O'Reilly logo

Application Development Using Visual Basic® and .NET by Dana L. Wyatt, Peter Thorsteinson, Robert J. Oberg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Security

Security prevents a user or a piece of code from doing things it should not be allowed to do. Traditionally, security has focused on restricting operations based on the identity of the user or the group to which the user belongs. Naturally, this approach to security is supported by .NET, and it is known as user-based security (a closely related concept is known as role-based security, also discussed later in this chapter). .NET also allows you to place restrictions on what a piece of code is permitted to do according to security evidence associated with that code. This new approach to security is known as Code Access Security (also known as evidence-based security). For example, you can prevent certain code from accessing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required