs for Usage-Based Statistical Testing
10.5.1 Testing based on usage frequencies in UMMs
10.5.2 Testing based on other criteria and UMM hierarchies
10.5.3 Implementation, application, and other issues
10.6 Case Study Continued: Testing Based on Web Usages
10.6.1 Usage-based web testing: Motivations and basic approach
10.6.2 Constructing UMMs for statistical web testing
10.6.3 Statistical web testing: Details and examples
10.7 Concluding Remarks

11 Control Flow, Data Dependency, and Interaction Testing
1 1.1 Basic Control Flow Testing
1 1.1.1 General concepts
1 1.1.2 Model construction
11.1.3 Path selection
1 1.1.4 Path sensitization and other activities
11.2 Loop Testing, CFT Usage, and Other Issues
1 1.2.1 Different types of loops and corresponding CFGs
11.2.2 Loop testing: Difficulties and a heuristic strategy
1 1.2.3 CFT Usage and Other Issues
1 1.3 Data Dependency and Data Flow Testing
11.3.1 Basic concepts: Operations on data and data dependencies
11.3.2 Basics of DFT and DDG
11.3.3 DDG elements and characteristics
11.3.4 Information sources and generic procedure for DDG construction
11.3.5 Building DDG indirectly
11.3.6 Dealing with loops
1 1.4 DFT Coverage and Applications
1 1.4.1 Achieving slice and other coverage
1 1.4.2 DFT: Applications and other issues
11.4.3 DFT application in synchronization testing
1 1.5 Concluding Remarks

12 Testing Techniques: Adaptation, Specialization, and Integration
12.1 Testing Sub-Phases and Applicable Testing Techniques
12.2 Specialized Test Tasks and Techniqu,es
12.3 Test Integration f
12.4 Case Study: Hierarchical Web Testing
12.5 Concluding Remarks

PART 111 QUALITY ASSURANCE BEYOND TESTING
13 Defect Prevention and Process lmpirovement
13.1 Basic Concepts and Generic Approaches
13.2 Root Cause Analysis for Defect Prevention
13.3 Education and Training for Defect Prevention
13.4 Other Techniques for Defect Prevention
13.4.1 Analysis and modeling for defect prevention
13.4.2 Technologies, standards, and methodologies for defect prevention
13.4.3 Software tools to block defect injection
13.5.1 Process selection, definition, and conformance
13.5.2 Process maturity
13.5 Focusing on Software Processes
13.5.3 Process and quality improvement
13.6 Concluding Remarks

14 Software Inspection
14.1 Basic Concepts and Generic Process
14.2 Fagan inspection
14.3 Other Inspections and Related Activities
14.3.1 Inspections of reduced scope or team size
14.3.2 Inspections of enlarged scope or team size
14.3.3 Informal desk checks, reviews, and walkthroughs
14.3.4 Code reading
14.3.5 Other formal reviews and static analyses
14.4 Defect Detection Techniques, TooYProcess Support, and Effectiveness
14.5 Concluding Remarks
Problems
15 Formal Verification
15.1 Basic Concepts: Formal Verification and Formal Specification
15.2 Formal Verification: Axiomatic Approach
15.2. I Formal logic specifications
15.2.2 Axioms
15.2.3 Axiomatic proofs and a comprehensive example
15.3.1 Weakest pre-conditions and backward chaining
15.3.2 Functional approach and symbolic execution
15.3.3 Seeking alternatives: Model checking and other approaches
15.3 Other Approaches
15.4 Applications, Effectiveness, and Integration Issues
15.5 Concluding Remarks
Problems
16 Fault Tolerance and Failure Containment
16.1 Basic Ideas and Concepts
16.2 Fault Tolerance with Recovery Blocks
16.3 Fault Tolerance with N-Version Programming
16.3.1 NVP: Basic technique and implementation
16.3.2 Ensuring version independence
16.3.3 Applying NVP ideas in other QA activities
16.4 Failure Containment: Safety Assurance and Damage Control
16.4.1 Hazard analysis using fault-trees and event-trees
16.4.2 Hazard resolution for accident prevention
16.4.3 Accident analysis and post-accident damage control
16.5.1 Modeling and analyzing heterogeneous systems
16.5.2 Prescriptive specifications foir safety
16.5 Application in Heterogeneous Systems
16.6 Concluding Remarks

