Chapter 16: DatabaseSecurity


Overview

You can start by asking two questions:

  • Is the person accessing the database allowed to be there?

  • If the person is allowed to be there, what is he or she allowed, or not allowed, to do?

These two questions lie at the heart of database security. In this age of malicious viruses and computer crimes, we have to be careful that our data, files, and programming code are not illegally accessed or retrieved.

In this chapter we explore security within Access and VBA. You will learn about user authentication, granting and revoking permissions, the Jet Sandbox, and ADOX programming techniques for security.




Access VBA Programming
Microsoft Access VBA Programming for the Absolute Beginner
ISBN: 1598633937
EAN: 2147483647
Year: 2006
Pages: 214
Authors: Michael Vine

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net