Code access security explained
Using APTCA
Requesting permissions
Sandboxing privileged code
Authorizing code with identity demands
Serialization, delegates, and threading
Calling unmanaged code