Chapter 11. High Availability and Security

THE KEY TOPICS IN THIS CHAPTER ARE

  • Applying security standards and sound techniques to your HA environment (with well thought out roles and permissions schemes)

  • Creating schema-bound views to protect tables from being changed or dropped accidentally (to minimize these types of inadvertent failures)

  • Security considerations for each major HA option (MSCS, SQL clustering, log shipping, and data replication)

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.172.56