CHAPTER 7
Expanding Data Protection with Check Constraints and Triggers
Safety is something that happens between your ears, not something you hold in your hands.
—Jeff Cooper, US Marine, Creator of the modern technique of firing a handgun
One of the weirdest things I see in database implementations is that people spend tremendous amounts of time designing the correct database storage (or, at least, what seems like tremendous amounts of time to them) and then just leave the data unprotected with tables being more or less treated like buckets that will accept anything, opting to let code outside of the database layer to do all of the data protection. ...
Get Pro SQL Server Relational Database Design and Implementation, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.