4 User-and Code-Identity–Based Security: Two Complementary Security Paradigms
5 Evidence: Knowing Where Code Comes From
6 Permissions: The Workhorse of Code Access Security
7 Walking the Stack
8 Membership Conditions, Code Groups, and Policy Levels: The Brick and Mortar of Security Policy
9 Understanding the Concepts of Strong Naming Assemblies
10 Hosting Managed Code
11 Verification and Validation: The Backbone of .NET Framework Security
12 Security Through the Lifetime of a Managed Process: Fitting It All Together
3.17.6.75