What s Next?


What's Next ?

In the next chapter, we will be looking at how you can secure your database by using workgroup ( user -level) security. The particular emphasis in this chapter is on how to set up workgroup security so that the developers of the application have secure ownership of the objects. Other users who open the database will have the ability to use the database but not make any changes to the design of the database. This particular setup is as secure as you can get and does not require the users to enter any user names or passwords before opening the database. If you are serious about protecting your database, this next chapter will be vital reading.




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net