Abstract
In this chapter, you will learn how to find out who and how many people are using your database. This important surveillance information can help you with administration issues such as asking users to log off the database or network for maintenance and upgrades and with targeting security for your database. To help you with these issues and other related topics, this chapter has a number of easy-to-install Access objects and discusses some free products that you can use. You should consider deploying some of these solutions in your database because they may help you balance speculation with facts, something that is always a good idea before embarking on software upgrades, such as adding security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2004 Springer Science+Business Media New York
About this chapter
Cite this chapter
Robinson, G. (2004). User and Object Surveillance. In: Real World Microsoft Access Database Protection and Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0793-1_6
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0793-1_6
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-126-0
Online ISBN: 978-1-4302-0793-1
eBook Packages: Springer Book Archive