April 2002
Intermediate to advanced
816 pages
20h 56m
English
By Rudi Martin
IN THIS CHAPTER
Up to now, we have looked at security from the point of view of a standalone application or a control or component loaded from within another application. This chapter re-examines security from the viewpoint of a hosting application. That is, an entity that loads, executes, and controls other software components—possibly those with a trust level below that of itself.
This chapter has the following goals:
Familiarize the reader with the concept of hosting.
Introduce the most powerful ...