Part 2

Data Access and Security Strategies

   

Most enterprise applications use data, whether it's located on a local desktop, mainframe computer, or various distributed network data sources. As you develop your application, you must carefully design and implement your application's data access strategy. This requires careful attention to defining the data structures, choosing the right data access technology, selecting the best cursor type, and optimizing the application's architecture for efficient database retrieval.

Your application also must ensure adequate security to avoid unauthorized modification or use. This requires understanding how to protect your application's architectural components and processes.

The following sections will help you choose the right data access and security strategies for your enterprise application.

Section Description
Chapter 4: Designing Enterprise Data Explains the process of defining your application's data characteristics and processes.
Chapter 5: Choosing the Right Data Access Technology Describes the features of Microsoft data access technologies, including OLE DB with ADO, RDO, ODBCDirect, DAO, and ODBC.
Chapter 6: Implementing Mainframe Data Access Describes how your application can use Microsoft® SNA Server to access data and application processes on mainframe and midrange computer systems.
Chapter 7: Choosing and Managing Cursors Discusses how to choose the most suitable cursor type for your application's data access requirements.
Chapter 8: Implementing Enterprise Application Security Explains how to protect the architectural components and processes that run your application.
Chapter 9: Data Access Performance Tuning Describes how the foundation of high-performance data access includes good architectural design, adequate hardware resources, and optimized database retrieval algorithms.