• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 28. Advanced Security Techniques > Practical Examples: Applying Advance...

Practical Examples: Applying Advanced Techniques to Your Application

The advanced techniques you build into your applications depend on how much responsibility you want to give the application for implementing security. You might want to implement security from outside the application rather than build it directly into the application. You can add all the forms contained in CHAP28EX.MDB directly into your applications if you want. Also, you can add the code in the AutoExec routine (covered in the section “Ensuring That Users Have Passwords”) into your applications so that you force users running the application to assign themselves a password.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint