O'Reilly logo

F. Scott Barker's Microsoft® Access 2000 Power Programming by F. Scott Barker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

UNDERSTANDING SECURITY IN ACCESS 2000

Access has one of the most advanced security models in the PC database industry. This chapter focuses on helping you understand the security model and features of Access security by describing the security model, presenting the user interface, discussing common problems, and providing useful code examples.

Understanding the Model and the Function of System.mdw

To understand the Access security model, you must first understand the difference between share-level security and user-level security. The easiest way to envision the difference between share-level and user-level security is to make some analogies to some popular network operating systems.

Share-level security (where share refers to a network share ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required