You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Extensively class-tested, this textbook takes an innovative approach to software testing: it defines testing as the process of applying a few well-defined, general-purpose test criteria to a structure or model of the software. It incorporates the latest innovations in testing, including techniques to test modern types of software such as OO, web applications, and embedded software. The book contains numerous examples throughout. An instructor's solution manual, PowerPoint slides, sample syllabi, additional examples and updates, testing tools for students, and example software programs in Java are available on an extensive website.
This edited volume strives to support leaders in successfully leading their teams, projects and organizations across borders in an increasingly boundaryless world. From both an academic’s and a practitioner’s perspective, the book focuses on international leaders and their potential to be or become enablers of international success, for and within their respective organizations. The authors are a curated selection of established experts, seasoned leaders, and new voices showcasing novel research, best practices, and business cases. The contributions are assigned to three sections, corresponding to the three core challenges of international leadership: Leading international organizations, leading international teams, and (self)leadership with intercultural excellence. An additional section is dedicated to case studies, exhibiting these challenges in practice. The Foundation of the Swiss Society for Organization and Management (SGO) as well as Innosuisse – Swiss Innovation Agency supported the creation of this book.
This book constitutes the refereed proceedings of the Second International Conference on Graph Transformation, ICGT 2004, held in Rome, Italy, in September/October 2004. The 26 revised full papers presented together with three invited contributions and summaries of 2 tutorials and 5 workshops were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on integration technology, chemistry and biology, graph transformation concepts, DPO theory for high-level structures, analysis and testing, graph theory and algorithms, application conditions and logic, transformation of special structures, and object-orientation.
Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent yea...
This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Formal Aspects of Security, FASec 2002, held in London, UK, in December 2002. The 11 revised full papers presented together with 7 invited contributions were carefully reviewed, selected, and improved for inclusion in the book. The papers are organized in topical sections on protocol verification, analysis of protocols, security modelling and reasoning, and intrusion detection systems and liveness.
How can we make sure that the software we build does what it is supposed to? This book provides an insight into established techniques which help developers to overcome the complexity of software development by constructing models of software systems in early design stages. It uses one of the leading formal methods, VDM (Vienna Development Method), and combines training in the formalism with industry-strength tool support and examples derived from real industrial applications. The principles taught here also apply to many of the current generation of formal methods. This second edition has been updated to include advanced online tool support for formal modelling as well as up-to-date reports on real commercial applications in areas as diverse as business information systems and firmware design.
Testing is the primary hardware and software verification technique used by industry today. Usually, it is ad hoc, error prone, and very expensive. In recent years, however, many attempts have been made to develop more sophisticated formal testing methods. This coherent book provides an in-depth assessment of this emerging field, focusing on formal testing of reactive systems. This book is based on a seminar held in Dagstuhl Castle, Germany, in January 2004. It presents 19 carefully reviewed and revised lectures given at the seminar in a well-balanced way ensuring competent complementary coverage of all relevant aspects. An appendix provides a glossary for model-based testing and basics on finite state machines and on labelled transition systems. The lectures are presented in topical sections on testing of finite state machines, testing of labelled transition systems, model-based test case generation, tools and case studies, standardized test notation and execution architectures, and beyond testing.
Presents the history and culture of Amish communities in the United States.
None