Real World Microsoft Access Database Protection and Security / Edition 1

Real World Microsoft Access Database Protection and Security / Edition 1

5.0 1
by Garry Robinson
     
 

ISBN-10: 1590591267

ISBN-13: 9781590591260

Pub. Date: 11/10/2003

Publisher: Apress

Intended for database administrators, this book shows how to protect an Access database by making changes in the startup options, database options and attributes, menus and toolbars, workgroup security, and the Windows operating system itself. The Australian author discusses the AutoExec macro, database splitting, user surveillance, object ownership, clearing

Overview

Intended for database administrators, this book shows how to protect an Access database by making changes in the startup options, database options and attributes, menus and toolbars, workgroup security, and the Windows operating system itself. The Australian author discusses the AutoExec macro, database splitting, user surveillance, object ownership, clearing permissions, disguising queries behind forms, and data access pages. VBA code is provided, and differences among Access 97, 2000, 2002, and 2003 are identified. Annotation ©2004 Book News, Inc., Portland, OR

Product Details

ISBN-13:
9781590591260
Publisher:
Apress
Publication date:
11/10/2003
Edition description:
2004
Pages:
494
Product dimensions:
7.01(w) x 9.25(h) x 0.04(d)

Table of Contents

Forewordxiii
About the Authorxv
About the Technical Reviewerxvi
Acknowledgmentsxvii
Chapter 1The Access Protection and Security Driving Instructions1
What's This Book Going to Do for You?1
The Overall Road Map4
Your Personal Driving Instructions7
About the Book and the Demonstration Material10
Secure Things that You Can Do Now14
Does Upgrading Assist in Security?17
Further Reading19
Security: The Journey Never Ends20
What's Next?22
Chapter 2Protecting Your Database with Startup Options23
Do I Need to Read this Chapter?24
Manually Changing Startup Options25
Programming the Startup Options30
The AllowBypassKey Property42
Using Homemade Accelerator Keys in Restricted Environments45
Further Reading47
Reflecting on this Chapter47
What's Next?48
Chapter 3Using Database Options and Attributes to Protect Data and Objects49
How Will This Chapter Help Me?50
The Protection-Related Database Options52
Hiding Objects in the Database Window67
Further Reading79
Reflecting on This Chapter79
What's Next?80
Chapter 4Providing a Solid Foundation with Good Programming Practices81
Is This Chapter Worth Reading Now?82
The AutoExec Macro Provides a Flexible Springboard83
Splitting Your Database to Make It Easier to Protect87
Error Handling Shields Your Code97
Further Reading105
Reflecting on This Chapter107
What's Next?107
Chapter 5Backing Up and Recovering Your Databases109
What You Must Know About Database Backups and Recoveries110
Backing Up Multi-User Databases112
Normal Backups120
Creating Compressed (.ZIP) Archives122
Compacting Databases124
Saving Tables to Text Files128
Exporting and Recovering Programming Objects140
Size Does Matter: How the Text Backup Files Will Help152
Backing Up Other Information153
Backing Up Your Database by Using Access 2003156
Further Reading158
Reflecting on This Chapter159
What's Next?159
Chapter 6User and Object Surveillance161
Will Surveillance Really Help?162
The Jet User Roster Form163
The LDBView Utility169
The Access Workbench173
Logging Windows Users, Computers, and Access Accounts176
Recording When Objects Are Opened182
Retrieving the Computer Name, Windows User ID, and Access Workgroup ID by Using VBA Code187
Checking for Users Who Skip the Startup Sequence191
Further Reading193
Reflecting on This Chapter195
What's Next?196
Chapter 7Protecting Your Database with Menus and Toolbars197
Will Menus and Toolbars Help Protect My Database?198
Building Toolbars, Menus, and Shortcut Menus199
Integrating Menus into Your Forms and Reports212
Modifying the Built-In Menus and Toolbars224
Further Reading229
Reflecting on This Chapter231
What's Next?232
Chapter 8Developer Workgroup Security233
Why Is Developer Workgroup Security So Important?234
The Developer Workgroup File Strategy240
Preparing Your Developer Workgroup File245
The Developer Workgroup File Is Ready254
Securing Your Database with Your Developer Workgroup File261
One Secure Object Marks a Developer's Territory262
