Flylib.com
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176
Authors:
Garry Robinson
BUY ON AMAZON
Table of Contents
BackCover
Real World Microsoft Access Database Protection and Security
Foreword
Chapter 1: The Access Protection and Security Driving Instructions
The Overall Road Map
Your Personal Driving Instructions
About the Book and the Demonstration Material
Secure Things that You Can do Now
Does Upgrading Assist in Security?
Further Reading
Security: The Journey Never Ends
What s Next?
Chapter 2: Protecting Your Database with Startup Options
Do I Need to Read this Chapter?
Manually Changing Startup Options
Programming the Startup Options
The AllowBypassKey Property
Using Homemade Accelerator Keys in Restricted Environments
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 3: Using Database Options and Attributes to Protect Data and Objects
How Will this Chapter Help Me?
The Protection-Related Database Options
Hiding Objects in the Database Window
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 4: Providing a Solid Foundation with Good Programming Practices
Is this Chapter Worth Reading Now?
The AutoExec Macro Provides a Flexible Springboard
Splitting Your Database to Make it Easier to Protect
Error Handling Shields Your Code
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 5: Backing up and Recovering Your Databases
What You Must Know About Database Backups and Recoveries
Backing up Multi-User Databases
Normal Backups
Creating Compressed (.ZIP) Archives
Compacting Databases
Saving Tables to Text Files
Exporting and Recovering Programming Objects
Size Does Matter: How the Text Backup Files Will Help
Backing up Other Information
Backing up Your Database by using Access 2003
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 6: User and Object Surveillance
Will Surveillance Really Help?
The Jet User Roster Form
The LDBView Utility
The Access Workbench
Logging Windows Users, Computers, and Access Accounts
Recording When Objects are Opened
Retrieving the Computer Name, Windows User ID, and Access Workgroup ID by using VBA Code
Checking for Users Who Skip the Startup Sequence
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 7: Protecting Your Database with Menus and Toolbars
Will Menus and Toolbars Help Protect My Database?
Building Toolbars, Menus, and Shortcut Menus
Integrating Menus into Your Forms and Reports
Modifying the Built-In Menus and Toolbars
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 8: Developer Workgroup Security
Why is Developer Workgroup Security so Important?
The Developer Workgroup File Strategy
Preparing Your Developer Workgroup File
The Developer Workgroup File is Ready
Securing Your Database with Your Developer Workgroup File
One Secure Object Marks a Developer s Territory
Transferring Ownership of the Database and all its Objects
Maintaining Object Ownership and Change of Ownership
Setting Database Permissions
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 9: Security Concerns, Encryption, and Database Passwords
What is it that We Should be Concerned About?
Are Password Retrieval Programs all Bad?
Importing Objects From Other Databases
Database Encryption
Workgroup Security Files
Database Passwords
VBA Project Passwords
Further Reading
So What are the Best Access Security Strategies?
Reflecting on this Chapter
What s Next?
Chapter 10: Securing Data with Workgroup Security
What do I Need to Know About Securing My Data?
Trusting Your Workgroup File to Other Users
Trusting Your Users by Adopting the Same Workgroup File
Opening Databases with Shortcut Files
Time for Reflection
Security Wizards
Securing Data with PID Authentication
Protecting Data Outside the Company Network
Server-Based Databases
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 11: Object Protection and Security Measures
Have I Done Enough to Protect the Objects in My Database?
A Workgroup Security Refresher
Protecting Linked Tables Paths with Remote Queries
Protecting Your Query Design
Hiding Your Query (Design) in Forms and VBA Code
Protecting Forms by using VBA Code
Protecting Reports by using VBA Code
Protecting Macros by using VBA Code
Protecting VBA Code by using a Password
Using Data Access Pages with Workgroup Security
Access Data Projects
The MDE Database Format Revisited
Further Reading
Reflecting on this Chapter
What s Next?
Chapter 12: Protecting and Securing Your Database with the Operating System
Why is Operating System Security Important for My Database?
Overview of Applicable Operating System Security
Proof-of-Concept Operating System Security
The Access Protected Folder Strategy
The All-Important NTFS Format
Protecting Against Unattended Computers
Issues of Relevance in Windows XP
Checklist of Other Security-Related Issues
Further Reading
Reflecting on this Chapter
Is that the End of the Journey?
Appendix A: Specific Access Security Information
Appendix B: Registering the Access Workbench
Appendix C: Why Migrate From Access to SQL Server?
Why Migrate?
What is Migrating?
Access versus SQL Server
Reasons to Migrate
Reasons Not to Migrate
Migration Considerations
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Sidebars
Real World Microsoft Access Database Protection and Security
ISBN: 1590591267
EAN: 2147483647
Year: 2003
Pages: 176
Authors:
Garry Robinson
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
The Business of APM
Principles and Practices
Agile Practices
Practice: Product, Project, and Team Review and Adaptive Action
An Achilles Heel?
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Team change
Part II - The Applications
Mergers and acquisitions
IT-based process change
Programming Microsoft ASP.NET 3.5
ASP.NET Core Server Controls
Creating Bindable Grids of Data
Real-World Data Access
Working with the File System
Index
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
Market Orientation and Supply Chain Management in the Fashion Industry
The Development of E-tail Logistics
Transforming Technologies: Retail Exchanges and RFID
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
InDesign Type: Professional Typography with Adobe InDesign CS2
A Blank Sheet: Typing on Your Page
How Much Is Enough?
Glyph Positioning
Discretionary Hyphens and Nonbreaking Hyphens
Paragraph Rules
Sap Bw: a Step By Step Guide for Bw 2.0
Basic Concept of Data Warehousing
BW An SAP Data Warehousing Solution
Creating Update Rules for the InfoCube
InfoCube Design Alternative I Time-Dependent Navigational Attributes
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies