Bulletproofing the Database
|
|
- Rosa Knight
- 5 years ago
- Views:
Transcription
1 Bulletproofing the Database Robert Grauer, Keith Mulbery, Maurie Wigman Lockley Copyright 2008 Pearson Prentice Hall. All rights reserved. 1
2 Objectives Encrypt and password protect a database Digitally sign and publish a database Save the database as an ACCDE file Analyze database documentation Analyze database performance Copyright 2008 Pearson Prentice Hall. All rights reserved. 2
3 Objectives Analyze database table structure and relationships Move data to a new database file Analyze/optimize object relationships in a database Create usable switchboards Copyright 2008 Pearson Prentice Hall. All rights reserved. 3
4 Data Protection Countermeasures Measures taken to protect your assets Access provides three countermeasure strategies Password Protection Ability to digitally sign database Creation of ACCDE file Copyright 2008 Pearson Prentice Hall. All rights reserved. 4
5 Password Protection Prevents unauthorized use of a file Need to follow certain guidelines Include combination of letters and numbers Six or eight characters long Combine uppercase, lowercase and symbols Last name and age Bad Smith18 Good crid8st! Combination of uppercase, lowercase, numbers, letters and symbols Copyright 2008 Pearson Prentice Hall. All rights reserved. 5
6 Assigning a Password in Access Prompt to Open database in Exclusive mode Open database for Exclusive Use Click to add password Access open dialog box Click arrow next to Open button Click Open Exclusive Use the Encrypt with Password command Database tools tab, database tools group Copyright 2008 Pearson Prentice Hall. All rights reserved. 6
7 Assigning a Password in Access Enter password Verify password Enter password in Password text box Reenter password in Verify text box If no match, you must re-verify Copyright 2008 Pearson Prentice Hall. All rights reserved. 7
8 Removing a Password Decrypt Password Enter Password Open in Exclusive mode Choose Decrypt database Database Tools group, Database Tools tab Enter the Password, click OK Copyright 2008 Pearson Prentice Hall. All rights reserved. 8
9 Digitally Sign and Publish a Database - Terminology Digital Signature Electronic Authentication Certification authority Commercial company that validates signatures Timestamp Encrypts date/time as part of the signature Copyright 2008 Pearson Prentice Hall. All rights reserved. 9
10 Creating a Digital Signature Package and Sign Click the Office button Click Publish Select Package and Sign Copyright 2008 Pearson Prentice Hall. All rights reserved. 10
11 Creating a Digital Signature Select a certificate Click OK Can also view existing certificate Database is packaged as ACCDE file Copyright 2008 Pearson Prentice Hall. All rights reserved. 11
12 ACCDE Files Previous Versions = MDE files Office 2007 = ACCDE files When saved as an ACCDE file Visual Basic code is removed Certain permissions are denied Use of database objects is prohibited Code and objects can be used They can not be modified Copyright 2008 Pearson Prentice Hall. All rights reserved. 12
13 ACCDE file An.accde file is the Office Access 2007 version of the.mde file in earlier versions of Access. It is a locked-down version of the original.accdb file. If the.accdb file contained any VBA code, only the compiled code is included in the.accde file - as a result, the VBA code cannot be viewed or modified by the user. The ACCDE file allows users to perform normal database operations, but prohibits creation of database objects and alterations to the designs of forms and reports. Copyright 2008 Pearson Prentice Hall. All rights reserved. 13
14 Benefits of an ACCDE File An ACCDE file has the following benefits: Reduces the size of the database. Optimizes memory usage and improves performance. Protects the VBA code from being viewed or edited while still allowing it to run. Allows users to update data and run reports without providing the entire database. Forms and Reports in an ACCDE File An ACCDE file does not allow you to: View, modify, or create forms, reports, or modules in Design view. Add, delete, or change references to databases or object libraries. Change code there is no source code. Import or export forms, reports, or code modules ACCDE File Requirements Before converting a database to an ACCDE file, you must password protect the database and save all references to other Access databases. Copyright 2008 Pearson Prentice Hall. All rights reserved. 14
15 Creating an ACCDE File Save As dialog box Make ACCDE file ACCDE extension Package and Sign a file OR Click Make ACCDE file Database Tools tab, database tools group Click Save Uses the same filename unless specified Copyright 2008 Pearson Prentice Hall. All rights reserved. 15
