C
- C#, type safety of, Type Safety and Verification
- C++, type safety of, Type Safety and Verification
- capturing load events, Capturing Assembly Load Events
- CAS (Code Access Security), Type Safety and Verification, Type Safety and Verification, Type Visibility, Extending the CLR Security System to Protect Your Extensible Application, An Overview of Code Access Security, An Overview of Code Access Security, An Overview of Code Access Security, The Core Concepts: Evidence, Permissions, and Policy, Policy, Permissions, Permissions, Permissions, Permissions, Permissions, Permissions, Permissions, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk, Customizing the Code Access Security System Using a HostSecurityManager, Customizing the Code Access Security System Using a HostSecurityManager, Step 1: Provide an Initial Implementation of HostSecurityManager, Assigning Evidence Using the Assembly Loading APIs, Putting It All Together, Putting It All Together, Putting It All Together, Associating Evidence with an Application Domain, Associating Evidence with an Application Domain, Enforcing Application-Specific Programming Model Constraints, Step 2: Specifying Which Host Protection Categories to Block
- AllowPartiallyTrustedCallers attribute, Associating Evidence with an Application Domain
- application domains with, Type Safety and Verification
- authentication, Permissions
- authorization, Permissions
- cocoon sample, adding to, Customizing the Code Access Security System Using a HostSecurityManager
- code identity basis of, An Overview of Code Access Security
- demands of permissions, Permissions
- enforcement activity of, Permissions
- evidence., Putting It All Together (see )
- flags, Customizing the Code Access Security System Using a HostSecurityManager
- fully trusted default for assembly calls, Associating Evidence with an Application Domain
- goal of, An Overview of Code Access Security
- host protection compared to, Enforcing Application-Specific Programming Model Constraints, Step 2: Specifying Which Host Protection Categories to Block
- HostSecurityManager class for, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk
- membership conditions, Step 1: Provide an Initial Implementation of HostSecurityManager
- overview of, Extending the CLR Security System to Protect Your Extensible Application
- partially trusted code, An Overview of Code Access Security
- permissions., Putting It All Together (see )
- policy., Policy (see )
- relation of evidence, policy, and permissions, The Core Concepts: Evidence, Permissions, and Policy
- runtime sequence of cocoon example, Assigning Evidence Using the Assembly Loading APIs
- scoping for application domains, Type Visibility
- Skip Verification permission, Type Safety and Verification
- stack walks, Permissions, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk, Putting It All Together
- validation, Permissions
- verification, Permissions
- CAS policy, The Core Concepts: Evidence, Permissions, and Policy, The Core Concepts: Evidence, Permissions, and Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy, Policy Levels, Policy Levels, Policy Levels, Policy Levels, Policy Levels, Policy Levels, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk, Step 3: Create a Custom Membership Condition, Step 4: Create an Application-Domain-Level Policy Tree, Step 4: Create an Application-Domain-Level Policy Tree, Putting It All Together
- all code membership, Policy
- application domain evidence, Putting It All Together
- application domain level, Policy Levels
- code groups, Policy, Step 4: Create an Application-Domain-Level Policy Tree
- debugging, Policy Levels
- default, Policy Levels
- defined, The Core Concepts: Evidence, Permissions, and Policy
- disk representation of objects of, Policy Levels
- DomainPolicy method, Runtime Enforcement of Permissions: Permission Demands and the Stack Walk
- enterprise level, Policy
- evaluation procedure, Policy
- first match code groups, Policy
- hierarchy of code groups, Policy
- levels of, Policy
- machine level, Policy
