Video | Other resources | ||
2.3.1 Defensive design considerations: 2.3.1a input sanitation/validation 2.3.1b planning for contingencies 2.3.1c anticipating misuse 2.3.1d authentication |
2.3.1a 2.3.1b |
||
2.3.2 Maintainability: 2.3.2a comments 2.3.2b indentation |
2.3.2 | ||
2.3.3 The purpose of testing | 2.3.3 | ||
2.3.4 Types of testing: 2.3.4a iterative 2.3.4b final/terminal |
2.3.4 | ||
2.3.5 How to identify syntax and logic errors | 2.3.5 | ||
2.3.6 Selecting and using suitable test data | 2.3.6 |