• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 21. SECURING YOUR APPLICATION > UNDERSTANDING SECURITY IN ACCESS 2000

UNDERSTANDING SECURITY IN ACCESS 2000

Access has one of the most advanced security models in the PC database industry. This chapter focuses on helping you understand the security model and features of Access security by describing the security model, presenting the user interface, discussing common problems, and providing useful code examples.

Understanding the Model and the Function of System.mdw

To understand the Access security model, you must first understand the difference between share-level security and user-level security. The easiest way to envision the difference between share-level and user-level security is to make some analogies to some popular network operating systems.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint