11Security and Deployment
The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.
Topics Covered in This Chapter
VSTO Security Model
VSTO makes it easy for you to create great Office solutions. Of course, after you have completed your solution, you must deploy it to end users in a secure, maintainable way. VSTO has a powerful, flexible security model that is built on top of .NET code access security, giving you control over which code you allow to run on your machine.
One of the key security design principles of VSTO is that it is secure by default. ...