Chapter 1

Protecting Against Hardware Failure and External Threats

IN THIS CHAPTER

Bullet Dealing with trouble in paradise

Bullet Maintaining database integrity

Bullet Enhancing performance and reliability with RAID

Bullet Averting disaster with backups

Bullet Defending against Internet threats

Bullet Piling on layers of protection

Database applications are complex pieces of software that interact with databases, which in turn are complex collections of data that run on computer systems, which in their own right are complex assemblages of hardware components. The more complex something is, the more likely it is to have unanticipated failures. That being the case, a database application is an accident waiting to happen. With complexity piled upon complexity, not only is something sure to go wrong, but also, when it does, you’ll have a hard time telling where the problem lies.

Fortunately, you can do some things to protect ...

Get SQL All-in-One For Dummies, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.