May 2018
Intermediate to advanced
576 pages
30h 25m
English
Identify or create a user/role to be used solely for replication. Decide what form of authentication will be used. If you are going across data centers or the wider internet, take this very seriously.