14. Protecting a Database
In This Chapter
While working on the examples in this book, you’ve been using sample (or “fake”) contact data. Therefore, there hasn’t been a need to worry about the security of the Contacts database that you’ve created. However, when you start creating databases to manage “real” data, you’ll want to be sure that the data is safe and secure.
In this chapter, you learn why it is important to secure FileMaker databases and how to ...