16 Caution: ACCDE Files Before converting to ACCDE format Make a back-up copy Conversion cannot be undone! Changes may need to be made later ACCDE file can t be modified Modify the backup and re-convert You must open in exclusive mode Copyright 2008 Pearson Prentice Hall. All rights reserved. 16
17 Database Analysis Tools Access provides three tools Database Documenter Performance Analyzer Table Analyzer Copyright 2008 Pearson Prentice Hall. All rights reserved. 17
18 The Database Documenter Database Documenter Creates documentation on all objects Create a data dictionary Itemizes and lists object attributes Click Database Documenter Database Tools tab, Analyze Group Copyright 2008 Pearson Prentice Hall. All rights reserved. 18
19 Using the Database Documenter Database Documenter dialog box Documenter Report Select objects to include in report Generate the report by clicking OK Copyright 2008 Pearson Prentice Hall. All rights reserved. 19
20 The Performance Analyzer Performance Analyzer Identifies design flaws Analyzes one or more objects Recommends optimizations Launched by clicking Analyze Performance Database Tools tab, Analyze Group Copyright 2008 Pearson Prentice Hall. All rights reserved. 20
21 Using the Performance Analyzer Select objects to analyze Results Select the objects to analyze View results in the Results Analysis pane Given three potential solution for problems Recommendations click icon to make changes Suggestion click the icon to make changes Idea You must implement manually Copyright 2008 Pearson Prentice Hall. All rights reserved. 21
22 Table Analyzer Examines how tables are structured Aids in normalization eliminating redundant data Three different levels of normalization 1NF (First Normal Form) Repeating groups eliminated 2NF Removes partial dependences 3NF Removes transitive dependencies Copyright 2008 Pearson Prentice Hall. All rights reserved. 22
23 Using the Table Analyzer Analyze Table Identify table to analyze Click Analyze Table Database Tools tab, Analyze Group Analyzer Wizard launches Identify table for analysis Make desired choices in Wizard Click Finish Copyright 2008 Pearson Prentice Hall. All rights reserved. 23
24 Splitting a Database One database Back-end Split Back-end Copy of original database only tables Front-end Copy of original database excluding tables Contains only tables Front-end Contains forms, queries, report no tables Copyright 2008 Pearson Prentice Hall. All rights reserved. 24
25 Database Splitter Database Splitter Creates front-end and back-end simultaneously Prompts to back up the database Prompts you to name both ends Copyright 2008 Pearson Prentice Hall. All rights reserved. 25
26 Understand Normalization Progression from one normal form to the next 1NF Promotes atomic fields Fields that contain only one value 2NF removes partial dependencies Depends on part of a composite key 3NF removes transitive dependencies Relationship problems between tables Copyright 2008 Pearson Prentice Hall. All rights reserved. 26
27 Switchboards Switchboard Allow non-access users to use Database Provide an attractive graphical interface Provides an intuitive environment Copyright 2008 Pearson Prentice Hall. All rights reserved. 27
28 Create a Switchboard Click Edit Use the Switchboard Manager Database Tools tab, Database Tools group Click Yes to create new switchboard Click Edit in Switchboard Manager Copyright 2008 Pearson Prentice Hall. All rights reserved. 28
29 Completing the Switchboard Manager Type text to appear in menu Choose how to how to open object Click Form arrow Select object to run Repeat process for additional items Copyright 2008 Pearson Prentice Hall. All rights reserved. 29
Exploring Microsoft Office Access 2007
Exploring Microsoft Office Access 2007 Chapter 1: Finding Your Way Through a Database Robert Grauer, Keith Mulbery, Maurie Wigman Lockley Committed to Shaping the Next Generation of IT Experts. Copyright
More informationIntroduction to Computer Applications. CISY 1225 Chapter 10. Zahoor Khan, PhD
Introduction to Computer Applications CISY 1225 Chapter 10 Zahoor Khan, PhD Last updated: May 2014 No new topics I will not be here Next Week Mashtura will help you Class time is for practice Do your own
More informationDigital Certificate Service (DCS) - User Guide
Digital Certificate Service (DCS) - User Guide Information Security Branch Contents Using this Guide... 3 User Requirements... 3 Secure E-mail Messaging... 4 Send a Secure E-mail Message... 4 Receive a
More informationAdministering a Database System
Microsoft Access 2010 10 Administering a Database System Objectives You will have mastered the material in this project when you can: Create custom Quick Start fields Create indexes Create a Web database
More informationAccess made easy. The Access Object.
