Monday, August 10, 2009

User-Proofing Your Access Database: Part 2

In the first part of user-proofing your Access Database, we talked about some basic ways you can protect your data against well-intended but inexperienced users. While these methods won't keep out an experienced hacker, they will provide a level of safety similar to that provided when you childproof your home. This article contains more sophisticated tips appropriate when your users start going to Microsoft Access advanced training.

The full article appears here:
http://www.microsofttraining.net/article-418-microsoft-access-advanced-training.html

Regards,
The Microsoft Training Blog Team
http://microsoft-training.blogspot.com

0 Comments:

Post a Comment

<< Home