Власник перекладу встановив такі правила доступу, що ви не можете переглядати чужі варіанти перекладів тут.
See Also: attacker
A person or organization who is actively involved in security attacks, usually with malicious intent.
hardware-software integration testing
See Also: integration testing
Testing performed to expose defects in the interfaces and interaction between hardware and software
Transformation of a variable length string of characters into a usually shorter fixed-length value or key. Hashed values, or hashes, are commonly used in table or database lookups. Cryptographic hash functions are used to secure data.
See Also: risk analysis
A technique used to characterize the elements of risk. The result of a hazard analysis will drive the methods used for development and testing of a system.
A usability review technique that targets usability problems in the user interface or user interface design. With this technique, the reviewers examine the interface and judge its compliance with recognized usability principles (the "heuristics").
The tracing of requirements for a test level through the layers of test documentation (e.g., test plan, test design specification, test case specification and test procedure specification or test script).
A pointer within a web page that leads to other web pages.
hyperlink test tool
A tool used to check that no broken hyperlinks are present on a web site.