Reflecting on this Chapter


In this chapter, I have shown you that one of the best ways to build on your database's security is to apply operating system security, which lets you specify which users can use any of the files in the database folder and subfolders . If you also want the security of knowing that the users will find it very difficult to import the contents of a database or copy the database files themselves , I have demonstrated the Access protected folder strategy. These additional measures, applied with the other Access security and protection measures, will give us a database secured by industry best practice.

In addition to these powerful protection measures, I have also discussed a number of other security issues that Access professionals should understand, including:

  • Why NTFS drive volumes are important.

  • Why unattended computers are an issue and how to safeguard against it.

  • How you can set up a secure Windows XP computer and comparisons between Windows XP Home and Windows XP professional.

  • A checklist of computer and network issues to consider.

  • A checklist of personnel related issues to consider.

Now, I will discuss my personal favorite part of the book: THE END. It's been amazing to me that there was so much relevant material to consider for a product that some people believe is just a simple data management tool for end users. Nevertheless, if you have come this far in the book, you probably won't need me to tell you that Microsoft Access is a substantial database with a superb developer's toolset. And now, to the conclusion.




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net