Summary of Steps


This How To includes the following steps:

  1. Create an assembly that performs file I/O.

  2. Create a Web application.

  3. Test file I/O with no code access security constraints.

  4. Configure code access security policy to constrain file I/O.

  5. Test file I/O with code access security constraints.




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net