Flylib.com
Debugging Applications for MicrosoftВ® .NET and Microsoft WindowsВ® (Pro-Developer)
Debugging Applications for MicrosoftВ® .NET and Microsoft WindowsВ® (Pro-Developer)
ISBN: 0735615365
EAN: 2147483647
Year: 2000
Pages: 122
Authors:
John Robbins
BUY ON AMAZON
Cover
LOC Page
Dedication
Foreword
Acknowledgments
Introduction
Who Should Read This Book?
How Should You Read This Book?
System Requirements
What s on the Companion CD?
Feedback
Chapter 1 -- Bugs: Where They Come From and How You Solve Them
Bugs and Debugging
Prerequisites to Debugging
The Debugging Process
Summary
Chapter 2 -- Getting Started Debugging
Track Changes Until You Throw Away the Project
Schedule Time for Building Debugging Systems
Frequent Builds and Smoke Tests Are Mandatory
Build the Installation Program Immediately
QA Must Test with Debug Builds
Summary
Chapter 3 -- Debugging During Coding
Assert, Assert, Assert, and Assert
Trace, Trace, Trace, and Trace
Comment, Comment, Comment, and Comment
Trust Yourself, But Verify (Unit Testing)
Summary
Chapter 4 -- How Do Debuggers Work?
Types of Windows Debuggers
Windows 2000 Operating System Support for Debuggees
MinDBG: A Simple Win32 Debugger
WDBG: A Real Debugger
So You Want to Write Your Own Debugger
What s Next for WDBG?
Summary
Chapter 5 -- Power Debugging with the Visual C Debugger
Advanced Breakpoints and How to Use Them
Remote Debugging
Tips and Tricks
Summary
Chapter 6 -- Power Debugging with x86 Assembly Language and the Visual C Debugger Disassembly Window
The Basics of the CPU
A Word About the Visual C Inline Assembler
Instructions You Need to Know
Calling Conventions
More Instructions You Need to Know
Common Assembly-Language Constructs
A Complete Example
The Disassembly Window
Tips and Tricks
Summary
Chapter 7 -- Power Debugging with the Visual Basic Debugger
Visual Basic P-Code
Error Trapping: Break In or Break On Options
Visual Basic Debugger Windows
Tips and Tricks
Summary
Chapter 8 -- Finding Source and Line Information with Just a Crash Address
Creating and Reading a MAP File
Using CrashFinder
What s Next for CrashFinder?
Summary
Chapter 9 -- Crash Handlers
Structured Exception Handling vs. C Exception Handling
The SetUnhandledExceptionFilter API Function
Using the CrashHandler API
Translating EXCEPTION_POINTERS Structures
Summary
Chapter 10 -- Debugging Windows 2000 Services and DLLs That Load into Services
Service Basics
Debugging Services
Summary
Chapter 11 -- Multimachine, Multiprocess Tracing
TraceSrv Requirements
TraceSrv and DCOMCNFG
Initial Problems with TraceSrv
TraceView and Security
Using TraceSrv
Summary
Chapter 12 -- Multithreaded Deadlocks
Multithreading Tips and Tricks
DeadlockDetection Requirements
High-Level Design Issues with DeadlockDetection
Using DeadlockDetection
Implementing DeadlockDetection
What s Next for DeadlockDetection?
Summary
Chapter 13 -- Automated Testing
The Bane of Unit Testing: User Interfaces
Tester Requirements
Using Tester
Implementing Tester
What s Next for Tester?
Summary
Chapter 14 -- Limiting OutputDebugString Calls
Also-Ran Solutions
LIMODS Requirements
Using LIMODS
Implementing LIMODS
What s Next for LIMODS?
Summary
Chapter 15 -- The Debug C Run-Time Library
Features of the Debug C Run-Time Library
Using the Debug C Run-Time Library
Choosing the Right C Run-Time Library for Your Application
Using MemDumperValidator
Implementing MemDumperValidator
Using MemStress
Summary
Appendix A -- Reading Dr. Watson Log Files
Windows 2000 Dr. Watson Log
Windows 98 Dr. Watson Log
Appendix B -- Resources for Windows Developers
Books
Tools
Web Sites
About the Author
About This Electronic Book
Debugging Applications for MicrosoftВ® .NET and Microsoft WindowsВ® (Pro-Developer)
ISBN: 0735615365
EAN: 2147483647
Year: 2000
Pages: 122
Authors:
John Robbins
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.2 Passphrase Considerations
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.5 How to use OpenSSH Passphrase Agents
Conclusion
Inside Network Security Assessment: Guarding Your IT Infrastructure
Choosing the Best Risk-Assessment Approach
Reducing the Risk of an Attack
Level II Assessments
Contents of a Good Report
Security Standards
Oracle Developer Forms Techniques
Special Tips for List Items
Base Tables
Intelligence in Forms
Validation, Navigation, and Simulating Navigation
Summary
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Complex Application from the Command Line
Wrapping Lines in a Text File
Ensuring a Single Copy of a Member Variable
Introduction
Formatting Floating-Point Output
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Two Principles
Chapter Seven Diagnose Before You Prescribe
Chapter Nine Selling When You re Not First
Chapter Fifteen Sales Management System: Managers Managing Pipelines and Salespeople
Special Edition Using FileMaker 8
FileMaker and Its Marketplace
Working with Fields
Troubleshooting
FileMaker Extra: Write Your Own Web Services
Documenting the Relationships Graph
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies