Flylib.com
Index_V
Previous page
Table of content
Next page
V
Validating (self) tests, Test case (NUnit), 240 “241
assertions, 243 “244
test fixtures, 241 “242
test runners, 242
test suites, 241
variables
rename, 47 “49
replacing temporary variables, 52 “53
scope, reducing, 52, 56
View menu (NUnit-Gui)
Collapse All option, 239
Collapse Fixtures option, 239
Collapse option, 239
Expand All option, 239
Expand Fixtures option, 239
Expand option, 239
Properties option, 239
Visual Studio
creating Search page, 221 “226
Nunit, 233 “240, 250 “251
adding NumbersFixture class to projects, 235
adding references to nunit.framework.dll, 234
creating projects, 233 “234
debugger, 250 “251
layout, 237 “240
NUnit-Gui setup, 236
running tests, 237
Previous page
Table of content
Next page
Test-Driven Development in Microsoft .NET (Microsoft Professional)
ISBN: 0735619484
EAN: 2147483647
Year: 2004
Pages: 85
Authors:
James W. Newkirk
,
Alexei A. Vorontsov
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Foundations and Principles of Security
The Policy Framework
Common Risk-Assessment Methodologies and Templates
Performing the Assessment
Determining the Next Step
Software Configuration Management
Introduction to Software Configuration Management
Configuration Identification
Appendix G Sample Inspection Plan
Appendix J Document Change Request (DCR)
Appendix P Project Statement of Work
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Working with Data Types
Using Arrays
Copying Charts to Word
Getting More Realistic Results with Integer Constraints
Optimizing Engineering Design Problems
InDesign Type: Professional Typography with Adobe InDesign CS2
(Not) Using Auto Leading
Up Next
Ligatures
Oldstyle Figures
Right-Aligned Type
802.11 Wireless Networks: The Definitive Guide, Second Edition
Authentication
Preauthentication
Using 802.11 on Linux
Project Planning and Requirements
Physical Layer Selection and Design
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Indirect Privilege Escalation
Defeating Virtual Private Databases
Running Operating System Commands
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies