Tamper-proofing your assembly using code access security to foil unauthorized users.
| Published in: | XML journal :the ultimate enterprise resource. 3, 10 (2002). |
|---|---|
| Format: | Article |
| Language: | English |
| Published in: | XML journal :the ultimate enterprise resource. 3, 10 (2002). |
|---|---|
| Format: | Article |
| Language: | English |