April 2002
Intermediate to advanced
816 pages
20h 56m
English
By Brian A. LaMacchia
IN THIS CHAPTER
This chapter concludes our discussion of Code Access Security fundamentals by showing how the features described in Chapters 4 through 11 interact when managed code is loaded and run within the Common Language Runtime. In the previous chapters, we have looked at various security features of the Runtime—verification, policy evaluation, and permission enforcement—in isolation. Now, we focus on how these individual pieces of the security system come together and interact to provide a secure environment for executing semitrusted ...
Read now
Unlock full access