dcsimg
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement

More articles by Adam Machanic

Author Bio
Adam Machanic is an independent database software consultant, writer, and speaker based in Boston, Massachusetts. He has implemented SQL Server solutions for a variety of high-availability OLTP and large-scale data warehouse applications, and specializes in .NET data access layer performance optimization. Adam has written for SQL Server Professional magazine, serves as SQL Server 2005 Expert for SearchSQLServer.com, and is a co-author of "Pro SQL Server 2005" (Apress, 2005). In addition, he regularly speaks at user groups, community events, and conferences on a variety of SQL Server and .NET-related topics. He is a Microsoft MVP for SQL Server and a Microsoft Certified IT Professional (MCITP). His latest book, "Expert SQL Server 2005 Development" (Apress), is due out early in 2007.
For CoDe Magazine | July 2, 2007
SQL Server's CREATE ASSEMBLY statement lets you catalog code with one of three predefined security buckets. But under the covers, there are actually two distinct security models at play: Code Access Security and Host Protection, and you need to understand both.
Thanks for your registration, follow us on our social networks to keep up-to-date