O'Reilly logo

Microsoft® Office Access 2003 Inside Out by John L. Viescas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 30. Securing Your Database

When you’re developing applications for your own use, you probably don’t need to worry much about securing your database. But when you develop applications for others to use, particularly if the application manages sensitive information, you need to understand the steps you can take to make your data and application more secure.

This chapter discusses how to secure both the data and all objects (queries, forms, reports, macros, and modules) in a Microsoft Access desktop database. You can also find a discussion of the considerations for securing an application that you create with an Access project file and Microsoft ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required