
Featured
- 
            
              Difference between Boundary Value Analysis and Equivalence PartitioningBoth Boundary Value Analysis and Equivalence Parti by vinay.kumar
- 
            
              7 Principles Of TestingTesting shows presence of defects: Testing identi by mayank.thapliyal
- 
            
              Bug life cycleBelow are the state of any bug by which bug goes by vishwanath.rana
Tags
IOT Testing
                      The Market got the revolution now a days, the revolution of hand held device. Smart Watches, Personal Computer, Home devices, Home TV, Etc all connected with Internet and are operated by hand hold devices like mobile and tablets. So, IOT “I... 
                      Few Approaches For Security Testing
                      There are many approaches for the security testing purpose when scheduling and arranging for the security based testing. Few approaches are mentioned below:-
 
	Security Architecture Survey
	Categorize Security Testing
	Security Ar... 
                      Some Common Test Scenarios for Security Testing
                      Hello, Readers.
By this blog, I am sharing some common test scenarios for the Security Testing. I hope these will help in the time of security testing:-
1- Verify that secure or protect pages should be used HTTPS protocol.
2- Verify for SQ... 
                      Security Testing
                      What is Security Testing?
Security testing is a type of software testing which is performed by experienced team of testers. The main objective of the Security testing is to ensure that the software is free from any loopholes that may cause los... 
                       
        
        
 
        
         
        
        