What s Next?


What's Next ?

In the next chapter, we will explore a gold-plated security method plus a few additional tricks to distract that database snoop whom we spend so much time worrying about. Some of the techniques that we will cover:

  • Compiling a version of our database into MDE format to provide the best possible security for the programmable parts of the application.

  • Disguising our queries behind forms and even using queries to remove linked tables from our databases.

  • Making our forms and reports launch as objects so that the forms cannot be placed in design mode.

  • Discussing the User-Level Security wizard and how it affects other objects.

We're in the home stretch for Access protection and security, and a few of these topics are just additional and interesting padlocks for a well-locked database.




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net