Đang chuẩn bị liên kết để tải về tài liệu:
Access 2007 VBA Programmer’s Reference phần 7
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Hướng dẫn là tuyệt vời cho thiết lập người dùng và nhóm người dùng mức độ bảo mật. Tuy nhiên, nhiều nhà phát triển có thể muốn sử dụng mã để thực hiện thay đổi sau khi các điều khoản ban đầu đã được thiết lập. | Chapter 18 Database Security able to retrieve the data it houses. In many cases with the proper network security a user could open copy or even delete the database. There are also several options for working with security. Many developers may want to use a combination of the User-Level Security Wizard and code. The wizard is excellent for establishing users and groups for user-level security. However many developers may want to use code to make changes after the initial permissions have been set. And it s certainly handy to use code to generate custom documentation about user-level security. Either way you are sure to find that Access provides powerful solutions for developing secure applications. The Access help files knowledge base articles and MSDN all provide useful instructions and guidance about various aspects of Access security and how to secure data and code. Chapter 22 covers more information about macro security how Access enhances protection for machines from malicious database attacks that use code in database files. 648 n Understanding Client-Server Development with VBA Access makes it easy to create applications that interact with other database formats and enterprise-level database servers. Unfortunately the easiest methods are not always the best and incorrect choices can have serious long-term effects on the design stability maintenance and overall success of a project. A thorough understanding of how Access interacts with other databases and the various alternatives available for developers is critical to making the best design decisions for any given application. In a typical business environment Access database applications tend to sprout up because some individual or small group needs functionality and creates an Access database to implement a viable solution. Other people or groups notice the application s usefulness and decide to use the solution as well. Someone may even split the data tables into a backend database and link the tables in .