| for RuBoard |
| 4 User-and Code-Identity “Based Security: Two Complementary Security Paradigms |
| 5 Evidence: Knowing Where Code Comes From |
| 6 Permissions: The Workhorse of Code Access Security |
| 7 Walking the Stack |
| 8 Membership Conditions, Code Groups, and Policy Levels: The Brick and Mortar of Security Policy |
| 9 Understanding the Concepts of Strong Naming Assemblies |
| 10 Hosting Managed Code |
| 11 Verification and Validation: The Backbone of .NET Framework Security |
| 12 Security Through the Lifetime of a Managed Process: Fitting It All Together |
| for RuBoard |