Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
260<br />
Index<br />
initialization cost, 171<br />
overhead cost, 169‐171<br />
detecting performance issues,<br />
215‐218<br />
determining NIC mode,<br />
217‐218<br />
monitoring disk I/O, 215‐217<br />
monitoring for locking and<br />
contention, 218<br />
monitoring the load agents,<br />
218<br />
monitoring the network,<br />
217‐218<br />
extrapolating workload profiles,<br />
235‐236<br />
initialization costs, 234‐235<br />
profiler information, 235<br />
load tests described, 167<br />
measuring performance, 218‐228<br />
transaction times, 227‐228<br />
scalability, 228‐234<br />
analysis of Caching<br />
Application Block, 232‐234<br />
analysis of Data Access<br />
Application Block, 231‐232<br />
analysis of Logging<br />
Application Block, 229‐231<br />
bottlenecks, 228<br />
hardware configurations, 229<br />
scenarios and results, 229‐234<br />
scalability tests described, 168<br />
setting up environment, 171‐174<br />
host engine, 171<br />
load tests, 172‐174<br />
tuning, 174<br />
stress tests described, 167<br />
total transactions, 170<br />
performance counters, 215‐217<br />
performance testing<br />
Cryptography Application Block<br />
example, 240‐241, 244‐245<br />
Data Access Application Block<br />
example, 241‐243<br />
see also test cases<br />
permissions, 246<br />
profiler information, 235<br />
pseudo-localization, 163‐164<br />
R<br />
reflection, 240<br />
checklist, 151<br />
ReflectionPermission class, 246<br />
request trees, 176<br />
requirements, 2<br />
resources, 157<br />
S<br />
saturation, 219<br />
scalability see performance and<br />
scalability<br />
scalability tests<br />
Caching Application Block,<br />
232‐234<br />
Data Access Application Block,<br />
231‐232<br />
described, 168<br />
Logging Application Block,<br />
229‐231<br />
scenarios, 229<br />
ScavengerTask class, 254‐255<br />
scenarios<br />
Caching Application Block, 184<br />
Cryptography Application<br />
Block, 205‐206<br />
Cryptography Application Block<br />
test code, 208<br />
.NET Framework test code,<br />
209‐210<br />
Data Access Application Block,<br />
195‐196<br />
Data Access Application Block<br />
test code, 197‐199<br />
Exception Handling Application<br />
Block, 201<br />
Exception Handling Application<br />
Block test code, 202<br />
.NET Framework test code, 202<br />
Logging Application Block, 190<br />
Security Application Block, 213<br />
scope, 1<br />
secrets checklist, 147‐148<br />
security see security best practices;<br />
security testing; threats<br />
Security Application Block, 101‐121<br />
automated tests, 112‐121<br />
automated tests setup, 8<br />
functional testing example,<br />
255‐256<br />
performance and scalability,<br />
213‐215<br />
requirements, 101<br />
scenarios, 213<br />
test cases selection, 102‐103<br />
block code, 102‐103<br />
block design, 102<br />
test cases verification, 103‐111<br />
block code, 105‐111<br />
block design, 103‐105<br />
security best practices, 123‐157<br />
additional resources, 157<br />
Logging Application Block,<br />
124‐132<br />
architectural diagrams, 126‐127<br />
external dependencies, 130‐131<br />
identifying additional security<br />
notes, 132<br />
identifying assets, 124‐126<br />
identifying entry points,<br />
127‐128<br />
identifying relevant classes,<br />
129‐130<br />
implementation assumptions,<br />
131<br />
requirements, 124<br />
security reviews, 142‐156<br />
assembly-level checklist,<br />
143‐144<br />
class-level checklist, 144‐145<br />
code access checklist, 154‐155<br />
cryptography checklist,<br />
145‐147<br />
delegates checklist, 150<br />
design and deployment<br />
checklist, 156<br />
exception management<br />
checklist, 148‐149<br />
general code review checklist,<br />
143