Abstract
To end this book, I’d like to reverse the course that I’ve followed throughout earlier chapters and show you how to protect your investment by securing your .NET code. I’ll start by briefly covering the basics of the Common Intermediate Language (CIL). Then I’ll explain how you can use this knowledge to reverse-engineer your components. Finally, I’ll discuss techniques that you can use to protect your investments.
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2002 Jason Bock, Pete Stromquist, Tom Fischer, and Nathan Smith
About this chapter
Cite this chapter
Bock, J., Stromquist, P., Fischer, T., Smith, N. (2002). Protecting Code. In: .NET Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0846-4_9
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0846-4_9
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-053-9
Online ISBN: 978-1-4302-0846-4
eBook Packages: Springer Book Archive