Access made easy. The Access Object 01 www.accessallinone.com This guide was prepared for AccessAllInOne.com by: Robert Austin This is one of a series of guides pertaining to the use of Microsoft Access.
More informationUSER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)
YATANARPON TELEPORT COMPANY LTD., YATANARPON CERTIFICATION AUTHORITY USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) Yatanarpon Teleport Company Ltd., Hlaing Universities Campus, Hlaing Township,
More informationMICRSOFT OFFICE PACKAGE COURSE OUTLINES
MICRSOFT OFFICE PACKAGE COURSE OUTLINES Document Created by: Sivashankar Santhanam Training Course Outline- 3 Levels for Access 2013 Beginner Level -Access: In this course, students will learn how to use
More informationKYOCERA Net Viewer User Guide Supplement
KYOCERA Net Viewer User Guide Supplement Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be
More informationHow to Import a Certificate When Using Microsoft Windows OS
How to Import a Certificate When Using Microsoft Windows OS This document explains the process of importing your digital certificate for use in Microsoft Internet Explorer (IE) and/or Mozilla Firefox.
More informationQuickBooks Windows Web Connect to Direct Connect
QuickBooks for Windows Conversion Instructions QuickBooks Windows 2010-2013 Web Connect to Direct Connect Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 DOCUMENTATION & PROCEDURES... 3 Task
More informationWorkshop on Windows Server 2012
Workshop on Windows Server 2012 Topics covered on Workshop DHCP Scope Splitting. A Dynamic Host Configuration Protocol (DHCP) split-scope configuration using multiple DHCP servers allows for increased
More informationACCESS 2007 ADVANCED
ACCESS 2007 ADVANCED WWP Learning and Development Ltd Page i Contents CONCEPTS OF NORMALISATION...1 INTRODUCTION...1 FIRST NORMAL FORM...1 SECOND NORMAL FORM...1 THIRD NORMAL FORM...1 FOURTH NORMAL FORM...2
More informationCreating and Reading SecurDisc Discs. SecurDisc - the technology 2
T U Creating and Reading SecurDisc Discs T O R I A L SecurDisc - the technology 2 Requirements 2 Creating SecurDisc discs: Nero Express 2 Reading SecurDisc discs: InCD or InCD Reader 3 Reading copy-protected
More informationMCSA Guide to Networking with Windows Server 2016, Exam
MCSA Guide to Networking with Windows Server 2016, Exam 70-741 First Edition Chapter 7 Implementing Network Policy Server 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in
More informationQuickBooks Windows Web Connect
QuickBooks for Windows Conversion Instructions QuickBooks Windows 2010-2013 Web Connect Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 DOCUMENTATION AND PROCEDURES... 3 Task 1: Conversion Preparation...
More informationExploring Microsoft Office PowerPoint 2007
Exploring Microsoft Office PowerPoint 2007 Chapter 1: Presentations Made Easy Robert Grauer, Keith Mulbery, Cynthia Krebs Objectives Identify PowerPoint user interface elements Use PowerPoint views Open
More informationSwitchboard. Creating and Running a Navigation Form
Switchboard A Switchboard is a type of form that displays a menu of items that a user can click on to launch data entry forms, reports, queries and other actions in the database. A switchboard is typically
More informationGetting Started With HMH Hosting Services
Getting Started With HMH Hosting Services For use with HMH Hosting Services, HMH Teacher Central, HMH Student Central and Student Achievement Manager version 2.6 or later Table of Contents HMH Hosting
More informationLegal Notes. Regarding Trademarks KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationM i c r o s o f t. Office Introductory Concepts and Techniques. Access Project 1. Creating and Using a Database
M i c r o s o f t Office 2003 Introductory Concepts and Techniques Access Project 1 Creating and Using a Database Objectives Describe databases and database management systems Start Access Describe the
More informationCreating a Crosstab Query in Design View
Procedures LESSON 31: CREATING CROSSTAB QUERIES Using the Crosstab Query Wizard box, click Crosstab Query Wizard. 5. In the next Crosstab Query the table or query on which you want to base the query. 7.
