What s Next?


What's Next ?

In the next chapter, we will explore some of the other built-in Access security techniques like encryption and database passwords. The real-world issues that password crackers have brought to these options will taint these discussions. In addition, if you already use or want to take your workgroup security further, you will need to read in more detail about the problems with the workgroup files so that you can appreciate why I have to advocate the developer workgroup strategy in this chapter and the PID authentication strategy in Chapter 10.




Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net