Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
Enterprise Library Test Guide - Willy .Net
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Index 261<br />
managed code review<br />
checklists, 143‐152<br />
reflection checklist, 151<br />
resource access checklist,<br />
152‐153<br />
secrets checklist, 147‐148<br />
serialization checklist, 150‐151<br />
threading checklist, 151<br />
unmanaged code access<br />
checklist, 152<br />
threat models, 132‐142<br />
security notes, 132<br />
security testing<br />
Cryptography Application<br />
Block, 248‐249<br />
Data Access Application Block,<br />
247<br />
see also test cases<br />
serialization checklist, 150‐151<br />
solution files, 6<br />
stress tests described, 167<br />
Strgen tool, 160<br />
STRIDE, 132<br />
strong names, 132‐133<br />
symmetric keys, 244<br />
SymmetricAlgorithm-<br />
InstrumentationBinder class,<br />
241<br />
SymmetricCryptographer class,<br />
248<br />
SymmetricCryptoProviderFactory<br />
class, 241<br />
system requirements, 2<br />
system resources, 219<br />
SystemConfigurationSource class,<br />
241‐242<br />
T<br />
templates<br />
ASP.NET, 189<br />
Caching Application Block,<br />
188‐189<br />
Cryptography Application<br />
Block, 211‐212<br />
Data Access Application Block,<br />
200‐201<br />
<strong>Enterprise</strong> <strong>Library</strong>-January 2006,<br />
189<br />
Exception Handling Application<br />
Block, 203‐204<br />
Logging Application Block,<br />
193‐195<br />
test cases, 239‐256<br />
functional testing, 249‐256<br />
Caching Application Block,<br />
254‐255<br />
Cryptography Application<br />
Block, 249‐250<br />
Data Access Application Block,<br />
250‐252<br />
Exception Handling<br />
Application Block, 252‐253<br />
Logging Application Block,<br />
253<br />
Security Application Block,<br />
255‐256<br />
overview, 3‐4<br />
performance testing, 239‐245<br />
FileConfigurationSource class,<br />
241‐243<br />
general performance tests,<br />
240‐243<br />
goals, 239<br />
instrumentation objects,<br />
240‐241<br />
specific performance tests,<br />
243‐245<br />
Cryptography Application<br />
Block, 244‐245<br />
Logging Application Block,<br />
243‐244<br />
security testing, 245‐249<br />
general security tests, 246<br />
specific security tests, 247‐249<br />
Cryptography Application<br />
Block, 248‐249<br />
Data Access Application<br />
Block, 247‐248<br />
test code<br />
Caching Application Block,<br />
185‐187<br />
Cryptography Application<br />
Block, 207‐211<br />
Data Access Application Block,<br />
196‐199<br />
Exception Handling Application<br />
Block, 202‐203<br />
Logging Application Block,<br />
190‐192<br />
Security Application Block,<br />
213‐215<br />
test harnesses<br />
Caching Application Block,<br />
174‐175, 184‐185<br />
Cryptography Application<br />
Block, 206‐207<br />
Data Access Application Block,<br />
196<br />
Exception Handling Application<br />
Block, 201<br />
Logging Application Block, 190<br />
Security Application Block, 213<br />
test project creation, 176<br />
test scripts, 184‐185<br />
testing see functional testing;<br />
performance testing; security<br />
testing<br />
think times, 181<br />
threading checklist, 151<br />
threat 1, 132‐133<br />
threat 2, 133‐134<br />
threat 3, 134<br />
threat 4, 134‐135<br />
threat 5, 135‐136<br />
threat 6, 136<br />
threat 7, 137<br />
threat 8, 137<br />
threat 9, 138‐140<br />
threat 10, 140<br />
threat 11, 140‐141<br />
threat 12, 141<br />
threat classifications, 246<br />
threats<br />
assemblies, 132‐133<br />
configuration files, 133‐134<br />
e-mail, 137<br />
message queues, 137<br />
tokens, 255‐256<br />
total hits see total transactions<br />
total transactions, 170