Hour 22. Security Introduced

After you design and develop a sophisticated application, you should ensure that the users of the application cannot violate its integrity and the data it maintains. Microsoft Access gives you several options for securing databases. These options range from a very simple method of applying a password to the entire database to applying varying levels of security to each and every object in the database. The more intricate the security solution, the more difficult it is to implement. Fortunately, you can tailor the complexity of the security you implement to the level of security required by each particular application. This hour covers the following concepts:

  • Implementing share-level security

  • Implementing user-level security

This hour delves into these topics so that you can grasp all the basics of Access security.

    Part III: Creating Your Own Database and Objects
    Part V: Advanced Topics