Unofficial Guide to Microsoft Office Access 2007
Microsoft Access 2007 may be a major new update, but to use it with confidence, you'll need to know its quirks and shortcuts. Find out what the manual doesn't always tell you in this insider's guide to using Access 2007 in the real world. What's the best way to use the new features? What are "intelligent" forms? From setting up tables to encrypting databases, first get the official way, then the best way from an expert.
- Unbiased coverage of how to get the most out of Access, from using the Quick Launch Toolbar and Office Button to building a database from scratch
- Savvy, real-world advice on everything from using form views, PivotTables, and PivotCharts to writing questions in the form of a query
- Time-saving techniques and practical guidance on creating smart macros, collaborating with others using SharePoint(r), and adding pizzazz to reports
- Tips and hacks that help you work around Access quirks, avoid pitfalls, and increase your productivity
- Sidebars and tables on sorting rules for special characters, predefined sizes for number data types, and more
Table of Contents
I Getting Started.
1 Getting In and Out.
2 All About Data.
II Data Design and the Database.
3 Designing a Database.
4 Working with Tables.
5 Entering and Editing Data.
6 Filtering and Sorting.
7 Importing and Exporting Data.
III Creating Queries.
8 Creating a Query.
9 Creating Calculation Queries.
10 Creating Action Queries.
11 Working with Crosstabs and PivotTables.
IV Using Forms.
12 Designing and Using Forms.
13 Using Controls on a Form.
14 Creating Intelligent Forms.
V Creating Reports.
15 Creating a Report.
16 Enhancing and Printing a Report.
17 Generating Charts and Graphs.
VI Working with Macros.
18 Creating a Macro.
19 Using Macro Actions.
VII Database Administration.
20 Managing and Maintaining a Database.
21 Securing a Database.
22 Working with SharePoint Sites.
VIII Programming with VBA.
23 Creating Modules.
24 Writing VBA Code.
25 Using Built-In Functions.
26 Using SQL in a Procedure.
Appendix A: Glossary.
Appendix B: Using Standard Naming Conventions.
Appendix C: Access Database Limitations.
Sign up now »
It’s time for midsize companies to start thinking differently about infrastructure. This white paper provides a brief overview of cloud computing, explains how midsize companies can benefit, and describes the ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes