Chapter 28. Advanced Security Techniques
IN THIS CHAPTER
- Why This Chapter Is Important
- Maintaining Groups Using Code
- Using Code to Maintain Users
- Listing All Groups and Users
- Working with Passwords
- Assigning and Revoking Permissions to Objects Using Code
- Encrypting a Database Using Code
- Accomplishing Field-Level Security Using Queries
- Prohibiting Users and Groups from Creating Objects
- Accomplishing Prohibited Tasks by Logging On as a Different User
- Securing Client/Server Applications
- Security and Replication
- Implementing Security with SQL
- DAO and Security
- Choosing Between ADOX, SQL, and DAO
- Practical Examples: Applying Advanced Techniques to Your Application