More informationKYOCERA Net Viewer 5.3 User Guide
KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationKYOCERA Net Viewer User Guide
KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationOnce a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
More informationConfiguration of Microsoft SQL Server Express
Configuration of Microsoft SQL Server Express Copyright 2017 NetSupport Ltd All rights reserved Configuration of Microsoft SQL Server Express and NetSupport DNA Installation Requirements If installing
More information9.4 Authentication Server
9 Useful Utilities 9.4 Authentication Server The Authentication Server is a password and account management system for multiple GV-VMS. Through the Authentication Server, the administrator can create the
More informationAcknowledgments Introduction. Part I: Programming Access Applications 1. Chapter 1: Overview of Programming for Access 3
74029ftoc.qxd:WroxPro 9/27/07 1:40 PM Page xiii Acknowledgments Introduction x xxv Part I: Programming Access Applications 1 Chapter 1: Overview of Programming for Access 3 Writing Code for Access 3 The
More informationIntroduction to Mail Merge. Use IT+
Introduction to Use IT+ Introduction is a useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored in a list, database, or spreadsheet. When
More informationACCESS 2007 ADVANCED
ACCESS 2007 ADVANCED Welcome! Thank you for choosing WWP as your learning and development provider. We hope that your programme today will be a stimulating, informative and rewarding experience. Our highly
More informationMail Merge. To Use Mail Merge: Selecting Step by Step Mail Merge Wizard. Step 1:
Mail Merge When you are performing a Mail Merge, you will need a Word document (you can start with an existing one or create a new one), and a recipient list, which is typically an Excel workbook. Watch
More informationSC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved
SC-3 USB Token QUICK Reference Copyright 2007 CRYPTOCard Corporation All Rights Reserved 091807 http://www.cryptocard.com Table of Contents OVERVIEW... 1 OPERATING MODES & OPTIONS... 2 USING THE SC-3 USB
More informationCopyright PCVITA Software. All Rights Reserved
This guide is provided to help the administrators or users to starts implement the job of Google Apps Migration for Microsoft Outlook without any hassles. PCVITA Software provides 24/7 online technical
More informationTOP Server Version 6 Security Settings
TOP Server 1 (10) TOP Server Version 6 TOP Server 2 (10) Contents Security Built In... 3 User Manager Configuration... 3 New User Accounts... 5 New User Group and Properties... 5 Configuration Security...
More informationContents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies...
Cloud Services Identity Management Administration Guide Version 17 July 2017 Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 About the User Administration Table...
More informationCalendar & Buttons Dashboard Menu Features My Profile My Favorites Watch List Adding a New Request...
remitview User Guide 1 TABLE OF CONTENTS INTRODUCTION... 3 Calendar & Buttons... 3 GETTING STARTED.... 5 Dashboard.... 7 Menu Features... 8 PROFILE.... 10 My Profile... 10 My Favorites... 12 Watch List...
More informationManaging NCS User Accounts
7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and
More informationProprietary Rights 2014 Qarbon.com, Inc. All rights reserved
User Manual Proprietary Rights 2014 Qarbon.com, Inc. All rights reserved The information contained in this manual is subject to change at any time and without prior notice. No part of this manual may be
More informationGuide Installation and User Guide - Mac
Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign
More informationCity National E Deposit SM User Guide
City National E Deposit SM User Guide July 2016 Copyright 2016 by City National Bank Member FDIC All rights reserved. No part of this User Guide may be reproduced or transmitted in any form or by any means,
More informationebackup 11.0 and 12.0 for Easy Dental
ebackup 11.0 and 12.0 for Easy Dental BACKUP RECOMMENDATIONS PRACTICE SOLUTIONS www.easydental.com/eservices 1-800-734-5561 ii Contents PUBLICATION DATE March 2012 COPYRIGHT 2012 Henry Schein, Inc. All
More informationStorage Security Software (Version )
For Toshiba CANVIO series Storage Security Software (Version 1.00.6904) User s Manual Version 1.00 This document explains the installation process and basic usage of the Storage Security Software designed
More informationHow to Configure Office 365 for Inbound and Outbound Mail
How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting
More informationMyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide
MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide REVISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 06 October 2017 Second Submittal. - 17 October
More informationPut Final Touches on an Application
Put Final Touches on an Application Callahan Chapter 11 Preparing Your Application for Distribution Controlling How Your Application Starts Forms-based bound forms for data presentation dialog boxes Switchboard
More informationManaging Users and Configuring Role-Based Access Control
Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).
More informationMicrosoft Outlook (A guide to help you better understand and utilize MS Outlook)
Microsoft Outlook (A guide to help you better understand and utilize MS Outlook) Ramapo College of New Jersey Center for Computing Information Systems (CCIS) Administrative Help-Desk ext. 7000 adm_help@ramapo.edu
More informationRev X 341. Table 111. Access Levels and Descriptions
9424200994 Rev X 341 Multiple levels of security give personnel the level of access appropriate for the tasks they routinely perform while securing critical settings from unauthorized access. Access Levels
More informationSophos Anti-Virus for NetApp Storage Systems
Sophos Anti-Virus for NetApp Storage Systems user guide Product Version: 3.0 Contents About this guide... 1 About Sophos Anti-Virus for NetApp Storage Systems...2 System requirements... 4 Before you install
More informationModern Systems Analysis and Design
Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Designing Databases Learning Objectives Concisely define each of the following key database design terms:
More informationSet Up with Microsoft Outlook 2013 using POP3
Page 1 of 14 Help Center Set Up E-mail with Microsoft Outlook 2013 using POP3 Learn how to configure Microsoft Outlook 2013 for use with your 1&1 e-mail account using the POP3 Protocol. Before you begin,
More informationBROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017
BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...
More informationBusiness Insights Dashboard
Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks
More informationMicrosoft. Access Microsoft Office Specialist 2010 Series EXAM COURSEWARE Achieve more. For Evaluation Only
Microsoft Access 2010 Microsoft Office Specialist 2010 Series COURSEWARE 3245 1 EXAM 77 885 Achieve more Microsoft Office Specialist 2010 Series Microsoft Access 2010 Core Certification Lesson 1: Exploring
More informationCreating User-Friendly Databases
Creating User-Friendly Databases Chapter 8 Databases are often created by a small number of people then used by a larger number of others. Often these people do not know how to use all the features of
More informationWord Tutorial 10. Managing Long Documents COMPREHENSIVE
Word Tutorial 10 Managing Long Documents COMPREHENSIVE Objectives Create a master document Create, split, merge, and remove subdocuments Control text flow and page breaks Add automatic heading numbers
More informationAccess ACS. Administrator s User Guide
Access ACS Administrator s User Guide Copyright Copyright 2009 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means, including
More informationCisco SME Key Management
CHAPTER 6 This chapter contains information about Cisco Storage Media Encryption comprehensive key management. It includes the following topics: Key Hierarchy, page 6-1 Cisco Key Management Center, page
More informationKey File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171
Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY
More informationMicrosoft Access 2010
Microsoft Access 2010 Microsoft Access is database software that provides templates to help you add databases that make it easier to track, report, and share data with others. Although very powerful, the
More informationBackup and Restore. About Backup and Restore
About, page 1 Back Up DNA Center, page 2 Restore DNA Center, page 4 Schedule a Backup, page 5 About The backup and restore procedures for DNA Center can be used for the following purposes: To create backup
More informationConfiguring Administrative Operations
Configuring Administrative Operations This section includes the following topics: Administrative Operation Conventions, page 1 Configuring Backup Operations, page 1 Restoring a Backup Configuration, page
More informationExploring Microsoft Office Excel 2007
Exploring Microsoft Office Excel 2007 Chapter 5 Data to Information Robert Grauer, Keith Mulbery, Judy Scheeren Committed to Shaping the Next Generation of IT Experts. Copyright 2008 Pearson Prentice Hall.
More informationDoc. Version 1.0 Updated:
OneStop Reporting Report Composer 3.5 User Guide Doc. Version 1.0 Updated: 2012-01-02 Table of Contents Introduction... 2 Who should read this manual... 2 What s included in this manual... 2 Symbols and
More informationInstallation Guide. Last Revision: Oct 03, Page 1-
Installation Guide Last Revision: Oct 03, 2005 -Page 1- Contents Before You Begin... 2 Installation Overview... 2 Installation for Microsoft Windows 2000, Windows 2003, and Windows XP Professional... 3
More informationQuickBooks for Mac Conversion Instructions
QuickBooks for Mac Conversion Instructions Web Connect to Direct Connect Introduction As Southbridge Savings Bank completes its system conversion to Cornerstone Bank, you will need to modify your QuickBooks
More informationWord Processing Microsoft Word 2010
Word Processing Microsoft Word 2010 Prepared by: Teo Siew Copyright 2017 MAHSA UNIVERSITY Faculty of Business, Finance, and Hospitality Objectives Understand how word processors work Customize Microsoft
More informationQuickBooks Conversion Instructions
QuickBooks Conversion Instructions QuickBooks for Windows QuickBooks for Mac QuickBooks Online QuickBooks Windows Conversion Instructions Web Connect to Direct Connect Introduction Needham Bank is pleased
More informationSage DacEasy. Getting Started Guide
Sage DacEasy Getting Started Guide Sage DacEasy Getting Started Copyright Trademarks Information in this document is subject to change without notice. Company names and data used in examples herein are
More informationRelease Notes. CaseWare Working Papers
Release Notes CaseWare Working Papers 2017.00.225 October 2017 Index 1. Executive summary CaseWare Working Papers 2017... 3 2. Features... 3 2.1. CaseWare Cloud... 3 2.2. Engagement Management... 3 2.3.
More informationHitachi High Technologies America, Inc. Password Policy
Hitachi High Technologies America, Inc. Password Policy Revision Date: 4/17/2015 Table of Contents Table of Contents...2 Overview...3 Scope. 3 Guidelines...3 A. General Password Construction Guidelines...3
More informationExploring Microsoft Office Word 2007
Exploring Microsoft Office Word 2007 Chapter 3: Enhancing a Document Robert Grauer, Keith Mulbery, Michelle Hulett Objectives Insert a table Format a table Sort and apply formulas to table data Convert
More informationQuickBooks for Windows Conversion Instructions
QuickBooks for Windows Conversion Instructions QuickBooks Windows 2011-2014 Web Connect to Direct Connect Table of Contents TABLE OF CONTENTS... 1 INTRODUCTION... 2 DOCUMENTATION & PROCEDURES... 2 Task
More informationPKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 03.02.2017
More informationTitan FTP Server SSH Host Key Authentication with SFTP
2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River
More informationModeChanger
35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive
More informationEndpoint Security Client
Endpoint Security Client R80 User Guide 28 February 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed
More informationUpdating Astea Mobile URLs
Updating Astea Mobile URLs Table of Contents UPDATING THE ASTEA APPLICATION SERVER URL... 4 RESETTING YOUR PASSWORD UPON INITIAL LOGIN... 7 CHANGING YOUR PASSWORD... 10 ACCESSING THE UPDATED TRAINING MATERIALS...
More informationStep by Step - Digital IDs in Adobe Acrobat & Reader versions XI and DC
Step by Step - Digital IDs in Adobe Acrobat & Reader versions XI and DC Create a self-signed digital ID 1. In the upper left click Edit, choose Preferences, then Signatures on the left, under Categories.
More informationDocument Signing Certificate Getting Started Guide
Certificate Services Document Signing Certificate Getting Started Guide Using the SafeNet Authentication Client: 8.3 Document issue: 1.0 Date of issue: March 2017 For software release 12.1 Document Signing
More informationNew World ERP-eSuite
New World ERP-eSuite 2018.1 INSTALLATION GUIDE April 9, 2018 Review important information for installing this release: SSL is required for esuite Services and Website servers. 2018 Tyler Technologies.
