27.4. Summary

Securing both your program code and your data is essential in today's computing environment. You need to inform the end users of your applications about what kind of access it requires to execute without encountering security issues. Once you understand the different types of security you can implement, you can use them to encrypt your data to protect your applications from unwanted use. Using a combination of role- and code-based security methodologies, you can ensure that the application runs only under the required permissions and that unauthorized usage will be blocked.

In the next chapter, you learn how to enhance the use of these concepts in a practical way by using the cryptography features of the .NET Framework to protect your data.

Get Professional Visual Studio® 2008 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.