The chapters in this part cover issues that concern professional database developers, including securing databases from unauthorized access, enhancing the user interface with toolbars and menus, and replicating (exchanging) data from one Access database to another.
This part builds on the information provided in earlier chapters. In this part, you’ll find answers to many questions and problems facing Access developers, such as identifying a user as the user logs on to an application, exploiting object-oriented programming with the VBA language, and using advanced data management techniques with ActiveX Data Objects (ADOs).
It is entirely possible that some developers will never use many of the capabilities described in the chapters in this part. However, far too often, even advanced developers overlook the capabilities provided by a system like Microsoft Access simply because they’re too busy or too involved in other work to truly learn what Access is capable of. This part takes you on a tour of some of the high-end features provided by Microsoft Access so that you’ll know they’re there, and you’ll have a blueprint for using these capabilities in your own applications.