O'Reilly logo

F. Scott Barker's Microsoft® Access 2000 Power Programming by F. Scott Barker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

AVOIDING COMMON PITFALLS FOUND IN ACCESS SECURITY

The following sections discuss a handful of issues that developers new to security might often encounter. Some of the topics covered in this section include planning security, running permissions on queries, securing attached tables, and dealing with life after the Security Wizard.

Planning Security

You should plan your security model at the same time you plan your database design. Planning ahead and implementing security along the way gives you less chance for leaving security holes in your application. Often when a project gets big and hundreds of objects are created, there's a great possibility that an object or two might be overlooked and not be secured properly if you wait until the last ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required