O'Reilly logo

Microsoft® Access® 2010: Step by Step by Joan Lambert and Joyce Cox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Protect Databases

Chapter at a Glance

Protect Databases

In this chapter, you will learn how to

Assign passwords to databases.

Split databases.

Secure databases for distribution.

Prevent database problems.

Database protection takes two forms: ensuring that the database’s data is secure and ensuring that its data is available and useable.

The need for database security is an unfortunate fact of life. As with your house, car, office, or briefcase, the level of security required for your database depends on the value of what you have and whether you are trying to protect it from curious eyes, accidental damage, malicious destruction, or theft. The security of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required