- membership conditions, Policy, Policy
- permission set combination, Policy
- policy statements, Policy
- policy trees, Policy, Step 3: Create a Custom Membership Condition
- relation to evidence and permissions, The Core Concepts: Evidence, Permissions, and Policy
- sample code group, Policy
- SetAppDomainPolicy method, Step 4: Create an Application-Domain-Level Policy Tree
- tool for evaluating, Policy Levels
- union code groups, Policy
- user level, Policy
- viewing, Policy Levels
- Caspol.exe tool, Policy Levels
- casting, assembly loading issues with, LoadFrom’s Second Bind
- CERs (constrained execution regions), Critical Finalization, SafeHandles, and Constrained Execution Regions, Use SafeHandles to Encapsulate All Native Handles
- class libraries, .NET, The Versioned Installation Directory, The Global Assembly Cache, The CLR Startup Shim
- assembly dual installation, The Global Assembly Cache
- GAC issues, The Versioned Installation Directory
- loading by startup shim, The CLR Startup Shim
- cleanup code, Writing Highly Available Microsoft .NET Framework Applications
- CLR Events manager, CLR Hosting Managers
- CLR hosting API., Programming Model Enforcement (see )
- CLR hosting managers., CLR Hosting Managers (see )
- CLR hosts., Creating the Assembly Loading Manager and Host Control Object (see )
- CLR startup shims., The CLR Startup Shim (see )
- CLR startup., Controlling CLR Startup and Shutdown (see )
- CLR thread pools, Application Domains and Threads
- (see also )
- CLR-implemented manager discovery, Step 2: The CLR Queries the Host Control Class
- clrversion.exe utility, Defaults for the CLR Startup Options
- cocoon deployment model, Customizing How Assemblies Are Loaded, The Cocoon Deployment Model, The Cocoon Deployment Model, The Cocoon Deployment Model, The Cocoon Deployment Model, CLR Binding Identities, CLR Binding Identities, CLR Binding Identities, CLR Binding Identities, CLR Binding Identities, Obtaining Binding Identities, Step 1: Obtaining a Pointer to ICLRAssemblyIdentityManager, The Makecocoon.exe Program, The Makecocoon.exe Program, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Specifying Non-Host-Loaded Assemblies, Implementing the IHostAssemblyStore Interface, The AssemblyBindInfo Structure, The AssemblyBindInfo Structure, The AssemblyBindInfo Structure, The AssemblyBindInfo Structure, The EBindPolicyLevels Enumeration, Associating Host-Specific Data with an Assembly, Associating Host-Specific Data with an Assembly, Assigning Assembly Identity, Assigning Assembly Identity, Resolving Module References, Resolving Module References, Resolving Module References, Initializing the CLR, Initializing the CLR, Initializing the CLR, Creating the Assembly Loading Manager and Host Control Object, Creating the Assembly Loading Manager and Host Control Object, Customizing How Assemblies Are Loaded Using Only Managed Code, The AssemblyResolve Event, Customizing the Code Access Security System Using a HostSecurityManager, Code Access Security in the Cocoon Host, Step 1: Provide an Initial Implementation of HostSecurityManager, Step 1: Provide an Initial Implementation of HostSecurityManager, Step 3: Create a Custom Membership Condition, Step 4: Create an Application-Domain-Level Policy Tree, Assigning Evidence Using the Assembly Loading APIs, Using the Host Protection Manager
- .NET Framework assemblies in cocoons, Specifying Non-Host-Loaded Assemblies
- administrator policy, The AssemblyBindInfo Structure
- application domain manager assembly loading, Specifying Non-Host-Loaded Assemblies
- assembly identity assignment, Associating Host-Specific Data with an Assembly
- assembly loading, Specifying Non-Host-Loaded Assemblies, Assigning Assembly Identity
- assembly loading manager creation, Initializing the CLR
- binding identities, CLR Binding Identities, Obtaining Binding Identities
- CAS with, Customizing the Code Access Security System Using a HostSecurityManager, Assigning Evidence Using the Assembly Loading APIs
- CocoonHostRuntime, Specifying Non-Host-Loaded Assemblies
- defined, Customizing How Assemblies Are Loaded
