C

C#, type safety of, Type Safety and Verification
C++, type safety of, Type Safety and Verification
capturing load events, Capturing Assembly Load Events
CAS (Code Access Security), Type Safety and Verification, Type Safety and Verification, Type Visibility, Extending the CLR Security System to Protect Your Extensible Application, An Overview of Code Access Security, An Overview of Code Access Security, An Overview of Code Access Security, The Core Concepts: Evidence, Permissions, and Policy, Policy, Permissions, Permissions, Permissions, Permissions, Permissions, Permissions, Permissions, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk, Customizing the Code Access Security System Using a HostSecurityManager, Customizing the Code Access Security System Using a HostSecurityManager, Step 1: Provide an Initial Implementation of HostSecurityManager, Assigning Evidence Using the Assembly Loading APIs, Putting It All Together, Putting It All Together, Putting It All Together, Associating Evidence with an Application Domain, Associating Evidence with an Application Domain, Enforcing Application-Specific Programming Model Constraints, Step 2: Specifying Which Host Protection Categories to Block
AllowPartiallyTrustedCallers attribute, Associating Evidence with an Application Domain
application domains with, Type Safety and Verification
authentication, Permissions
authorization, Permissions
cocoon sample, adding to, Customizing the Code Access Security System Using a HostSecurityManager
code identity basis of, An Overview of Code Access Security
demands of permissions, Permissions
enforcement activity of, Permissions
evidence., Putting It All Together (see )
flags, Customizing the Code Access Security System Using a HostSecurityManager
fully trusted default for assembly calls, Associating Evidence with an Application Domain
goal of, An Overview of Code Access Security
host protection compared to, Enforcing Application-Specific Programming Model Constraints, Step 2: Specifying Which Host Protection Categories to Block
HostSecurityManager class for, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk
membership conditions, Step 1: Provide an Initial Implementation of HostSecurityManager
overview of, Extending the CLR Security System to Protect Your Extensible Application
partially trusted code, An Overview of Code Access Security
permissions., Putting It All Together (see )
policy., Policy (see )
relation of evidence, policy, and permissions, The Core Concepts: Evidence, Permissions, and Policy
runtime sequence of cocoon example, Assigning Evidence Using the Assembly Loading APIs
scoping for application domains, Type Visibility
Skip Verification permission, Type Safety and Verification
stack walks, Permissions, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk, Putting It All Together
validation, Permissions
verification, Permissions
CAS policy, The Core Concepts: Evidence, Permissions, and Policy, The Core Concepts: Evidence, Permissions, and Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy Levels, Policy Levels, Policy Levels, Policy Levels, Policy Levels, Policy Levels, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk, Step 3: Create a Custom Membership Condition, Step 4: Create an Application-Domain-Level Policy Tree, Step 4: Create an Application-Domain-Level Policy Tree, Putting It All Together
all code membership, Policy
application domain evidence, Putting It All Together
application domain level, Policy Levels
code groups, Policy, Step 4: Create an Application-Domain-Level Policy Tree
debugging, Policy Levels
default, Policy Levels
defined, The Core Concepts: Evidence, Permissions, and Policy
disk representation of objects of, Policy Levels
DomainPolicy method, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk
enterprise level, Policy
evaluation procedure, Policy
first match code groups, Policy
hierarchy of code groups, Policy
levels of, Policy
machine level, Policy
membership conditions, Policy, Policy
permission set combination, Policy
policy statements, Policy
policy trees, Policy, Step 3: Create a Custom Membership Condition
relation to evidence and permissions, The Core Concepts: Evidence, Permissions, and Policy
sample code group, Policy
SetAppDomainPolicy method, Step 4: Create an Application-Domain-Level Policy Tree
tool for evaluating, Policy Levels
union code groups, Policy
user level, Policy
viewing, Policy Levels
Caspol.exe tool, Policy Levels
casting, assembly loading issues with, LoadFrom’s Second Bind
CERs (constrained execution regions), Critical Finalization, SafeHandles, and Constrained Execution Regions, Use SafeHandles to Encapsulate All Native Handles
class libraries, .NET, The Versioned Installation Directory, The Global Assembly Cache, The CLR Startup Shim
assembly dual installation, The Global Assembly Cache
GAC issues, The Versioned Installation Directory
loading by startup shim, The CLR Startup Shim
cleanup code, Writing Highly Available Microsoft .NET Framework Applications
CLR Events manager, CLR Hosting Managers
CLR hosting API., Programming Model Enforcement (see )
CLR hosting managers., CLR Hosting Managers (see )
CLR hosts., Creating the Assembly Loading Manager and Host Control Object (see )
CLR startup shims., The CLR Startup Shim (see )
