Buch, Englisch, 494 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 953 g
ISBN: 978-1-59059-126-0
Verlag: Apress
Youll learn to hide tables as system tables, produce databases that are difficult to crack, and back up databases. You will learn how to keep staff from viewing salary tables, prevent customers from peeking at your distributed software design, and become a better judge of worthwhile security options (versus time-consuming choices).
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Business Application Tabellenkalkulation
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Datenbankprogrammierung Microsoft Access
Weitere Infos & Material
1 The Access Protection and Security Driving Instructions.- 2 Protecting Your Database with Startup Options.- 3 Using Database Options and Attributes to Protect Data and Objects.- 4 Providing a Solid Foundation with Good Programming Practices.- 5 Backing Up and Recovering Your Databases.- 6 User and Object Surveillance.- 7 Protecting Your Database with Menus and Toolbars.- 8 Developer Workgroup Security.- 9 Security Concerns, Encryption, and Database Passwords.- 10 Securing Data with Workgroup Security.- 11 Object Protection and Security Measures.- 12 Protecting and Securing Your Database with the Operating System.- Appendix A Specific Access Security Information.- Appendix B Registering the Access Workbench.- Appendix C Why Migrate from Access to SQL Server?.- What Is Migrating?.- Access versus SQL Server.- Reasons to Migrate.- Reasons Not to Migrate.- Migration Considerations.