Establishing security for your application protects sensitive data and intellectual property such as your application’s structure and programming code. It also prevents your application’s users from inadvertently changing object designs or code in a way that would cause your application to stop working. This chapter is designed to explain the Microsoft Jet security model and show you how to properly implement it in your application.
The Microsoft Jet Security Model
Securing Your Database with Microsoft Access
Saving Your Database as an MDE File
Security and Database Replication
You can use the code examples in this chapter to help you understand the concepts discussed, or you can modify them and use them in your own applications.
The code examples are located in the JetBook\Samples subfolder on the companion CD-ROM. The code examples for Microsoft Access 97 are in JetSamples.mdb, and the corresponding code examples for Microsoft Visual Basic version 5.0 and other applications that support Visual Basic for Applications are referenced in JetSamples.vbp. Both JetSamples.mdb and JetSamples.vbp use tables and queries in NorthwindTables.mdb, also located in the JetBook\Samples subfolder.
To use the code examples, copy the sample files to your hard disk. Be sure to copy NorthwindTables.mdb as well so that you can use the code examples to work with data.
See Also For more information about copying and using the code examples from the companion CD-ROM, see “Using the Companion CD-ROM” in the Preface.