Related Topics
Methods and Properties for Restricting Access
Configuring Reflection's Behavior as a Terminal