Transferring Ownership of the Database and All Its Objects267
Maintaining Object Ownership and Change of Ownership269
Setting Database Permissions273
Further Reading282
Reflecting on This Chapter284
What's Next?286
Chapter 9Security Concerns, Encryption, and Database Passwords287
What Is It That We Should Be Concerned About?288
Are Password Retrieval Programs All Bad?289
Importing Objects from Other Databases289
Database Encryption291
Workgroup Security Files295
Database Passwords298
VBA Project Passwords305
Further Reading305
So What Are the Best Access Security Strategies?305
Reflecting on This Chapter306
What's Next?306
Chapter 10Securing Data with Workgroup Security307
What Do I Need to Know About Securing My Data?308
Trusting Your Workgroup File to Other Users310
Trusting Your Users by Adopting the Same Workgroup File318
Opening Databases with Shortcut Files323
Time for Reflection330
Security Wizards333
Securing Data with PID Authentication345
Protecting Data Outside the Company Network355
Server-Based Databases359
Further Reading360
Reflecting on This Chapter361
What's Next?362
Chapter 11Object Protection and Security Measures363
Have I Done Enough to Protect the Objects in My Database?364
A Workgroup Security Refresher365
Protecting Linked Tables' Paths with Remote Queries371
Protecting Your Query Design374
Hiding Your Query (Design) in Forms and VBA Code376
Protecting Forms by Using VBA Code377
Protecting Reports by Using VBA Code381
Protecting Macros by Using VBA Code382
Protecting VBA Code by Using a Password382
Using Data Access Pages with Workgroup Security385
Access Data Projects390
The MDE Database Format Revisited391
Further Reading399
Reflecting on This Chapter400
What's Next?401
Chapter 12Protecting and Securing Your Database with the Operating System403
Why Is Operating System Security Important for My Database?404
Overview of Applicable Operating System Security406
Proof-of-Concept Operating System Security409
The Access Protected Folder Strategy427
The All-Important NTFS Format439
Protecting Against Unattended Computers441
Issues of Relevance in Windows XP443
Checklist of Other Security-Related Issues446
Further Reading449
Reflecting on This Chapter450
Is That the End of the Journey?451
Appendix ASpecific Access Security Information453
Appendix BRegistering the Access Workbench459
Appendix CWhy Migrate from Access to SQL Server?461
What Is Migrating?462
Access versus SQL Server464
Reasons to Migrate469
Reasons Not to Migrate471
Migration Considerations472
Index475

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Real World Microsoft Access Database Protection and Security 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
As advertised, I found the book very readable. Garry transforms a rather dry and gritty subject into an almost chatty style that is easy to manage. It only took me a couple of days to read all 500 pages and even though I am an experienced developer, I picked up a lot of useful tips. Garry writes specific information for different readers - the developer, the end user, the database administrator. Each has different requirements. For some applications, workgroup security is essential, for other it is not. Garry goes into Workgroup security in considerable depth, but in a logical and understandable way. He explains that there is more than one way to secure a database. It all depends who the users are, who the market is, and the liklihood of people trying to do the wrong thing. Protecting users from themselves is a noteable part of the process. Garry looked at a lot of things that you might not consider as security issues, but which can make a big difference - menus, startup options, backups, user surveillance, error handling, coding practices. Securing your database against loss and corruption is at least as important as foiling hackers. With workgroup security, I particularly liked the idea of securing just one object. This stamps your ownership on the app, and keeps the client from going too far without your input. This book will suit all those using or developing access applications. Especially those who want to keep away from 'complex' workgroup security, you too will find a lot of very useful information here. This will allow you to keep a few steps ahead of your clients.