CLR startup., Controlling CLR Startup and Shutdown (see )
CLR thread pools, Application Domains and Threads
(see also )
CLR-implemented manager discovery, Step 2: The CLR Queries the Host Control Class
clrversion.exe utility, Defaults for the CLR Startup Options
cocoon deployment model, Customizing How Assemblies Are Loaded, The Cocoon Deployment Model, The Cocoon Deployment Model, The Cocoon Deployment Model, The Cocoon Deployment Model, CLR Binding Identities, CLR Binding Identities, CLR Binding Identities, CLR Binding Identities, CLR Binding Identities, Obtaining Binding Identities, Step 1: Obtaining a Pointer to ICLRAssemblyIdentityManager, The Makecocoon.exe Program, The Makecocoon.exe Program, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Implementing the IHostAssemblyStore Interface, The AssemblyBindInfo Structure, The AssemblyBindInfo Structure, The AssemblyBindInfo Structure, The AssemblyBindInfo Structure, The EBindPolicyLevels Enumeration, Associating Host-Specific Data with an Assembly, Associating Host-Specific Data with an Assembly, Assigning Assembly Identity, Assigning Assembly Identity, Resolving Module References, Resolving Module References, Resolving Module References, Initializing the CLR, Initializing the CLR, Initializing the CLR, Creating the Assembly Loading Manager and Host Control Object, Creating the Assembly Loading Manager and Host Control Object, Customizing How Assemblies Are Loaded Using Only Managed Code, The AssemblyResolve Event, Customizing the Code Access Security System Using a HostSecurityManager, Code Access Security in the Cocoon Host, Step 1: Provide an Initial Implementation of HostSecurityManager, Step 1: Provide an Initial Implementation of HostSecurityManager, Step 3: Create a Custom Membership Condition, Step 4: Create an Application-Domain-Level Policy Tree, Assigning Evidence Using the Assembly Loading APIs, Using the Host Protection Manager
.NET Framework assemblies in cocoons, Specifying Non-Host-Loaded Assemblies
administrator policy, The AssemblyBindInfo Structure
application domain manager assembly loading, Specifying Non-Host-Loaded Assemblies
assembly identity assignment, Associating Host-Specific Data with an Assembly
assembly loading, Specifying Non-Host-Loaded Assemblies, Assigning Assembly Identity
assembly loading manager creation, Initializing the CLR
binding identities, CLR Binding Identities, Obtaining Binding Identities
CAS with, Customizing the Code Access Security System Using a HostSecurityManager, Assigning Evidence Using the Assembly Loading APIs
CocoonHostRuntime, Specifying Non-Host-Loaded Assemblies
defined, Customizing How Assemblies Are Loaded
EBindPolicyLevels enumeration, The AssemblyBindInfo Structure
evidence assignment, Step 4: Create an Application-Domain-Level Policy Tree
evidence creation, Step 1: Provide an Initial Implementation of HostSecurityManager
extra streams, purpose of, CLR Binding Identities
file structure of cocoons, The Cocoon Deployment Model, CLR Binding Identities
GetBindingIdentitiesFromFile method, Step 1: Obtaining a Pointer to ICLRAssemblyIdentityManager
host control object creation, Creating the Assembly Loading Manager and Host Control Object
host protection with, Using the Host Protection Manager
host-specific data association, The EBindPolicyLevels Enumeration
HostSecurityManager implementation, Code Access Security in the Cocoon Host
IHostAssemblyStore implementation, Specifying Non-Host-Loaded Assemblies
index stream, CLR Binding Identities, Associating Host-Specific Data with an Assembly
initializing the CLR step, Initializing the CLR
invoking hosted applications, Creating the Assembly Loading Manager and Host Control Object
loading assemblies, Specifying Non-Host-Loaded Assemblies, Assigning Assembly Identity, Initializing the CLR
main method location, The Cocoon Deployment Model
makecocoon.cpp, The Makecocoon.exe Program
makecocoon.exe, The Cocoon Deployment Model, The Makecocoon.exe Program
managed code version requirements, Customizing How Assemblies Are Loaded Using Only Managed Code
managed example., The AssemblyResolve Event (see )
membership condition creation, Step 1: Provide an Initial Implementation of HostSecurityManager
module references, resolving, Resolving Module References
multiple file assembly support, Resolving Module References
OLE structured storage files, The Cocoon Deployment Model
opening cocoon files, Resolving Module References
policy tree creation, Step 3: Create a Custom Membership Condition
publisher policy, preventing application of, The AssemblyBindInfo Structure
resolving assembly references, Implementing the IHostAssemblyStore Interface
stream naming, CLR Binding Identities
versioning rule implementation, The AssemblyBindInfo Structure
code unloading, CLR Hosts and Other Extensible Applications
codebases, How the CLR Locates Assemblies, How the CLR Locates Assemblies with Strong Names
COM Descriptor Directory, Invoking the Default Host: Running Managed Executables
COM interoperability, CLR Initialization and Startup, Handling Failures from CorBindToRuntimeEx, Invoking the Default Host: Activating Managed Types Through COM Interop, Upgrades
default CLR host invocation, Invoking the Default Host: Activating Managed Types Through COM Interop, Upgrades
default CLR host version selection, Upgrades
