Browse Definitions:
11,850 results for:

black box (black box testing)

Definition | SearchSoftwareQuality

A black box is any device whose workings are not understood by or accessible to its user. According to Edward Tenner, writing in The Washington Post...

white box (white box testing)

Definition | SearchSoftwareQuality

A white box or clear box is a device, program or system whose internal workings are well understood. White box testing, also called white box ...

SSADM (Structured Systems Analysis & Design Method)

Definition | SearchSoftwareQuality

SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often ...

variable manipulation

Definition | SearchSoftwareQuality

Variable manipulation is a method of specifying or editing variables in a computer program... (Continued)

content spoofing

Definition | SearchSoftwareQuality

Content spoofing is a type of exploit used by a malicious hackers to present a faked or modified Web site to the user as if it were legitimate.

dynamic analysis

Definition | SearchSoftwareQuality

Dynamic analysis is the testing and evaluation of a program based on execution with selected data... (Continued)

obfuscation (obfu)

Definition | SearchSoftwareQuality

Obfuscation, in general, describes a practice that is used to intentionally make something more difficult to understand. In a programming context, it...


Definition | SearchSoftwareQuality

In agile software development, a timebox is a defined period of time during which a task must be accomplished. (Continued...)


Definition | SearchSoftwareQuality

In agile software development, a story is a particular business need assigned to the software development team. (Continued...)

OS commanding

Definition | SearchSoftwareQuality

OS commanding is a method of attacking a Web server by remotely gaining access to the operating system (OS) and then executing system commands ...



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.