Skip to main content

Protecting Code

  • Chapter
.NET Security
  • 86 Accesses

Abstract

To end this book, I’d like to reverse the course that I’ve followed throughout earlier chapters and show you how to protect your investment by securing your .NET code. I’ll start by briefly covering the basics of the Common Intermediate Language (CIL). Then I’ll explain how you can use this knowledge to reverse-engineer your components. Finally, I’ll discuss techniques that you can use to protect your investments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Jason Bock, Pete Stromquist, Tom Fischer, and Nathan Smith

About this chapter

Cite this chapter

Bock, J., Stromquist, P., Fischer, T., Smith, N. (2002). Protecting Code. In: .NET Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0846-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-0846-4_9

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-59059-053-9

  • Online ISBN: 978-1-4302-0846-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics