Database testing

Results: 337



#Item
41Information technology management / Auditing / Audit / Accounts receivable / Database / Business / Information technology audit process / Information technology audit / Accountancy / Computer-aided audit tools

Conducting Attribute Testing with Data Analysis Software By Don Sparks, CIA, CISA, ARM Q: As an internal auditor, we are approached on a regular basis by software providers offering products that do not appear to have re

Add to Reading List

Source URL: www.audimation.com

Language: English - Date: 2013-05-10 16:57:16
42Relational database management systems / NeoLoad / Load testing / Oracle Database / Application server / HP LoadRunner / Web development / Computing / Software / Software testing

June 2, 2009 NEOTYS Announces NeoLoad 3.0 for Stress and Load Testing of Web Applications New Version is Faster, More Efficient, Provides Better Support of most innovative Development Frameworks including Google Web Tool

Add to Reading List

Source URL: www.neotys.com

Language: English - Date: 2012-08-01 05:18:16
43Data management / Database / Software / Relational database management systems / Data / Cross-platform software / Software Reliability Testing / Software testing / Database theory / Database management systems

DBBalance Ltd. P.O.B. 3702, Ramat-Gan, IsraelTel/Fax: +

Add to Reading List

Source URL: www.dbbalance.com

Language: English - Date: 2011-11-05 17:49:36
44Software testing / Neotys / Oracle Corporation / Enterprise software / Oracle Database / Load testing / Rolta India Ltd / Software / Computing / Information technology management

PDF Document

Add to Reading List

Source URL: www.neotys.com

Language: English - Date: 2012-08-01 05:18:17
45Science / Financial regulation / Systemically important financial institution / Software testing / Systems engineering / Database trigger / Crisis management / Stress testing / Planning / Management / Business / Systemic risk

Recovery and Resolution Planning: Making the Key Attributes Requirements Operational Consultative Document November 2012

Add to Reading List

Source URL: www.financialstabilityboard.org

Language: English - Date: 2014-09-19 10:17:30
46Network management / Software testing / ColdFusion / Load testing / Load / Database / Web server / User experience / Computing / Software / FusionReactor

SlowShop.com  SuperShop.com A practical example of how FusionReactor v5 can identify 10 common problems in ColdFusion applications.

Add to Reading List

Source URL: www.fusion-reactor.com

Language: English - Date: 2013-10-21 12:10:51
47Failure / Computer network security / Software testing / Vulnerability database / Vulnerability / Social vulnerability / Attack / Cyberwarfare / Risk / Computer security

SOFTWARE VULNERABILITY ANALYSIS A Thesis Submitted to the Faculty of Purdue University

Add to Reading List

Source URL: www.dbnet.ece.ntua.gr

Language: English - Date: 2001-12-12 02:52:38
48Pension / Employment compensation / Defined contribution plan / 401 / Cash balance plan / 403 / Employee Share Ownership Plan / Retirement plans in the United States / Thrift Savings Plan / Financial economics / Economics / Internal Revenue Code

DC/401(k) Defined Contribution System For Proposals, Administration & Testing Dollar and share accounting ► Date sensitive database ► Easy navigation

Add to Reading List

Source URL: www.datair.com

Language: English - Date: 2013-10-14 10:56:12
49Computer network security / Software testing / Auditing / Database security / Vulnerability / Information technology security audit / Application security / Audit / TRAC / Security / Cyberwarfare / Computer security

Case Study: Web Application & Database Security Audit (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:47
50Cross-platform software / Scripting languages / Relational database management systems / Database management systems / Software testing / Vulnerability / Cross-site scripting / SQL injection / Code injection / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-08-18 12:06:49
UPDATE