Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft Power BI Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
Microsoft Power BI Cookbook

Microsoft Power BI Cookbook

By : Powell
3.7 (25)
close
close
Microsoft Power BI Cookbook

Microsoft Power BI Cookbook

3.7 (25)
By: Powell

Overview of this book

Microsoft Power BI is a business intelligence and analytics platform consisting of applications and services designed to provide coherent, visual and interactive insights of data. This book will provide thorough, technical examples of using all primary Power BI tools and features as well as demonstrate high impact end-to-end solutions that leverage and integrate these technologies and services. Get familiar with Power BI development tools and services, go deep into the data connectivity and transformation, modeling, visualization and analytical capabilities of Power BI, and see Power BI’s functional programming languages of DAX and M come alive to deliver powerful solutions to address common, challenging scenarios in business intelligence. This book will excite and empower you to get more out of Power BI via detailed recipes, advanced design and development tips, and guidance on enhancing existing Power BI projects.
Table of Contents (14 chapters)
close
close

Introduction

Data security in which certain users or groups of users are prevented from viewing a portion of a dataset is often a top requirement in Power BI deployments. Security implementations can range in complexity from mapping user or security group accounts to simple security roles based on a single dimension value, to dynamic, user-based security with dedicated user permissions tables and dynamic DAX functions embedded in the dataset. Given the variety of use cases and the importance of this feature to securely share a dataset across stakeholders, it’s important to understand the process and techniques available for developing, testing, and operationalizing data security roles.

In addition to row level security (RLS) roles, dynamic user-based filter context techniques can also be used to simplify and personalize the user experience. For example, the filter conditions...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY