• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Summary

SQL Server security is far more powerful than Access security. In this chapter, you learned about the two authentication modes available. You learned about object permissions and application roles. Finally, you learned about Access security and how it interacts with SQL Server security. Unless there is no need to secure the data that your application interacts with, all of these techniques are vital to the success of your application.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint