In this chapter, you’ll investigate how to use Role Access Security (RAS) to protect resources. You’ll study the definitions that are found in .NET and how they work. Finally, you’ll learn about impersonation and how it works in .NET.
Unable to display preview. Download preview PDF.