- EBindPolicyLevels enumeration, The AssemblyBindInfo Structure
- evidence assignment, Step 4: Create an Application-Domain-Level Policy Tree
- evidence creation, Step 1: Provide an Initial Implementation of HostSecurityManager
- extra streams, purpose of, CLR Binding Identities
- file structure of cocoons, The Cocoon Deployment Model, CLR Binding Identities
- GetBindingIdentitiesFromFile method, Step 1: Obtaining a Pointer to ICLRAssemblyIdentityManager
- host control object creation, Creating the Assembly Loading Manager and Host Control Object
- host protection with, Using the Host Protection Manager
- host-specific data association, The EBindPolicyLevels Enumeration
- HostSecurityManager implementation, Code Access Security in the Cocoon Host
- IHostAssemblyStore implementation, Specifying Non-Host-Loaded Assemblies
- index stream, CLR Binding Identities, Associating Host-Specific Data with an Assembly
- initializing the CLR step, Initializing the CLR
- invoking hosted applications, Creating the Assembly Loading Manager and Host Control Object
- loading assemblies, Specifying Non-Host-Loaded Assemblies, Assigning Assembly Identity, Initializing the CLR
- main method location, The Cocoon Deployment Model
- makecocoon.cpp, The Makecocoon.exe Program
- makecocoon.exe, The Cocoon Deployment Model, The Makecocoon.exe Program
- managed code version requirements, Customizing How Assemblies Are Loaded Using Only Managed Code
- managed example., The AssemblyResolve Event (see )
- membership condition creation, Step 1: Provide an Initial Implementation of HostSecurityManager
- module references, resolving, Resolving Module References
- multiple file assembly support, Resolving Module References
- OLE structured storage files, The Cocoon Deployment Model
- opening cocoon files, Resolving Module References
- policy tree creation, Step 3: Create a Custom Membership Condition
- publisher policy, preventing application of, The AssemblyBindInfo Structure
- resolving assembly references, Implementing the IHostAssemblyStore Interface
- stream naming, CLR Binding Identities
- versioning rule implementation, The AssemblyBindInfo Structure
- code unloading, CLR Hosts and Other Extensible Applications
- codebases, How the CLR Locates Assemblies, How the CLR Locates Assemblies with Strong Names
- COM Descriptor Directory, Invoking the Default Host: Running Managed Executables
- COM interoperability, CLR Initialization and Startup, Handling Failures from CorBindToRuntimeEx, Invoking the Default Host: Activating Managed Types Through COM Interop, Upgrades
- default CLR host invocation, Invoking the Default Host: Activating Managed Types Through COM Interop, Upgrades
- default CLR host version selection, Upgrades
- deferred startups, Handling Failures from CorBindToRuntimeEx
- implicit loading of CLR, CLR Initialization and Startup
- concurrent garbage collection, The Server and Workstation Builds, Defaults for the CLR Startup Options, Customizing the Default Host Using Configuration Files, Customizing the Default Host Using Configuration Files
- configuration in default CLR host, Customizing the Default Host Using Configuration Files
- default CLR host default, Defaults for the CLR Startup Options
- disabling, Customizing the Default Host Using Configuration Files
- overview, The Server and Workstation Builds
- configuration files, Activating Managed Types Through COM Interop, Activating Managed Types Through COM Interop, Customizing the Default Host Using Configuration Files, Customizing the Default Host Using Configuration Files, Concurrent Garbage Collection, Version, Version, The <requiredRuntime> Element and .NET Framework 1.0, The <requiredRuntime> Element and .NET Framework 1.0, Turning Off ApplicationBase Searching
- application domain properties, Turning Off ApplicationBase Searching
- bindingRedirect element, The <requiredRuntime> Element and .NET Framework 1.0
- build type options, Concurrent Garbage Collection
- editing, Customizing the Default Host Using Configuration Files
- file format of, Activating Managed Types Through COM Interop
