Flylib.com
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176
Authors:
Garry Robinson
BUY ON AMAZON
Table of Contents
BackCover
Real World Microsoft Access Database Protection and Security
Foreword
Chapter 1: The Access Protection and Security Driving Instructions
The Overall Road Map
Your Personal Driving Instructions
About the Book and the Demonstration Material
Secure Things that You Can do Now
Does Upgrading Assist in Security?
Further Reading
Security: The Journey Never Ends
What s Next?
Chapter 2: Protecting Your Database with Startup Options
Do I Need to Read this Chapter?
Manually Changing Startup Options
Programming the Startup Options
The AllowBypassKey Property
Using Homemade Accelerator Keys in Restricted Environments
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 3: Using Database Options and Attributes to Protect Data and Objects
How Will this Chapter Help Me?
The Protection-Related Database Options
Hiding Objects in the Database Window
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 4: Providing a Solid Foundation with Good Programming Practices
Is this Chapter Worth Reading Now?
The AutoExec Macro Provides a Flexible Springboard
Splitting Your Database to Make it Easier to Protect
Error Handling Shields Your Code
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 5: Backing up and Recovering Your Databases
What You Must Know About Database Backups and Recoveries
Backing up Multi-User Databases
Normal Backups
Creating Compressed (.ZIP) Archives
Compacting Databases
Saving Tables to Text Files
Exporting and Recovering Programming Objects
Size Does Matter: How the Text Backup Files Will Help
Backing up Other Information
Backing up Your Database by using Access 2003
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 6: User and Object Surveillance
Will Surveillance Really Help?
The Jet User Roster Form
The LDBView Utility
The Access Workbench
Logging Windows Users, Computers, and Access Accounts
Recording When Objects are Opened
Retrieving the Computer Name, Windows User ID, and Access Workgroup ID by using VBA Code
Checking for Users Who Skip the Startup Sequence
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 7: Protecting Your Database with Menus and Toolbars
Will Menus and Toolbars Help Protect My Database?
Building Toolbars, Menus, and Shortcut Menus
Integrating Menus into Your Forms and Reports
Modifying the Built-In Menus and Toolbars
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 8: Developer Workgroup Security
Why is Developer Workgroup Security so Important?
The Developer Workgroup File Strategy
Preparing Your Developer Workgroup File
The Developer Workgroup File is Ready
Securing Your Database with Your Developer Workgroup File
One Secure Object Marks a Developer s Territory
Transferring Ownership of the Database and all its Objects
Maintaining Object Ownership and Change of Ownership
Setting Database Permissions
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 9: Security Concerns, Encryption, and Database Passwords
What is it that We Should be Concerned About?
Are Password Retrieval Programs all Bad?
Importing Objects From Other Databases
Database Encryption
Workgroup Security Files
Database Passwords
VBA Project Passwords
Further Reading
So What are the Best Access Security Strategies?
Reflecting on this Chapter
What s Next?
Chapter 10: Securing Data with Workgroup Security
What do I Need to Know About Securing My Data?
Trusting Your Workgroup File to Other Users
Trusting Your Users by Adopting the Same Workgroup File
Opening Databases with Shortcut Files
Time for Reflection
Security Wizards
Securing Data with PID Authentication
Protecting Data Outside the Company Network
Server-Based Databases
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 11: Object Protection and Security Measures
Have I Done Enough to Protect the Objects in My Database?
A Workgroup Security Refresher
Protecting Linked Tables Paths with Remote Queries
Protecting Your Query Design
Hiding Your Query (Design) in Forms and VBA Code
Protecting Forms by using VBA Code
Protecting Reports by using VBA Code
Protecting Macros by using VBA Code
Protecting VBA Code by using a Password
Using Data Access Pages with Workgroup Security
Access Data Projects
The MDE Database Format Revisited
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 12: Protecting and Securing Your Database with the Operating System
Why is Operating System Security Important for My Database?
Overview of Applicable Operating System Security
Proof-of-Concept Operating System Security
The Access Protected Folder Strategy
The All-Important NTFS Format
Protecting Against Unattended Computers
Issues of Relevance in Windows XP
Checklist of Other Security-Related Issues
Further Reading
Reflecting on this Chapter
Is that the End of the Journey?
Appendix A: Specific Access Security Information
Appendix B: Registering the Access Workbench
Appendix C: Why Migrate From Access to SQL Server?
Why Migrate?
What is Migrating?
Access versus SQL Server
Reasons to Migrate
Reasons Not to Migrate
Migration Considerations
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Sidebars
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176
Authors:
Garry Robinson
BUY ON AMAZON
Oracle Developer Forms Techniques
Standard Toolbar Implementation
Advanced Forms Programming
Taking Advantage of PL/SQL 2.x in Forms
Inheritance
Programmatically Canceling a Query
Network Security Architectures
The Difficulties of Secure Networking
Applied Knowledge Questions
Campus Trust Model
References
The Complete Cisco VPN Configuration Guide
Traffic Issues
SSL Overview
L2L Connectivity Example
Routers as Certificate Authorities
Easy VPN Server Support for 7.0
File System Forensic Analysis
Data Organization
DOS Partitions
Other Topics
Other Topics
Bibliography
802.11 Wireless Networks: The Definitive Guide, Second Edition
Preauthentication
Contention-Free Service with the PCF
Characteristics of the OFDM PHY
Security Definition and Analysis
Standards Work
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Organizing and Estimating the Work
Making Quantitative Decisions
Quantitative Time Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies