Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Real World Microsoft Access Database Protection and Security

Real World Microsoft Access Database Protection and Security

List Price: $59.99
Your Price: $39.59
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: Excellent book - well worth the money
Review: Garry Robinson's book is well written and clear. He covers the security issues thoroughly. As one reads the book, it becomes clear that Microsoft has not and apparantly has no plans to beef up security for Access. It is plagued with holes. But the book provides methods for plugging these holes. Purchasers of the book can download an accompanying database with forms that assist developers with implementing security. These forms have saved me countless hours in programming. These savings alone pay for the cost of the book many times over.

I spent quite a bit of time researching Access security through the Microsoft website and this was a complete waste of time. There are holes in the security that MS doesn't even mention (what a surprise).

This book is well worth the money for anyone who is serious about securing their proprietary efforts.

Rating: 5 stars
Summary: Excellent insight into Access security
Review: I had studied several textbooks on Access security, but the differences in workgroup files across versions and differences in available DAO and ADO tools remained very confusing. Garry Robinson's step by step explanation of available security is very easy to understand and implement. He clearly describes the multiple facets of Microsoft built-in security, limitations to those measures, and additional steps to take to improve security. He includes multiple useful forms available by download that allow the database developer and administers to manage multiple tasks that otherwise would be otherwise difficult once a database has been well-secured.

Rating: 5 stars
Summary: A rare Bird!!
Review: I have known Garry for quiet some time, and was surprised that he had a book in him! I have read many of Garry's journal articles and subscribe to his newsletter and have always found his comments and tips useful - I never thought this would amount to a book. I thought a book on Access security? And then I read it! There is no other resource available that has collated and explained everything you need to know about access database security. SO many other books spend a paragraph or two on how to manage work groups and then they and the other books casually mention that if you really want security move on to SQLServer. Well while that is all well and good some business can not afford SQlServer, and for some corporations, Access provides all of their business needs except the security part. So from a developer's point of view the pit falls and work arounds to finally secure Access Databases are presented in a well thought out and presented book. Good Work Garry!

Rating: 5 stars
Summary: What a time saver
Review: I have struggled for a long time to understand access security and always seen it as a weak point in what is an otherwise great resource. This book offers real life examples, source code and forms that you can use of the shelf. I'm now able to deliver professional results quickly. As a bonus - I got stuck with what turned out to be a very simple problem and, as suggested, emailed Gary with my problem. I had a reply by the next day - Impressed.

Rating: 5 stars
Summary: Very Important Access (97-2003) Reference Book
Review: I'm just starting my second read-through of this book.

Before ordering this book I had just gotten to the all important step of securing my Access Application and now I view this book as the blue-print to accomplish that task. I think that it will save me 50 to 100 hours of work and it gives me the confidence that my application will have the best available security.

It's loaded with code examples and the book contains links to the author's website that has sample files (by Access version). The book also contains cross reference to sites created by others.

The author's sample files contain forms (by Access version) that you can easily import into your Access application to toggle different security and user interface options. The book also contains instructions on how to test the implementation of various security strategies (to make sure you've got it right).

As the author points out, truly securing an Access application ranges from: controlling the user interface, to ensuring a consistent application, to thwarting hackers (or just curious eyes), to backing up the data within the application. Entire chapters are devoted to individual concepts (as opposed to the frustrating few paragraphs in other books or Access documentation).

I highly recommend this book to anyone developing an Access application or anyone responsible for maintaining an Access database. Read it before any roll out or if you have an active Access application, read it immediately to plug any undiscovered holes.

Walter M.
Greenlawn, New York

Rating: 5 stars
Summary: The step by step instruction that I needed
Review: Somehow I find myself responsible for security of an Access database and am learning as I go. Until I found this book, workgroups were a mystery and very easily messed up.

The way this book is written is precisely what I needed, as a novice to much of this stuff. Being able to set up and maintain an Access database on one PC is a totally different animal from using SQL and a front-end on a network and making it all secure. First the author says what he's going to teach, then he outlines how he will present the information and why, and then he proceeds to the real meaty stuff. Because of this you understand which sections particularly apply to what you are doing. My copy already opens automatically to Chapter 8 where I have to admit I needed to start more than once. That is more a function of my lack of knowledge than of the way the chapter is written. The notes and tips are all gems. The instructions are clear and don't leave out any steps. There are details and screen shots all the way along that make it clear if you have made a mistake before you get too far past it. For example, page 262, step 7 my copy has a note added in pencil by me, first time through 'This didn't happen' - should have been a warning but I kept going. Had to go back later and correct things. It taught me to trust the instructions to the letter and not to proceed until what I am doing matches what is in the instructions.' I told you I was a novice! Too many computer manuals are written for the advanced expert - we're not all advanced experts! This book has been exactly what I needed.

Maybe it's because Garry hails from down under. Maybe New Zealanders and Australians think differently - whatever it is, this ex-pat Kiwi is glad to have found this book.

Rating: 5 stars
Summary: Very Important Access (97-2003) Reference Book
Review: This book is exactly what it proports to be. It covers all the Access versions being used in the development world - 97 to 2003. It does not spend half to 2/3 of the book on basic Access tables, querries, reports or vb code that developers already know, but from the first page to the last covers security and protection.

It uses real world examples and code to demonstrate how developers who are proud of their work can protect and secure their Access database so it operates as designed and your intellectual property is not avialable for all to see and use.

Well written from a developer who is obviously using these techniques in his own business every day, the code and screen dumps are easy to follow and can be migrated straight to your current work.

If you are a Access developer selling your work or having others use your work, this book is a must have. It will save time and money in the future by not having to maintain database that have been deliberately or inadvertantly changed. It is an area usually left to last in the development cycle then dropped at the end as too difficult with no return on your investment. This book shows with planning and little effort how easy it is to secure Access databases.

A must have for any Access developer or power user.

Rating: 5 stars
Summary: Access Security Book that delivers on its promises
Review: This book is exactly what it proports to be. It covers all the Access versions being used in the development world - 97 to 2003. It does not spend half to 2/3 of the book on basic Access tables, querries, reports or vb code that developers already know, but from the first page to the last covers security and protection.

It uses real world examples and code to demonstrate how developers who are proud of their work can protect and secure their Access database so it operates as designed and your intellectual property is not avialable for all to see and use.

Well written from a developer who is obviously using these techniques in his own business every day, the code and screen dumps are easy to follow and can be migrated straight to your current work.

If you are a Access developer selling your work or having others use your work, this book is a must have. It will save time and money in the future by not having to maintain database that have been deliberately or inadvertantly changed. It is an area usually left to last in the development cycle then dropped at the end as too difficult with no return on your investment. This book shows with planning and little effort how easy it is to secure Access databases.

A must have for any Access developer or power user.

Rating: 5 stars
Summary: Excellent Resource
Review: This book was a great resource in securing my databases. It walked me through everything I needed to do step-by-step. I highly recommended it to anyone looking to secure their databases.


<< 1 >>

© 2004, ReviewFocus or its affiliates