Once you see the syntax for the ISAM drivers, as demonstrated in this chapter, the connection process is fairly straightforward. They use techniques learned in earlier chapters to create and manipulate a recordset.
We looked at connections with Microsoft Word, Excel, and Outlook. In addition, we created a custom toolbar and searched for a file.
With all of this interaction, security can be a problem. In the next chapter, we are going to turn our attention to maintaining database security.