Chapter 22. Security Introduced
After you design and develop a sophisticated application, you should ensure that the users of the application cannot violate its integrity and the data it maintains. Microsoft Access gives you several options for securing databases. These options range from a very simple method of applying a password to the entire database to applying varying levels of security to each and every object in the database. The more intricate the security solution, the more difficult it is to implement. Fortunately, you can tailor the complexity of the security you implement to the level of security required by each particular application. This hour covers the following concepts:
Implementing share-level security
Implementing user-level ...
Get Sams Teach Yourself Microsoft® Office Access 2003 in 24 Hours now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.