Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Index 259<br />
K<br />
key files, 244<br />
keys<br />
key files, 244<br />
symmetric, 244<br />
unique, 184‐185<br />
L<br />
<strong>Library</strong> 1.1, 188<br />
Little’s Law, 235‐236<br />
load agents, 218<br />
load tests<br />
creating, 182‐183<br />
described, 167<br />
setup, 172‐174<br />
localization see globalization best<br />
practices<br />
LocalMachine, 249‐250<br />
locking and contention, 218<br />
log file’s directory path, 140‐141<br />
log messages, 136<br />
Logging Application Block, 64‐99<br />
assets, 125‐126<br />
automated tests, 95‐99<br />
performance and scalability,<br />
189‐195<br />
performance testing example,<br />
243‐244<br />
scalability tests, 229‐231<br />
scenarios, 190<br />
security best practices, 124‐132<br />
test cases selection, 85‐87<br />
block code, 86‐87<br />
block design, 86<br />
test cases verification, 87‐95<br />
block code, 88‐95<br />
block design, 87‐88<br />
threats, 132‐133<br />
M<br />
managed code review checklists,<br />
143‐152<br />
memory leaks, 236‐238<br />
message queue threats, 137<br />
metrics<br />
Caching Application Block,<br />
188‐189<br />
Cryptography Application<br />
Block, 211‐212<br />
Data Access Application Block,<br />
200‐201<br />
Exception Handling Application<br />
Block, 203‐204<br />
Logging Application Block,<br />
192‐195<br />
transactions, 219<br />
N<br />
.NET Framework test code<br />
Cryptography Application Block<br />
test code, 209‐210<br />
Exception Handling Application<br />
Block test code, 202<br />
network monitoring, 217‐218<br />
NIC mode, 217‐218<br />
.NUnit.sln, 6<br />
O<br />
overhead costs, 169‐171<br />
P<br />
performance and scalability,<br />
167‐238<br />
application blocks, 183‐215<br />
Caching Application Block,<br />
183‐189<br />
creating a test harness,<br />
184‐185<br />
creating the test code,<br />
185‐187<br />
generating unique keys,<br />
184‐185<br />
profiling the work load,<br />
187‐188<br />
recording the metrics,<br />
188‐189<br />
setting up a load test, 188‐189<br />
Cryptography Application<br />
Block, 204‐212<br />
creating a test harness,<br />
206‐207<br />
creating the test code,<br />
207‐211<br />
recording the metrics,<br />
211‐212<br />
Data Access Application Block,<br />
195‐201<br />
creating a test harness, 196<br />
creating the test code,<br />
196‐199<br />
recording the metrics,<br />
200‐201<br />
Exception Handling<br />
Application Block, 201‐204<br />
creating a test harness, 201<br />
creating the test code,<br />
202‐203<br />
recording the metrics,<br />
203‐204<br />
Logging Application Block,<br />
189‐195<br />
creating a test harness, 190<br />
creating the test code,<br />
190‐192<br />
recording the metrics,<br />
192‐195<br />
Security Application Block,<br />
213‐215<br />
creating a test harness, 213<br />
creating the test code,<br />
213‐215<br />
building test harnesses, 174‐183<br />
creating a load test, 182‐183<br />
creating a Web test script,<br />
176‐177<br />
data binding, 179‐181<br />
defining the workload profile,<br />
181‐182<br />
illustration, 175<br />
using the Web test script,<br />
177‐179<br />
debugging memory leaks,<br />
236‐238<br />
WinDbg, 237<br />
defining performance criteria,<br />
169‐171