Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 38360 dokumen yang sesuai dengan query
cover
Howden, William E.
New York: McGraw-Hill, 1987
001.642 HOW f (1);001.642 HOW f (2)
Buku Teks SO  Universitas Indonesia Library
cover
Howden, William E.
New York: McGraw-Hill, 1987
001.642 HOW f
Buku Teks SO  Universitas Indonesia Library
cover
Van Tassel, Dennie
Englewood Cliffs, NJ: Prentice-Hall, 1974
005.1 TAS p
Buku Teks SO  Universitas Indonesia Library
cover
New York: Cambridge university press, 2008
005.133 MOD
Buku Teks  Universitas Indonesia Library
cover
Becker, Hal B.
New York: John Wiley & Sons, 1973
001.5 BEC f
Buku Teks  Universitas Indonesia Library
cover
Wulan Mantiri
"Pengujian perangkat lunak, secara spesifik regression testing, adalah sebuah proses yang diperlukan ketika perangkat lunak atau lingkungannya berubah untuk memastikan bahwa perangkat lunak masih bekerja sesuai dengan ekspektasi. Termotivasi oleh kebutuhan industri nyata, penelitian ini melaporkan pengalaman dalam melakukan transisi dari regression testing manual menjadi otomatis bagi salah satu aplikasi di PT. XYZ. Sebelum penelitian, regression testing dilakukan secara manual yang bersifat subjektif dan menghabiskan banyak biaya. Otomatisasi pengujian pun diterapkan pada tahap eksekusi dan integrasi hasil pengujian sebagai upaya untuk meningkatkan produktivitas dan efisiensi pengujian. Untuk mencari alternatif eksekusi pengujian yang efisien, eksperimen dilakukan dengan memisahkan alur yang menjalankan tes yang terkait perubahan dengan teknik seleksi dan alur yang menjalankan semua tes. Berdasarkan analisis aplikasi yang diuji, setiap alur memiliki kelebihan dan kekurangannya masing-masing. Hasil penelitian menunjukkan bahwa otomatisasi pengujian dapat memberi manfaat untuk regression testing, rilis aplikasi, dan alur pengembangan aplikasi. Kerangka yang dipaparkan dalam makalah ini diharapkan dapat dijadikan sebagai pedoman untuk aplikasi industri lainnya dengan spesifikasi serupa yang juga ingin menerapkan otomatisasi pengujian.

Software testing, particularly regression testing, is required when there are changes in the software or its environment to ensure that the software still performs as expected. Motivated by real industry needs, this study reports on the experience of transitioning from manual to automated regression testing in one of the mobile applications at PT. XYZ. Prior to this study, regression testing was conducted manually which incurred a lot of costs and was by nature subjective. Test automation is then applied to the activities of test execution and test result integration as an effort to increase test productivity and efficiency. To make the test execution efficient, this study conducts an experiment by separating the flow that runs the tests related to changes using regression test selection technique and the flow that runs all tests. Based on the empirical analysis, each flow has its own trade-offs. The results show that test automation can provide benefits for regression testing, application releases, and software engineering flow. The framework presented in this paper aims to serve as a guideline for other industrial applications with similar specifications that are also considering to implement test automation."
Jakarta: Fakultas Ilmu Komputer Universitas Indonesia, 2022
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Field, Anthony J.
Workingham, England: Addison-Wesley, 1988
005.11 FIE f
Buku Teks SO  Universitas Indonesia Library
cover
Chusnul Nabila
"Ancaman keamanan terhadap website biasa dihasilkan melalui celah yang memungkinkan pengguna lain melakukan tindak kejahatan. Untuk pemeliharaan keamanan website yang baik, deteksi kerentanan website dapat dilakukan dengan prosedur vulnerability identification dan penetration testing. Penetration Testing Execution Standard (PTES) digunakan pada penelitian ini sebagai kerangka kerja atau framework penetration testing dengan tujuan untuk mendapatkan hasil akhir berupa kerentanan yang dapat mengganggu keamanan website. Terdapat tujuh tahapan yang akan dilakukan pada framework PTES yaitu Pre-engagement Interactions, Intelligence Gathering, Threat Modeling, Vulnerability Analysis, Exploitation, Post Exploitation, dan Reporting. Penetration testing ini juga menerapkan metode blackbox testing. Blackbox testing adalah metode pengujian yang dilakukan tanpa mengetahui informasi apa pun mengenai sistem website. Ditemukan tiga kerentanan dengan tingkat risiko tinggi pada website redstorm setelah melakukan penetration testing dengan framework PTES dan metode blackbox testing, yaitu PII Disclosure, SQL Injection, dan SQL Injection-SQLite. Hasil ini menekankan perlunya penguatan keamanan website dan penerapan langkah-langkah mitigasi yang sesuai untuk melindungi data sensitif dan melawan potensi serangan. Selain itu, penelitian ini menegaskan efektivitas dan relevansi kerangka kerja PTES dalam mengidentifikasi kerentanan keamanan sistem. Implikasi dari temuan ini memberikan kontribusi bagi pengembangan kebijakan keamanan informasi dan penelitian tentang keamanan siber yang lebih lanjut.

Security threats to common websites are generated by gaps that allow other users to commit criminal acts. For good website security maintenance, website vulnerability detection can be done with vulnerability identification and penetration testing procedures. The Penetration Testing Execution Standard (PTES) is used in this research as a framework for penetration testing with the aim of obtaining the final result of vulnerabilities that can interfere with the operation of the website. There are seven stages that will be performed on the PTES framework: Pre-engagement Interactions, Intelligence Gathering, Threat Modeling, Vulnerability Analysis, Exploitation, Post-exploitation, and Reporting. The penetration test also uses the blackbox testing method. Blackbox testing is a test method that is performed without knowing any information about the website system. Three high-risk vulnerabilities were found on Redstorm websites after performing penetration testing with the PTES framework and blackbox testing methods, namely PII Disclosure, SQL Injection, and SQL injection-SQLite. The results emphasize the need to strengthen website security and implement appropriate mitigation measures to protect sensitive data and counter potential attacks. In addition, the study confirms the effectiveness and relevance of the PTES framework in identifying system security vulnerabilities. The implications of these findings contribute to the development of information security policies and further research on cybersecurity.
"
Depok: Fakultas Teknik Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Hansen, Michael R.
" Getting started In this chapter we will introduce some of the main concepts of functional programming languages. In particular we will introduce the concepts of value, expression, declaration, recursive function and type. Furthermore, to explain the meaning of programs we will introduce the notions: binding, environment and evaluation of expressions. The purpose of the chapter is to acquaint the reader with these concepts, in order to address interesting problems from the very beginning. The reader will obtain a thorough knowledge of these concepts and skills in applying them as we elaborate on them throughout this book. There is support of both compilation of F♯ programs to executable code and the execution of programs in an interactive mode. The programs in this book are usually illustrated by the use of the interactive mode. The interface of the interactive F♯ compiler is very advanced as e.g. structured values like tuples, lists, trees and functions can be communicated directly between the user and the system without any conversions. Thus, it is very easy to experiment with programs and program designs and this allows us to focus on the main structures of programs and program designs, i.e. the core of programming, as input and output of structured values can be handled by the F♯ system"
Cambrigde : Cambrigde University Press , 2013
005.1 HAN f
Buku Teks SO  Universitas Indonesia Library
cover
Sunnyvale: Spectrum Software, 1985
001.642 MIC
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>