O'Reilly logo

Pro Access 2010 Development by Mark Collins

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 19. Security

As developers, when we talk about security, we tend to think in terms of preventing unauthorized access to data and applications. As a consumer, however, the concern is more often about installing something that will infect our computer, install malware, or perform other such damaging actions. Both threats are real and need to be considered when providing an Access solution. Which steps you take to address them will depend heavily on your environment, the intended users of your database, and how your software will be distributed.

In this chapter, I will explain the facilities that are available to you along with a discussion of when these are normally used. Each security feature is provided to mitigate one or more potential ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required