Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Index<br />
Symbols<br />
section, 17‐18<br />
section, 17<br />
.NET Framework test code<br />
Cryptography Application Block<br />
test code, 209‐210<br />
Exception Handling Application<br />
Block test code, 202<br />
.NUnit.sln, 6<br />
.VSTS.sln, 6<br />
A<br />
acknowledgments, 9<br />
additional resources, 157<br />
application blocks<br />
globalization best practices,<br />
159‐160<br />
performance and scalability,<br />
183‐215<br />
architectural diagrams, 126‐127<br />
ASP.NET, 169‐171<br />
ASP.NET Framework test code,<br />
187‐189<br />
assemblies threats, 132‐133<br />
assembly-level checklist, 143‐144<br />
AssemblyInfo files, 246<br />
audience, 1<br />
automated tests, 5‐8<br />
B<br />
best practices see globalization<br />
best practices; security best<br />
practices<br />
bottlenecks<br />
I/O performance, 217<br />
scalability, 228<br />
C<br />
CacheManager type object,<br />
178‐179<br />
Caching Application Block, 23‐40<br />
automated tests, 36‐40<br />
automated tests setup, 6<br />
code test cases, 24‐25<br />
design test cases, 24<br />
functional testing example,<br />
254‐255<br />
performance and scalability,<br />
183‐189<br />
requirements, 23<br />
scalability tests, 232‐234<br />
scenarios, 184<br />
test cases selection, 23‐25<br />
test cases verification, 25‐36<br />
block code, 27‐30<br />
block design, 25‐26<br />
Visual Studio Team System tests,<br />
36‐40<br />
Caching Application Block test<br />
code, 185‐187<br />
section, 17‐18<br />
checklists, 143‐156<br />
assembly-level, 143‐144<br />
class-level, 144‐145<br />
code access, 154‐155<br />
cryptography, 145‐147<br />
delegates, 150<br />
design and deployment, 156<br />
exception management, 148‐149<br />
general code review, 143<br />
managed code reviews, 143‐152<br />
reflection, 151<br />
secrets, 147‐148<br />
serialization, 150‐151<br />
unmanaged code access, 152<br />
class-level checklist, 144‐145<br />
classes, 129‐130<br />
code access checklist, 154‐155<br />
code access security, 246<br />
code reviews, 5<br />
configuration files<br />
altering directory path, 140‐141<br />
threats, 133‐134<br />
configuration sources, 251<br />
contents, 8<br />
conversion see globalization best<br />
practices<br />
costs see initialization costs;<br />
overhead costs<br />
counters, 215‐217<br />
Cryptography Application Block,<br />
41‐54<br />
automated tests, 51‐54<br />
automated tests setup, 7<br />
code checklist example, 5<br />
code test cases example, 4<br />
design test cases example, 3<br />
design verification example, 4<br />
functional testing example,<br />
249‐250<br />
memory leaks, 236‐237<br />
.NET Framework test code<br />
scenarios, 209‐210<br />
performance and scalability,<br />
204‐212<br />
performance testing examples,<br />
240‐241, 244‐245<br />
requirements, 23<br />
scenarios, 205‐206<br />
security testing example,<br />
248‐249<br />
test cases selection, 41‐43<br />
block code, 42‐43<br />
block design, 42<br />
test cases verification, 43‐51<br />
block code, 45‐51<br />
block design, 43‐45<br />
cryptography checklist, 145‐147<br />
CryptographyUtility.<br />
ZeroOutBytes method, 249<br />
Crypto<strong>Test</strong>Script.bat, 7<br />
D<br />
Data Access Application Block,<br />
55‐67<br />
automated tests, 64‐66<br />
automated tests setup, 7<br />
functional testing example,<br />
250‐252<br />
performance and scalability,<br />
195‐201<br />
performance testing example,<br />
241‐243