In this section of the book, we have looked at complete backup and restore solutions for full and differential types. We saw how the differential restore type used the full restore type as the base for the restore, and then restored up to the point that the differential backup was taken. In this chapter, we will go over how to complete the third part of the individual backup and restore plans, the transaction log.
We looked at transaction logs and how they work in Chapters 3 and 7, respectively. The obvious purpose of transaction logs is ...