Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Real world Microsoft Access database protection and security
Robinson G., APress, LP, 2003. Type: Book (9781590591260)
Date Reviewed: Apr 9 2004

This book represents a meeting between the database and security management worlds. Although centered more on security issues related to database systems development and administration, and thus making an excellent guide for a data administrator, it can also be useful for security administrators who are willing to glimpse the work involved in making database management system (DBMS)-based applications secure.

The author is a long-time Microsoft Access developer; thanks to his first-hand experience, he can address security from many points of view. His first perspective is that of the people who work hands-on with the application: the developer, the database administrator, and the information technology (IT) manager. His second perspective addresses the application structure: he maintains that security is attained by splitting an application into several parts, essentially a front-end user interface (UI) file, a back-end data file, and an administration file containing user profiles and permissions. Finally, from the point of view of putting everything in place, he explains that an application can be protected in steps, each harder to implement and manage than the previous one, yet yielding more protection.

The book starts by describing the basic, element-level Access protection features. It then explains how to embed protection mechanisms into an application during its development. Finally, it describes a protection-conscious application management style. Each chapter clearly states the different benefits the developer, the database administrator, and the IT manager can gain from the information presented.

The style of each chapter is plain and explanatory; examples are provided, both using step-by-step procedures, complete with the resulting screen outputs, and using written code. In addition, more code, and even entire forms, can be downloaded from the publisher’s Web site. However plain its style, however, this is no reference book; it is difficult to locate information of immediate interest. The best use of this book is to read it from end to end, and then come back at a later time looking for specific parts of interest. Neither is this a book for the casual reader; its level is intermediate to advanced. Good knowledge, and maybe some practical experience, of either database or security management is recommended.

Reviewer:  Andrea Paramithiotti Review #: CR129426 (0410-1137)
Bookmark and Share
  Featured Reviewer  
 
Microsoft Access (H.2.4 ... )
 
 
Relational Databases (H.2.4 ... )
 
 
Security, Integrity, And Protection (H.2.7 ... )
 
 
Database Administration (H.2.7 )
 
 
Systems (H.2.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Microsoft Access": Date
In business with Access
Byrne J., Prentice-Hall, Inc., Upper Saddle River, NJ, 1995. Type: Book (9780134376905)
Jun 1 1996
Automating Microsoft Access with macros
Novalis S., SYBEX Inc., Alameda, CA, 1996. Type: Book (9780782118568)
Apr 1 1997
Accessible Access 2003
Whitehorn M., Marklyn B., Springer-Verlag New York, Inc., Secaucus, NJ, 2005.  378, Type: Book (9781852339494)
Jan 16 2006
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy