Skip to content
BBST® Courses Logo
  • ABOUT
    • The BBST® Story
    • Get involved
    • Press Reviews
  • SPECIALIZATIONS
    • Professional Software Testing
    • Effective Bug Investigation & Reporting
    • Strategy and Test Design
  • COURSES
    • Foundations
    • Bug Advocacy
    • Test Design
    • Domain Testing
  • WORKSHOPS
    • Intro to State Model-Based Testing
    • Intro to Test Automation
  • RESOURCES
    • Open course materials
    • Digital Library
    • Blog
    • Webinars
    • FAQ
  • My Account

test design

  • Jacek Czerwonka
    Digital Library

    Jacek Czerwonka: Pairwise Testing in the Real World

    BBST® courses

    February 15, 2014

  • Five Reasons for Scenario-Based Design
    Digital Library

    John M. Carroll: Five Reasons for Scenario-Based Design

    BBST® courses

    February 15, 2014

  • Why We Do Scenario Testing, by Michael Bolton
    Digital Library

    Michael Bolton: Why We Do Scenario Testing

    BBST® courses

    February 15, 2014

  • How to Read a Book: The Classic Guide to Intelligent Reading Paperback – August 15, 1972
    Digital Library

    Adler, M., & Van Doren, C.: How to Read a Book

    BBST® courses

    February 15, 2014

  • Whittaker, J.A. (2002) How to Break Software, Boston: Addison Wesley (BOOK)
    Digital Library

    Whittaker, J.A.: How to Break Software, Boston: Addison Wesley

    BBST® courses

    February 6, 2014

  • Digital Library

    Myers, G. J. : The Art of Software Testing

    BBST® courses

    February 6, 2014

  • Digital Library

    Gause, D.C., & Weinberg, G.M. : Exploring Requirements: Quality Before Design

    BBST® courses

    February 1, 2014

  • Digital Library

    Copeland, L. : A Practitioner’s Guide to Software Test Design

    BBST® courses

    February 1, 2014

  • Kelly Touring Heuristic
    Digital Library

    Michael Kelly: Touring Heuristic

    BBST® courses

    February 1, 2014

  • Cem Kaner and Bob Johnson
    Digital Library

    Cem Kaner and Bob Johnson: Styles of Exploration

    Cem Kaner

    February 1, 2014

  • Cem Kaner Teaching the Software Testing Course A Tutorial
    Digital Library

    Cem Kaner: Teaching the Software Testing Course: A Tutorial

    Cem Kaner

    February 1, 2014

  • Cem Kaner, Jack Falk, Hung Quoc Nguyen_ Testing Computer Software
    Digital Library

    Cem Kaner, Jack Falk, Hung Quoc Nguyen: Testing Computer Software

    Cem Kaner

    February 1, 2014

Previous123Next

Continue your exploration with our blog, digital library, or webinars.

CONTACT US

If you want to contact us or find out more info about the courses, find us at:

contact@bbst.courses

FI: +358 458858554 (Mo-Fr, 09:00-18:00 GMT+2)

RO:+4 0371 426 297 (Mo-Fr, 09:00-18:00 GMT+2)

COMPANY INFO

Altom Consulting

28 Avram Iancu, Mezzanine Floor
Cluj-Napoca 400089
Romania

VAT No: RO24111715
Reg. No.: J12/2808/26.06.2008

https://altom.com

POLICIES

Cookie Policy

Privacy Policy

Terms and Conditions

AFFILIATES

Affiliate Program

Affiliate Program Agreement

Affiliate Log In

© 2025 ALTOM CONSULTING - ALL RIGHTS RESERVED
FacebookXLinkedInVimeo
Page load link
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Go to Top