ISTQB – Capability Maturity Module Integration (CMMI) Part 2
In last article we have understood about the CMMI and its 2 level. Now in this article, we will see the Level […]
In last article we have understood about the CMMI and its 2 level. Now in this article, we will see the Level […]
In last articles we have seen about the software verification process and software validation process which plays a major role in software […]
In last article, we have seen the verification procedure of software testing. Now lets move to the validation procedure. In this procedure […]
In last article we have seen about the software quality and we have completed first chapter of ISTQB there. Now let’s begin […]
In last article, we have define the independent testing. Now in this article, we will understand the quality of software. Quality of […]
Independent word itself describes that other person cannot present their views in our working system. In Independent testing single resource or team […]
In last article we have seen about the software testing procedures. Now in this article we will discuss about the different kind […]
In last article we have seen about the detail description about the 3rd level of software testing process. Now let’s move to […]
In last article we have seen about the 3rd level of software testing process. 3rd level is define under two layer. First […]
In last article we have seen that Testing is not a single phase activity. It has many processes to follow. We have […]
In last article we have seen about the concepts of software testing. Now in this article, we will understand the software testing […]
We have seen the Defect life cycle and how can we post the bug while doing testing procedure for our application. Now […]
In last article, we have seen that how we can post the bug but each bug have their priority and severity, According […]
In Last article, we have seen that how bug can be arise while developing a software. Now in this article, we will […]
In last article we have seen that what the purpose of testing is. Now, in this article we will see the possibilities […]
ISTQB (International Software Testing Qualifications board) examination is based on software testing that have been known by past articles now here we […]
As we have seen in last article that failure and defect can be leads to the big damage of the application but […]
We have already understood what is ‘software testing’ in software development life cycle. Here we will learn how it is required and […]
In the previous article we have seen that why software testing is required. Now it’s important to understand the procedures and objectives […]
As we have seen the instruction about ISTQB in previous article. Now it’s time to verify the procedure that what is the […]
ISTQB is stands for International Software Testing Qualifications Board Which is an international organization and provide recognized certification globally for software testers. […]
In this section we will cover the topic about Necessary of testing. This topic came in ‘K2’ section. All the terms like […]
Penetration test process is basically used for finding security vulnerability from application. There are static and dynamic data are present in application […]
We have discussed about WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access) in our last article. This […]
Web application security risk is explained in OWASP. This is worldwide community for security which explained about security risk to people or […]
Wireless security is connected with the protection of device like computers, laptops, mobile phones, tablet which is attached with external network. How […]
Security testing is the most important testing type for finding vulnerability in the web site. Now a day’s Online transaction have taken […]
1. What is Security Testing? Security testing itself explain that how can we protect our personal data by hacking, code damage or […]
Is is pronounced as HashMap because It is hash table based implementation of map interface. It extends AbstractMap class and implements Map […]
Java Map interface represents the mapping between unique keys to values. Map can not hold duplicate values. In Map interface, Each key […]