Flylib.com
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176
Authors:
Garry Robinson
BUY ON AMAZON
Table of Contents
BackCover
Real World Microsoft Access Database Protection and Security
Foreword
Chapter 1: The Access Protection and Security Driving Instructions
The Overall Road Map
Your Personal Driving Instructions
About the Book and the Demonstration Material
Secure Things that You Can do Now
Does Upgrading Assist in Security?
Further Reading
Security: The Journey Never Ends
What s Next?
Chapter 2: Protecting Your Database with Startup Options
Do I Need to Read this Chapter?
Manually Changing Startup Options
Programming the Startup Options
The AllowBypassKey Property
Using Homemade Accelerator Keys in Restricted Environments
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 3: Using Database Options and Attributes to Protect Data and Objects
How Will this Chapter Help Me?
The Protection-Related Database Options
Hiding Objects in the Database Window
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 4: Providing a Solid Foundation with Good Programming Practices
Is this Chapter Worth Reading Now?
The AutoExec Macro Provides a Flexible Springboard
Splitting Your Database to Make it Easier to Protect
Error Handling Shields Your Code
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 5: Backing up and Recovering Your Databases
What You Must Know About Database Backups and Recoveries
Backing up Multi-User Databases
Normal Backups
Creating Compressed (.ZIP) Archives
Compacting Databases
Saving Tables to Text Files
Exporting and Recovering Programming Objects
Size Does Matter: How the Text Backup Files Will Help
Backing up Other Information
Backing up Your Database by using Access 2003
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 6: User and Object Surveillance
Will Surveillance Really Help?
The Jet User Roster Form
The LDBView Utility
The Access Workbench
Logging Windows Users, Computers, and Access Accounts
Recording When Objects are Opened
Retrieving the Computer Name, Windows User ID, and Access Workgroup ID by using VBA Code
Checking for Users Who Skip the Startup Sequence
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 7: Protecting Your Database with Menus and Toolbars
Will Menus and Toolbars Help Protect My Database?
Building Toolbars, Menus, and Shortcut Menus
Integrating Menus into Your Forms and Reports
Modifying the Built-In Menus and Toolbars
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 8: Developer Workgroup Security
Why is Developer Workgroup Security so Important?
The Developer Workgroup File Strategy
Preparing Your Developer Workgroup File
The Developer Workgroup File is Ready
Securing Your Database with Your Developer Workgroup File
One Secure Object Marks a Developer s Territory
Transferring Ownership of the Database and all its Objects
Maintaining Object Ownership and Change of Ownership
Setting Database Permissions
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 9: Security Concerns, Encryption, and Database Passwords
What is it that We Should be Concerned About?
Are Password Retrieval Programs all Bad?
Importing Objects From Other Databases
Database Encryption
Workgroup Security Files
Database Passwords
VBA Project Passwords
Further Reading
So What are the Best Access Security Strategies?
Reflecting on this Chapter
What s Next?
Chapter 10: Securing Data with Workgroup Security
What do I Need to Know About Securing My Data?
Trusting Your Workgroup File to Other Users
Trusting Your Users by Adopting the Same Workgroup File
Opening Databases with Shortcut Files
Time for Reflection
Security Wizards
Securing Data with PID Authentication
Protecting Data Outside the Company Network
Server-Based Databases
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 11: Object Protection and Security Measures
Have I Done Enough to Protect the Objects in My Database?
A Workgroup Security Refresher
Protecting Linked Tables Paths with Remote Queries
Protecting Your Query Design
Hiding Your Query (Design) in Forms and VBA Code
Protecting Forms by using VBA Code
Protecting Reports by using VBA Code
Protecting Macros by using VBA Code
Protecting VBA Code by using a Password
Using Data Access Pages with Workgroup Security
Access Data Projects
The MDE Database Format Revisited
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 12: Protecting and Securing Your Database with the Operating System
Why is Operating System Security Important for My Database?
Overview of Applicable Operating System Security
Proof-of-Concept Operating System Security
The Access Protected Folder Strategy
The All-Important NTFS Format
Protecting Against Unattended Computers
Issues of Relevance in Windows XP
Checklist of Other Security-Related Issues
Further Reading
Reflecting on this Chapter
Is that the End of the Journey?
Appendix A: Specific Access Security Information
Appendix B: Registering the Access Workbench
Appendix C: Why Migrate From Access to SQL Server?
Why Migrate?
What is Migrating?
Access versus SQL Server
Reasons to Migrate
Reasons Not to Migrate
Migration Considerations
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Sidebars
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176
Authors:
Garry Robinson
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Introduction to Computer Programming
More Power to the Numbers Data Sequences and Arrays
Loading and Saving Information Using Files
Fundamentals of 3D Graphics Programming
Epilogue
CISSP Exam Cram 2
BUSINESS CONTINUITY PLANNING
Physical Security Risks
Intrusion-Detection Systems (IDS)
History of Encryption
Symmetric Encryption
Network Security Architectures
Attack Results
Device Hardening
References
Identity Considerations
Appendix B. Answers to Applied Knowledge Questions
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Crash Course in the Internet Protocol Suite
IDS and IPS Architecture
IDS and IPS Internals
Incident Response
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 1
Grouping Objects into Blocks
Controlling Text in a Drawing
Using Layouts to Set Up a Print
Printing an AutoCAD Drawing
Python Programming for the Absolute Beginner, 3rd Edition
Pipes
Splitting and Joining Files
PyEdit: A Text Editor Program/Object
Python Restricted Execution Mode
Appendix A Recent Python Changes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies