THE KEY TOPICS IN THIS CHAPTER ARE
Applying security standards and sound techniques to your HA environment (with well thought out roles and permissions schemes)
Creating schema-bound views to protect tables from being changed or dropped accidentally (to minimize these types of inadvertent failures)
Security considerations for each major HA option (MSCS, SQL clustering, log shipping, and data replication)
3.145.172.56