Chapter 19. Security

As developers, when we talk about security, we tend to think in terms of preventing unauthorized access to data and applications. As a consumer, however, the concern is more often about installing something that will infect our computer, install malware, or perform other such damaging actions. Both threats are real and need to be considered when providing an Access solution. Which steps you take to address them will depend heavily on your environment, the intended users of your database, and how your software will be distributed.

In this chapter, I will explain the facilities that are available to you along with a discussion of when these are normally used. Each security feature is provided to mitigate one or more potential ...

Get Pro Access 2010 Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.