Real World Microsoft Access Database Protection and SecurityApress, 01.01.2008 - 494 Seiten Author Garry Robinson approaches this book differently than other Access books on the market: he keeps the focus on issues that will help protect your database. Written from an experienced developers point of view, he discusses protection and security task-by-task. This book is even recommended among Microsoft TechNet Security Topics: Threats and Countermeasures. Youll learn to hide tables as system tables, produce databases that are difficult to crack, and back up databases. You will learn how to keep staff from viewing salary tables, prevent customers from peeking at your distributed software design, and become a better judge of worthwhile security options (versus time-consuming choices). |
Inhalt
The Overall Road Map | 4 |
Security Concerns Encryption | 6 |
About the Book and the Demonstration Material | 10 |
Does Upgrading Assist in Security? | 17 |
Protecting Your Database | 23 |
Programming the Startup Options | 30 |
The AllowBypassKey Property | 42 |
Whats Next? | 48 |
Security Concerns Encryption | 239 |
The Developer Workgroup File Strategy | 240 |
The Developer Workgroup File Is Ready | 254 |
Securing Your Database with Your Developer | 261 |
Transferring Ownership of the Database | 267 |
Setting Database Permissions | 273 |
Further Reading | 282 |
and Database Passwords | 287 |
Using Database Options and Attributes | 49 |
Hiding Objects in the Database Window | 67 |
Further Reading | 79 |
Providing a Solid Foundation | 81 |
Splitting Your Database to Make It Easier to Protect | 87 |
Error Handling Shields Your Code | 97 |
Further Reading | 105 |
Backing Up and Recovering Your Databases | 109 |
Backing Up MultiUser Databases | 112 |
Normal Backups | 120 |
Saving Tables to Text Files | 128 |
Exporting and Recovering Programming Objects | 140 |
How the Text Backup Files Will Help | 152 |
Further Reading | 158 |
User and Object Surveillance | 161 |
The LDBView Utility | 169 |
Logging Windows Users Computers and Access Accounts | 176 |
Recording When Objects Are Opened | 182 |
Checking for Users Who Skip the Startup Sequence | 191 |
Protecting Your Database with Menus | 197 |
Integrating Menus into Your Forms and Reports | 212 |
Modifying the BuiltIn Menus and Toolbars | 224 |
Reflecting on This Chapter | 231 |
Developer Workgroup Security | 233 |
Workgroup Security Files | 295 |
VBA Project Passwords | 305 |
Securing Data with Workgroup Security | 307 |
Trusting Your Users by Adopting the Same Workgroup File | 318 |
Time for Reflection | 330 |
Securing Data with PID Authentication | 345 |
Protecting Data Outside the Company Network | 355 |
Reflecting on This Chapter | 361 |
Object Protection and Security Measures | 363 |
Protecting Linked Tables Paths with Remote Queries | 371 |
Protecting Forms by Using VBA Code | 377 |
Using Data Access Pages with Workgroup Security | 385 |
The MDE Database Format Revisited | 391 |
Further Reading | 399 |
Protecting and Securing Your Database | 403 |
Overview of Applicable Operating System Security | 406 |
The Access Protected Folder Strategy | 427 |
The AllImportant NTFS Format | 439 |
Checklist of Other SecurityRelated Issues | 446 |
Appendix A Specific Access Security Information | 453 |
Why Migrate from Access to SQL Server? | 461 |
Reasons to Migrate | 469 |
475 | |
Andere Ausgaben - Alle anzeigen
Real World Microsoft Access Database Protection and Security Garry Robinson Keine Leseprobe verfügbar - 2013 |