User-Proofing Your Access Database: Part 2
In the first part of user-proofing your Access Database, we talked about some basic ways you can protect your data against well-intended but inexperienced users. While these methods won't keep out an experienced hacker, they will provide a level of safety similar to that provided when you childproof your home. This article contains more sophisticated tips appropriate when your users start going to Microsoft Access advanced training.
The full article appears here:
http://www.microsofttraining.net/article-418-microsoft-access-advanced-training.html
Regards,
The Microsoft Training Blog Team
http://microsoft-training.blogspot.com
0 Comments:
Post a Comment
<< Home