IN THIS CHAPTER
What Is Involved in Securing Applications?
Deploying Applications Effortlessly Using Zero-Install Application Deployment
Using Code Access Security
Obfuscating .NET Applications