Featured
-
Difference between Boundary Value Analysis and Equivalence Partitioning
Both Boundary Value Analysis and Equivalence Parti
by vinay.kumar -
7 Principles Of Testing
Testing shows presence of defects: Testing identi
by mayank.thapliyal -
Bug life cycle
Below are the state of any bug by which bug goes
by vishwanath.rana
Tags
IOT Testing
The Market got the revolution now a days, the revolution of hand held device. Smart Watches, Personal Computer, Home devices, Home TV, Etc all connected with Internet and are operated by hand hold devices like mobile and tablets. So, IOT “I...
Few Approaches For Security Testing
There are many approaches for the security testing purpose when scheduling and arranging for the security based testing. Few approaches are mentioned below:-
Security Architecture Survey
Categorize Security Testing
Security Ar...
Some Common Test Scenarios for Security Testing
Hello, Readers.
By this blog, I am sharing some common test scenarios for the Security Testing. I hope these will help in the time of security testing:-
1- Verify that secure or protect pages should be used HTTPS protocol.
2- Verify for SQ...
Security Testing
What is Security Testing?
Security testing is a type of software testing which is performed by experienced team of testers. The main objective of the Security testing is to ensure that the software is free from any loopholes that may cause los...