Filters








2 Hits in 4.6 sec

Guest Editors' Introduction: TDD--The Art of Fearless Programming

Ron Jeffries, Grigori Melnik
2007 IEEE Software  
As TDD practitioners, we think of what small step in capability would be a good next addi-tion to the program.  ...  Finally, we 2 4 I E E E S O F T W A R E P u b l i s h e d b y t h e I E E E C o m p u t e r S o c i e t y 0 7 4 0 -7 4 5 9 / 0 7 / $ 2 5 . 0 0 © 2 0 0 7 I E E E focus TDD: The Art Programmers!  ...  Acknowledgments We thank the 32 groups of authors who responded to our call for papers.  ... 
doi:10.1109/ms.2007.75 fatcat:wv6e6t2b4bdiboj762wsoixj2i

The State of Security Vulnerabilities in SCADA Human Machine Interface (HMI) Components Inherent design flaws and vulnerabilities that allow attackers to take control of SCADA systems

Elfriede Dustin, Kevin Caldwell, Aditya Sood
unpublished
Acknowledgement: I would like to thank DEFCON reviewers for selecting the research to be presented at DEFCON 23.  ...  I would also like to thank Industrial Control Systems (ICS) Computer Emergency Response Team (CERT) for working with vendors to provide support in patching the vulnerabilities highlighted in this research  ...  Refactoring is an important part of many agile development methodologies, such as extreme programming (XP) [6] and testdriven development (TDD) [7] .  ... 
fatcat:l453czkkffcrblll7k7op6pnyu