Real World Microsoft Access Database Protection and Security

This chapter has thrown a few negative thoughts onto different parts of the Access security framework. To help clear your mind in readiness for the next chapter, here is a summary of the best security techniques that you can adopt. I have put together this list by considering the issues raised in this chapter plus other concerns that I uncovered that I deliberately did not reveal.

The rest of your security strategy involves working through all the different parts of Access and plugging the gaps. In this case, always concentrate on the important objects and data and then worry about the rest of the database.

Категории