<< 1 >>
Rating:  Summary: Excellent book - well worth the money Review: Garry Robinson's book is well written and clear. He covers the security issues thoroughly. As one reads the book, it becomes clear that Microsoft has not and apparantly has no plans to beef up security for Access. It is plagued with holes. But the book provides methods for plugging these holes. Purchasers of the book can download an accompanying database with forms that assist developers with implementing security. These forms have saved me countless hours in programming. These savings alone pay for the cost of the book many times over.
I spent quite a bit of time researching Access security through the Microsoft website and this was a complete waste of time. There are holes in the security that MS doesn't even mention (what a surprise).
This book is well worth the money for anyone who is serious about securing their proprietary efforts.
Rating:  Summary: Excellent insight into Access security Review: I had studied several textbooks on Access security, but the differences in workgroup files across versions and differences in available DAO and ADO tools remained very confusing. Garry Robinson's step by step explanation of available security is very easy to understand and implement. He clearly describes the multiple facets of Microsoft built-in security, limitations to those measures, and additional steps to take to improve security. He includes multiple useful forms available by download that allow the database developer and administers to manage multiple tasks that otherwise would be otherwise difficult once a database has been well-secured.
Rating:  Summary: A rare Bird!! Review: I have known Garry for quiet some time, and was surprised that he had a book in him! I have read many of Garry's journal articles and subscribe to his newsletter and have always found his comments and tips useful - I never thought this would amount to a book. I thought a book on Access security? And then I read it! There is no other resource available that has collated and explained everything you need to know about access database security. SO many other books spend a paragraph or two on how to manage work groups and then they and the other books casually mention that if you really want security move on to SQLServer. Well while that is all well and good some business can not afford SQlServer, and for some corporations, Access provides all of their business needs except the security part. So from a developer's point of view the pit falls and work arounds to finally secure Access Databases are presented in a well thought out and presented book. Good Work Garry!
Rating:  Summary: What a time saver Review: I have struggled for a long time to understand access security and always seen it as a weak point in what is an otherwise great resource. This book offers real life examples, source code and forms that you can use of the shelf. I'm now able to deliver professional results quickly. As a bonus - I got stuck with what turned out to be a very simple problem and, as suggested, emailed Gary with my problem. I had a reply by the next day - Impressed.
Rating:  Summary: Very Important Access (97-2003) Reference Book Review: I'm just starting my second read-through of this book. Before ordering this book I had just gotten to the all important step of securing my Access Application and now I view this book as the blue-print to accomplish that task. I think that it will save me 50 to 100 hours of work and it gives me the confidence that my application will have the best available security. It's loaded with code examples and the book contains links to the author's website that has sample files (by Access version). The book also contains cross reference to sites created by others. The author's sample files contain forms (by Access version) that you can easily import into your Access application to toggle different security and user interface options. The book also contains instructions on how to test the implementation of various security strategies (to make sure you've got it right). As the author points out, truly securing an Access application ranges from: controlling the user interface, to ensuring a consistent application, to thwarting hackers (or just curious eyes), to backing up the data within the application. Entire chapters are devoted to individual concepts (as opposed to the frustrating few paragraphs in other books or Access documentation). I highly recommend this book to anyone developing an Access application or anyone responsible for maintaining an Access database. Read it before any roll out or if you have an active Access application, read it immediately to plug any undiscovered holes. Walter M. Greenlawn, New York
Rating:  Summary: The step by step instruction that I needed Review: Somehow I find myself responsible for security of an Access database and am learning as I go. Until I found this book, workgroups were a mystery and very easily messed up. The way this book is written is precisely what I needed, as a novice to much of this stuff. Being able to set up and maintain an Access database on one PC is a totally different animal from using SQL and a front-end on a network and making it all secure. First the author says what he's going to teach, then he outlines how he will present the information and why, and then he proceeds to the real meaty stuff. Because of this you understand which sections particularly apply to what you are doing. My copy already opens automatically to Chapter 8 where I have to admit I needed to start more than once. That is more a function of my lack of knowledge than of the way the chapter is written. The notes and tips are all gems. The instructions are clear and don't leave out any steps. There are details and screen shots all the way along that make it clear if you have made a mistake before you get too far past it. For example, page 262, step 7 my copy has a note added in pencil by me, first time through 'This didn't happen' - should have been a warning but I kept going. Had to go back later and correct things. It taught me to trust the instructions to the letter and not to proceed until what I am doing matches what is in the instructions.' I told you I was a novice! Too many computer manuals are written for the advanced expert - we're not all advanced experts! This book has been exactly what I needed. Maybe it's because Garry hails from down under. Maybe New Zealanders and Australians think differently - whatever it is, this ex-pat Kiwi is glad to have found this book.
Rating:  Summary: Very Important Access (97-2003) Reference Book Review: This book is exactly what it proports to be. It covers all the Access versions being used in the development world - 97 to 2003. It does not spend half to 2/3 of the book on basic Access tables, querries, reports or vb code that developers already know, but from the first page to the last covers security and protection. It uses real world examples and code to demonstrate how developers who are proud of their work can protect and secure their Access database so it operates as designed and your intellectual property is not avialable for all to see and use. Well written from a developer who is obviously using these techniques in his own business every day, the code and screen dumps are easy to follow and can be migrated straight to your current work. If you are a Access developer selling your work or having others use your work, this book is a must have. It will save time and money in the future by not having to maintain database that have been deliberately or inadvertantly changed. It is an area usually left to last in the development cycle then dropped at the end as too difficult with no return on your investment. This book shows with planning and little effort how easy it is to secure Access databases. A must have for any Access developer or power user.
Rating:  Summary: Access Security Book that delivers on its promises Review: This book is exactly what it proports to be. It covers all the Access versions being used in the development world - 97 to 2003. It does not spend half to 2/3 of the book on basic Access tables, querries, reports or vb code that developers already know, but from the first page to the last covers security and protection. It uses real world examples and code to demonstrate how developers who are proud of their work can protect and secure their Access database so it operates as designed and your intellectual property is not avialable for all to see and use. Well written from a developer who is obviously using these techniques in his own business every day, the code and screen dumps are easy to follow and can be migrated straight to your current work. If you are a Access developer selling your work or having others use your work, this book is a must have. It will save time and money in the future by not having to maintain database that have been deliberately or inadvertantly changed. It is an area usually left to last in the development cycle then dropped at the end as too difficult with no return on your investment. This book shows with planning and little effort how easy it is to secure Access databases. A must have for any Access developer or power user.
Rating:  Summary: Excellent Resource Review: This book was a great resource in securing my databases. It walked me through everything I needed to do step-by-step. I highly recommended it to anyone looking to secure their databases.
<< 1 >>
|