- garbage collection, Customizing the Default Host Using Configuration Files
- purpose of, Activating Managed Types Through COM Interop
- requiredRuntime element, The <requiredRuntime> Element and .NET Framework 1.0
- supportedRuntime element, Version
- version options, Version
- Configuration tool for viewing CAS policy, Policy Levels
- ConfigurationBytes property, Turning Off ApplicationBase Searching
- ConfigurationFile property, Turning Off ApplicationBase Searching
- Console class, host protection with, User Interface
- constrained execution regions (CERs), Critical Finalization, SafeHandles, and Constrained Execution Regions, Use SafeHandles to Encapsulate All Native Handles
- constraint enforcement., Enforcing Application-Specific Programming Model Constraints (see )
- cooperative task scheduling, Integrating the CLR with Custom Schedulers and Thread Pools, The Life Cycle of a Task, Hooking Calls That Enter and Leave the CLR
- CoopFiber sample, Integrating the CLR with Custom Schedulers and Thread Pools
- CorBindToRuntimeEx function, A Tour of the CLR Hosting API, A Tour of the CLR Hosting API, CLR Hosting Managers, CLR Hosting Managers, CLR Hosting Managers, CLR Hosting Managers, CLR Initialization and Startup, CLR Initialization and Startup, CLR Initialization and Startup, CLR Initialization and Startup, CLR Initialization and Startup, CLR Initialization and Startup, The CLR Startup Shim, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Domain-Neutral Code, Setting the Startup Options Using CorBindToRuntimeEx, Setting the Startup Options Using CorBindToRuntimeEx, Handling Failures from CorBindToRuntimeEx, Deferring CLR Initialization and Startup, Deferring CLR Initialization and Startup, Initializing the CLR, Domain-Neutral Code and Assembly Dependencies
- build parameter, Domain-Neutral Code
- build types, CLR Hosting Managers
- configuration settings for calls to, CLR Hosting Managers
- deferred loading of CLR, Deferring CLR Initialization and Startup
- defined, A Tour of the CLR Hosting API
- definition from mscoree.h, Domain-Neutral Code
- domain neutral assembly specification, CLR Initialization and Startup, Setting the Startup Options Using CorBindToRuntimeEx, Domain-Neutral Code and Assembly Dependencies
- garbage collection, CLR Initialization and Startup, Domain-Neutral Code
- ICLRRuntimeHost, A Tour of the CLR Hosting API, Setting the Startup Options Using CorBindToRuntimeEx
- initialization of CLR, CLR Hosting Managers, Initializing the CLR
- interface pointer returned by, CLR Initialization and Startup
- parameters, table of, Domain-Neutral Code
- specifying configuration settings, CLR Initialization and Startup
- starting CLR, CLR Initialization and Startup
- startup failures, Handling Failures from CorBindToRuntimeEx
- startup options, setting, Domain-Neutral Code
- startup shims with, CLR Initialization and Startup, The CLR Startup Shim
- startupFlags, Domain-Neutral Code, Deferring CLR Initialization and Startup
- version settings, CLR Hosting Managers, Domain-Neutral Code
- CreateDomain, Application Domain Managers, Creating Application Domains, Customizing Application Domain Creation Using System.AppDomainManager, Associating Evidence with an Application Domain
- evidence, associating using, Associating Evidence with an Application Domain
- method, Application Domain Managers, Creating Application Domains, Customizing Application Domain Creation Using System.AppDomainManager
- CreateDomainHelper method, Creating an Application Domain Manager
- CreateInstanceFrom method of AppDomain, Loading Assemblies by Filename
- CreateMalloc method, Virtual Memory Management
- critical finalizers, Critical Finalization, SafeHandles, and Constrained Execution Regions
- critical regions of code, Failure Escalation
- cross-domain communication, Code Unloading, DisallowCodeDownload
- culture, assembly specification of, Specifying Assembly Identities as Strings
- customizing assembly loading., Customizing How Assemblies Are Loaded (see , )
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.