Access Protection Measures

<< Click to Display Table of Contents >>

Navigation:  »No topics above this level«

Access Protection Measures

 

What follows is a  selection of material from Garry Robinson's book on Access Security and Protection.  All material that has been selected could be useful for Access 2010 onwards. Techniques that were made phased since I wrote this book have been excluded.

 

 

hmfile_hash_8c890827

 

 

Purchase this book as an eBook direct from Apress

or Purchase from Amazon USA..

or if you only want the download materials, it comes with all the downloads for this website here Buy the Smart Access PDFs and Downloads

Real World Microsoft Access Database Protection and Security

Written for Access 97, 2000, 2002, 2003 500 Pages

 
Microsoft Access is the most popular desktop database in the world today, which means that many people have investigated its security measures and some have worked out ways to get around them. Coupled with that, Access is a versatile database designed for both developers and users. When you first set up a database, it comes with all its security turned off and all the developer tools turned on. This book tells you how to turn on the security properly and also shows you how to protect the investment that you have made in the database. This page aims to help you decide if this book is a worthwhile investment for you. Thanks for your interest.

Garry Robinson, Microsoft Access Author and Developer

 

 
Key Reasons Why You Would Want To Read This Book

clip0015

Combine internal Access security with modern operating systems to make your database as secure as possible

clip0016

Follow visual step-by-step guides and programming examples to understand security threats and to implement workgroup security properly.

clip0017

Incorporate real world examples into your database to backup and recover databases, undertake user surveillance, and allocate protected menus and toolbars to your forms and reports.

 
 

Reviews

Read reviews at DatabaseJournal.com or just read the Reviews at Amazon

 
The Intended Audience and the Demonstration Material

The goal of the material in this book is to improve Access protection and security, and, as a result, the material in the book does not target a particular skill level, such as developer or DBA. More than half of the book is at a level that a competent Access DBA could manage, and, where possible, I have set up the more complex demonstration examples as plug-and-play forms. Naturally, because I regularly write for developers’ magazines, there are many examples that will keep the very skilled end of town happy. In normal Access book classification, one could classify 40% of the material as being for intermediate level and 50% for advanced level. The other 10% is aimed at the IT Manager because that person needs to be aware of the pros and cons of each protection and security method so that they remained fully informed about the security implications of this important business tool.

Another design criteria of this book was to help you protect and secure any Access database created with Access 97 through to Access 2003 and beyond. In addition, the download samples (as shown in Figure 1), where possible, will work unchanged with the different versions of Access. There is a separate download database for each version of Access and where possible, additional samples have been added if changes have been made to Access. This particularly applies to Access 2002/2003.

12670101

 

Figure 1 - a picture of the demonstration database
 
Buy the Smart Access PDFs and Downloads

 

External Links

Whilst writiing the book I maintained a comprehensive list of links that helped me or would be useful to the reader. Many of these can be found here Access Security Book Links

 

Find Out How to Protect Your Investment

This book aims to achieve a lot more than helping you keep people from stealing your database or code. It’s all about doing things that will protect the investment that you made in your database. To help achieve this, this book has extensive coverage on issues such as
 
• Appropriate database options.
• Good programming practices, such as splitting databases and error handling.
• Backing up and recovering databases, tables, and objects.
• User surveillance.
• Setting up, implementing, and protecting your Access menus.

Start reading Chapter 1: The Access Protection and Security Driving Instructions