What s Next?


What's Next ?

In the next chapter, we are going to look at how we can best secure data in our databases by building on the developer workgroup strategy discussed in Chapter 8 and incorporating security for different groups of users. We are also going to make sure that we minimize the possibility that password retrieval software will reveal data secured by workgroups with different levels of access. Once the fundamentals of securing data are explained, I will then expand on such topics as using the User -Level Security wizard to set up workgroup security rapidly and using owner permission queries to hide table and query designs, fields, and subgroup data for different user groups.




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net