O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B: Mobile and Embedded Coding Rules

This appendix, like Chapter 2, may seem out of place to some traditional testers, but the testing world is evolving. Testers need to support the team and all stakeholders—including developers. This is true even if you are not on an agile team. But, for those working on agile teams, knowledge of code, coding rules, and attacks, such as those found in Chapter 2, makes you a much more valued tester. Testing may not be dead, but it is evolving. This appendix presents coding rules and includes pointers to other resources.

Yes, Attack 1 can find “code rule problems,” since many of the tools covered are really designed to check for “rule violation.” But why wait for a rule to be violated? It can be better ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required