Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Access 2010 Programmer's Reference (Wrox Programmer to Programmer)


A comprehensive guide to programming for Access 2010 and 2007

Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements.

With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.

Access 2010 Programmer's Referenceis a comprehensive guide to the best-of-breed techniques for programming Access applications.

Coverage Includes:

  • Introduction to Microsoft Access 2010
  • New Features
  • Upgrading and Converting to Access 2010
  • Macros in Access 2010
  • Using the VBA Editor
  • VBA Basics
  • Using VBA in Access
  • Creating Classes in VBA
  • Extending VBA with APIs
  • Working with the Windows Registry
  • Using DAO to Access Data
  • Using ADO to Access Data
  • Using SQL with VBA
  • Using VBA to Enhance Forms
  • Enhancing Reports with VBA
  • Customizing the Ribbon
  • Customizing the Office Backstage
  • Working with Office 2010
  • Working with SharePoint
  • Working with .NET
  • Building Client-Server Applications with Access
  • The Access 2010 Templates
  • Access Runtime Deployment
  • Database Security
  • Access 2010 Security Features
(HTML tags aren't allowed.)

Windows(R) PowerShell Unleashed
Windows(R) PowerShell Unleashed
PowerShell is one of the most exciting new products to come out of Microsoft in a long time. It is both a new scripting language and a command-line shell. People who have seen the demos have been extremely impressed by the power it brings to admins to automate and customize their regular tasks. PowerShell will be used as the basis for all...
Microsoft Exchange Server 2003 Delta Guide
Microsoft Exchange Server 2003 Delta Guide
The Delta Guide to Exchange 2003 has been designed to become an invaluable resource to existing Exchange administrators, allowing you to quickly come up to speed on new features and functionality in Exchange, building on the knowledge and experience you already possess. The "Delta" series is designed to...
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise


  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...

Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Instant Spring for Android Starter
Instant Spring for Android Starter

Leverage Spring for Android to create RESTful and OAuth Android apps


  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  • Learn what Spring for Android adds to the Android developer toolkit.
  • Learn how to debug your Android...
PeopleSoft PeopleTools Tips & Techniques (Osborne ORACLE Press Series)
PeopleSoft PeopleTools Tips & Techniques (Osborne ORACLE Press Series)

Advanced PeopleSoft PeopleTools Development Strategies

Maximize the efficiency and productivity of your PeopleSoft applications from Oracle using the proven methods and best practices in this Oracle Press guide. PeopleSoft PeopleTools Tips & Techniques lays out the benefits of each tactic along with implementation...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy