2.3 Producing robust programs

PDF Video Other resources
2.3.1 Defensive design considerations:
2.3.1a input sanitation/validation
2.3.1b planning for contingencies
2.3.1c anticipating misuse
2.3.1d authentication
2.3.1a
2.3.1b
2.3.2 Maintainability:
2.3.2a comments
2.3.2b indentation
 2.3.2
2.3.3 The purpose of testing  2.3.3
2.3.4 Types of testing:
2.3.4a iterative
2.3.4b final/terminal
 2.3.4
2.3.5 How to identify syntax and logic errors  2.3.5
2.3.6 Selecting and using suitable test data  2.3.6