User and Object Surveillance

  • Garry Robinson


In this chapter, you will learn how to find out who and how many people are using your database. This important surveillance information can help you with administration issues such as asking users to log off the database or network for maintenance and upgrades and with targeting security for your database. To help you with these issues and other related topics, this chapter has a number of easy-to-install Access objects and discusses some free products that you can use. You should consider deploying some of these solutions in your database because they may help you balance speculation with facts, something that is always a good idea before embarking on software upgrades, such as adding security.


Application Programming Interface Access Database Security Breach Text String Demonstration Database 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2004

Authors and Affiliations

  • Garry Robinson

There are no affiliations available

Personalised recommendations