17 Comparing Quality Assurance Techniques and Activities
17.1 General Questions: Cost, Benefit, and Environment
17.2 Applicability to Different Environments
17.3 Effectiveness Comparison
17.3.1 Defect perspective
17.3.2 Problem types
17.3.3 Defect level and pervasiveness
17.3.4 Result interpretation and constructive information
17.4 Cost Comparison
17.5 Comparison Summary and Recommendations

PART IV QUANTIFIABLE QUALITY IMPROVEMENT
18 Feedback Loop and Activities for Quantifiable Quality Improvement
18.1 QA Monitoring and Measurement
18.1.1 Direct vs. indirect quality measurements
18.1.2 Direct quality measurements Result and defect measurements
18.1.3 Indirect quality measurements: Environmental, product internal,and activity measurements
18.2 Immediate Follow-up Actions and Feedback
18.3 Analyses and Follow-up Actions
18.3.1 Analyses for product release decisions
18.3.2 Analyses for other project management decisions
18.3.3 Other feedback and follow-up actions
18.4.1 Feedback loop: Implementation and integration
18.4.2 A refined quality engineering, process
18.4.3 Tool support: Strategy, implementation, and integration
18.4 Implementation, Integration, and Tool Support
18.5 Concluding Remarks

19 Quality Models and Measurements
19.1 Models for Quality Assessment
19.2 Generalized Models
19.3 Product-Specific Models
19.4 Model Comparison and Interconnections
19.5 Data Requirements and Measurement
19.6 Selecting Measurements and Models
19.7 Concluding Remarks

20 Defect Classification and Analysis
20.1 General Types of Defect Analyses
20.1.1 Defect distribution analysis
20.1.2 Defect trend analysis and defect dynamics model
20.1.3 Defect causal analysis
20.2.1 ODC concepts
20.2.2 Defect classification using ODC: A comprehensive example
20.2.3 Adapting ODC to analyze web errors
20.3. I One-way analysis: Analyzing a single defect attribute
20.3.2 Two-way and multi-way analysis: Examining cross-interactions
20.2 Defect Classification and ODC
20.3 Defect Analysis for Classified Data
20.4 Concluding Remarks

21 Risk Identification for Quantifiable Quality Improvement
21.1 Basic Ideas and Concepts
21.2 Traditional Statistical Analysis Techniques
21.3 New Techniques for Risk Identification
2 1.3.1 Principal component and discriminant analyses
2 1.3.2 Artificial neural networks and learning algorithms
21.3.3 Data partitions and tree-based modeling
21.3.4 Pattern matching and optimal set reduction
2 1.4 Comparisons and Integration
2 1.5 Risk Identification for Classified Defect Data
2 1.6 Concluding Remarks

22 Software Reliability Engineering
22.1 SRE: Basic Concepts and General Approaches
22.2 Large Software Systems and Reliability Analyses
22.3 Reliability Snapshots Using IDRMs
22.4 Longer-Term Reliability Analyses Using SRGMs TBRMs for Reliability Analysis and Improvement
22.5.1 Constructing and using TBRMs
22.5.2 TBRM Applications
22.5.3 TBRM’s impacts on reliability improvement Implementation and Software Tool Support

Link:
http://cramitin.net/s8tsa7jl8tjg

http://cramitin.net/ksmo31wxqrwp

http://cramitin.net/u8emtanj93f0

new Link
Part 1 :
http://www.4shared.com/rar/aRzmGWcH/Software_Quality_Engineeringpa.html
Part 2 :
http://www.4shared.com/rar/LDtFSgCc/Software_Quality_Engineeringpa.html
Part 3 :
http://www.4shared.com/rar/sshHoRjn/Software_Quality_Engineeringpa.html

3 comments:

Admin October 10, 2011 at 2:10 AM  

thanks
for more engineering books please visit
http://www.freeengineeringbook.com

deval November 1, 2012 at 11:53 AM  

New link for download :

http://www.mediafire.com/view/?c9o48j4c4jav32s

Post a Comment

Your Ad Here

Blog Catalog

Popular Posts

  © Blogger template On The Road by Ourblogtemplates.com 2009

Back to TOP