More informationCornerstone MFT Server UNC Path Based Data Storage Guidelines
2019 Cornerstone MFT Server UNC Path Based Data Storage Guidelines Instructions for configuring Cornerstone MFT to use UNC based storage locations on a SAN or network. QuickStart Guide 2019 South River
More informationMyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide
MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide i VISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 Second Submittal. ii TABLE OF CONTENTS
More informationUsing Attix5 Pro with EFS
Using Attix5 Pro with EFS Windows has a built-in Encrypting File System (EFS), which is a component of NTFS. It allows users to encrypt files on disk, so that only they, and users who they provide keys
More informationEnter your Appserv username and password to sign in to the Website
Appserv Desktop Access Logging on from a Windows 10 Device Step 1. To sign in to the Appserv Desktop Access website, either enter the following address into the Microsoft Edge browser address bar, or click
More informationAccess Macros & Advanced Topics
Access Macros & Advanced Topics Technical Support Services Office of Information Technology, West Virginia University OIT Help Desk 293-4444 x 1 http://oit.wvu.edu/support/training/classmat/db/ Instructor:
More informationT-SYSTEMS MULTIMEDIA SOLUTIONS ADMINISTRATION MANUAL
T-SYSTEMS MULTIMEDIA SOLUTIONS ADMINISTRATION MANUAL DOCULIFE DESKTOP 5.6 DATE: 16.03.2015 Document Future AG 03/2015 Document Future AG holds the copyright to this documentation. No part of this documentation
More informationNero Recode Manual. Nero AG
Nero Recode Manual Nero AG Copyright and Trademark Information The Nero Recode manual and all its contents are protected by copyright and are the property of Nero AG. All rights reserved. This manual contains
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationHearing Care Dashboard
Hearing Care Dashboard Registration & Management Hearing Care Dashboard: Register and Manage Your Organization Hearing Care Anywhere is Starkey s remote programming system. The Hearing Care Dashboard is
More informationIntroduction. Mail Merge. Word 2010 Using Mail Merge. Video: Using Mail Merge in Word To Use Mail Merge: Page 1
Word 2010 Using Mail Merge Introduction Page 1 Mail merge is a useful tool that will allow you to easily produce multiple letters, labels, envelopes, name tags and more using information stored in a list,
More informationManual. Software Protection. TwinCAT 3. Version: Date:
Manual Software Protection TwinCAT 3 Version: Date: 1.7 2018-10-25 Table of contents Table of contents 1 Foreword... 5 1.1 Notes on the documentation... 5 1.2 Safety instructions... 6 2 Introduction...
More informationDesktop & Laptop Edition
Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion
More informationConfiguring External Links in Visual Discovery AE
Copyright 2014 WebFOCUS Release 8.0 Version 08 July 2014 Technical Memo Information Builders Two Penn Plaza New York, NY 10121-2898 (212) 736-4433 TM4742 Configuring External Links in Visual Discovery
More informationWord Module 2: Editing Documents
1. When you move text to a new location using drag and drop, that text is added to the Clipboard. False 2. When you use the Save command to save changes to a file, you overwrite the stored file. True LEARNING
More informationImagine. Create. Discover. User Manual. TopLine Results Corporation
Imagine. Create. Discover. User Manual TopLine Results Corporation 2008-2009 Created: Tuesday, March 17, 2009 Table of Contents 1 Welcome 1 Features 2 2 Installation 4 System Requirements 5 Obtaining Installation
More informationDevice Manager. Managing Devices CHAPTER
2 CHAPTER This chapter describes how to perform routine device management tasks using the Administrator Console. It provides information on managing the devices within your Cisco VXC Manager environment.
More informationOracle SQL. murach s. and PL/SQL TRAINING & REFERENCE. (Chapter 2)
TRAINING & REFERENCE murach s Oracle SQL and PL/SQL (Chapter 2) works with all versions through 11g Thanks for reviewing this chapter from Murach s Oracle SQL and PL/SQL. To see the expanded table of contents
More informationManaging the Cisco APIC-EM and Applications
Managing Cisco APIC-EM Using the GUI, page 1 Cisco APIC-EM Application Separation, page 1 Information about Backing Up and Restoring the Cisco APIC-EM, page 4 Updating the Cisco APIC-EM Software, page
More informationApptix Online Backup by Mozy User Guide
Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing
More information