for RuBoard |
4 User-and Code-Identity “Based Security: Two Complementary Security Paradigms |
5 Evidence: Knowing Where Code Comes From |
6 Permissions: The Workhorse of Code Access Security |
7 Walking the Stack |
8 Membership Conditions, Code Groups, and Policy Levels: The Brick and Mortar of Security Policy |
9 Understanding the Concepts of Strong Naming Assemblies |
10 Hosting Managed Code |
11 Verification and Validation: The Backbone of .NET Framework Security |
12 Security Through the Lifetime of a Managed Process: Fitting It All Together |
for RuBoard |