07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

260<br />

Index<br />

initialization cost, 171<br />

overhead cost, 169‐171<br />

detecting performance issues,<br />

215‐218<br />

determining NIC mode,<br />

217‐218<br />

monitoring disk I/O, 215‐217<br />

monitoring for locking and<br />

contention, 218<br />

monitoring the load agents,<br />

218<br />

monitoring the network,<br />

217‐218<br />

extrapolating workload profiles,<br />

235‐236<br />

initialization costs, 234‐235<br />

profiler information, 235<br />

load tests described, 167<br />

measuring performance, 218‐228<br />

transaction times, 227‐228<br />

scalability, 228‐234<br />

analysis of Caching<br />

Application Block, 232‐234<br />

analysis of Data Access<br />

Application Block, 231‐232<br />

analysis of Logging<br />

Application Block, 229‐231<br />

bottlenecks, 228<br />

hardware configurations, 229<br />

scenarios and results, 229‐234<br />

scalability tests described, 168<br />

setting up environment, 171‐174<br />

host engine, 171<br />

load tests, 172‐174<br />

tuning, 174<br />

stress tests described, 167<br />

total transactions, 170<br />

performance counters, 215‐217<br />

performance testing<br />

Cryptography Application Block<br />

example, 240‐241, 244‐245<br />

Data Access Application Block<br />

example, 241‐243<br />

see also test cases<br />

permissions, 246<br />

profiler information, 235<br />

pseudo-localization, 163‐164<br />

R<br />

reflection, 240<br />

checklist, 151<br />

ReflectionPermission class, 246<br />

request trees, 176<br />

requirements, 2<br />

resources, 157<br />

S<br />

saturation, 219<br />

scalability see performance and<br />

scalability<br />

scalability tests<br />

Caching Application Block,<br />

232‐234<br />

Data Access Application Block,<br />

231‐232<br />

described, 168<br />

Logging Application Block,<br />

229‐231<br />

scenarios, 229<br />

ScavengerTask class, 254‐255<br />

scenarios<br />

Caching Application Block, 184<br />

Cryptography Application<br />

Block, 205‐206<br />

Cryptography Application Block<br />

test code, 208<br />

.NET Framework test code,<br />

209‐210<br />

Data Access Application Block,<br />

195‐196<br />

Data Access Application Block<br />

test code, 197‐199<br />

Exception Handling Application<br />

Block, 201<br />

Exception Handling Application<br />

Block test code, 202<br />

.NET Framework test code, 202<br />

Logging Application Block, 190<br />

Security Application Block, 213<br />

scope, 1<br />

secrets checklist, 147‐148<br />

security see security best practices;<br />

security testing; threats<br />

Security Application Block, 101‐121<br />

automated tests, 112‐121<br />

automated tests setup, 8<br />

functional testing example,<br />

255‐256<br />

performance and scalability,<br />

213‐215<br />

requirements, 101<br />

scenarios, 213<br />

test cases selection, 102‐103<br />

block code, 102‐103<br />

block design, 102<br />

test cases verification, 103‐111<br />

block code, 105‐111<br />

block design, 103‐105<br />

security best practices, 123‐157<br />

additional resources, 157<br />

Logging Application Block,<br />

124‐132<br />

architectural diagrams, 126‐127<br />

external dependencies, 130‐131<br />

identifying additional security<br />

notes, 132<br />

identifying assets, 124‐126<br />

identifying entry points,<br />

127‐128<br />

identifying relevant classes,<br />

129‐130<br />

implementation assumptions,<br />

131<br />

requirements, 124<br />

security reviews, 142‐156<br />

assembly-level checklist,<br />

143‐144<br />

class-level checklist, 144‐145<br />

code access checklist, 154‐155<br />

cryptography checklist,<br />

145‐147<br />

delegates checklist, 150<br />

design and deployment<br />

checklist, 156<br />

exception management<br />

checklist, 148‐149<br />

general code review checklist,<br />

143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!