deferred startups, Handling Failures from CorBindToRuntimeEx
implicit loading of CLR, CLR Initialization and Startup
concurrent garbage collection, The Server and Workstation Builds, Defaults for the CLR Startup Options, Customizing the Default Host Using Configuration Files, Customizing the Default Host Using Configuration Files
configuration in default CLR host, Customizing the Default Host Using Configuration Files
default CLR host default, Defaults for the CLR Startup Options
disabling, Customizing the Default Host Using Configuration Files
overview, The Server and Workstation Builds
configuration files, Activating Managed Types Through COM Interop, Activating Managed Types Through COM Interop, Customizing the Default Host Using Configuration Files, Customizing the Default Host Using Configuration Files, Concurrent Garbage Collection, Version, Version, The <requiredRuntime> Element and .NET Framework 1.0, The <requiredRuntime> Element and .NET Framework 1.0, Turning Off ApplicationBase Searching
application domain properties, Turning Off ApplicationBase Searching
bindingRedirect element, The <requiredRuntime> Element and .NET Framework 1.0
build type options, Concurrent Garbage Collection
editing, Customizing the Default Host Using Configuration Files
file format of, Activating Managed Types Through COM Interop
garbage collection, Customizing the Default Host Using Configuration Files
purpose of, Activating Managed Types Through COM Interop
requiredRuntime element, The <requiredRuntime> Element and .NET Framework 1.0
supportedRuntime element, Version
version options, Version
Configuration tool for viewing CAS policy, Policy Levels
ConfigurationBytes property, Turning Off ApplicationBase Searching
ConfigurationFile property, Turning Off ApplicationBase Searching
Console class, host protection with, User Interface
constrained execution regions (CERs), Critical Finalization, SafeHandles, and Constrained Execution Regions, Use SafeHandles to Encapsulate All Native Handles
constraint enforcement., Enforcing Application-Specific Programming Model Constraints (see )
cooperative task scheduling, Integrating the CLR with Custom Schedulers and Thread Pools, The Life Cycle of a Task, Hooking Calls That Enter and Leave the CLR
CoopFiber sample, Integrating the CLR with Custom Schedulers and Thread Pools
CorBindToRuntimeEx function, A Tour of the CLR Hosting API, A Tour of the CLR Hosting API, CLR Hosting Managers, CLR Hosting Managers, CLR Hosting Managers, CLR Hosting Managers, CLR Initialization and Startup, CLR Initialization and Startup, CLR Initialization and Startup, CLR Initialization and Startup, CLR Initialization and Startup, CLR Initialization and Startup, The CLR Startup Shim, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Setting the Startup Options Using CorBindToRuntimeEx, Setting the Startup Options Using CorBindToRuntimeEx, Handling Failures from CorBindToRuntimeEx, Deferring CLR Initialization and Startup, Deferring CLR Initialization and Startup, Initializing the CLR, Domain-Neutral Code and Assembly Dependencies
build parameter, Domain-Neutral Code
build types, CLR Hosting Managers
configuration settings for calls to, CLR Hosting Managers
deferred loading of CLR, Deferring CLR Initialization and Startup
defined, A Tour of the CLR Hosting API
definition from mscoree.h, Domain-Neutral Code
domain neutral assembly specification, CLR Initialization and Startup, Setting the Startup Options Using CorBindToRuntimeEx, Domain-Neutral Code and Assembly Dependencies
garbage collection, CLR Initialization and Startup, Domain-Neutral Code
ICLRRuntimeHost, A Tour of the CLR Hosting API, Setting the Startup Options Using CorBindToRuntimeEx
initialization of CLR, CLR Hosting Managers, Initializing the CLR
interface pointer returned by, CLR Initialization and Startup
parameters, table of, Domain-Neutral Code
specifying configuration settings, CLR Initialization and Startup
starting CLR, CLR Initialization and Startup
startup failures, Handling Failures from CorBindToRuntimeEx
startup options, setting, Domain-Neutral Code
startup shims with, CLR Initialization and Startup, The CLR Startup Shim
startupFlags, Domain-Neutral Code, Deferring CLR Initialization and Startup
version settings, CLR Hosting Managers, Domain-Neutral Code
CreateDomain, Application Domain Managers, Creating Application Domains, Customizing Application Domain Creation Using System.AppDomainManager, Associating Evidence with an Application Domain
evidence, associating using, Associating Evidence with an Application Domain
method, Application Domain Managers, Creating Application Domains, Customizing Application Domain Creation Using System.AppDomainManager
CreateDomainHelper method, Creating an Application Domain Manager
CreateInstanceFrom method of AppDomain, Loading Assemblies by Filename
CreateMalloc method, Virtual Memory Management
critical finalizers, Critical Finalization, SafeHandles, and Constrained Execution Regions
critical regions of code, Failure Escalation
cross-domain communication, Code Unloading, DisallowCodeDownload
culture, assembly specification of, Specifying Assembly Identities as Strings
customizing assembly loading., Customizing How Assemblies Are Loaded (see , )
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.109.8