|
SQL Server 2008 R2 : Implementing Data Integrity (part 2) - Defaults |
A default provides a value for a column when a value is not supplied. Defaults can be anything that evaluates to a constant, such as a constant, built-in function, or mathematical expression. Defaults are of two types: declarative and bound. The two types are functionally the same; the difference is in how they are implemented. |
|
|
|
|
|
|
|
|
SQL Server 2008 R2 : Defining Columns (part 2) - Column Properties |
Name and data type are the most basic properties of a column, but many other properties can be defined for a column. You do not have to specify these properties to be able to create the columns, but you can use them to further refine the type of data that can be stored within a column. |
|
|
|
|
|
|
SQL Server 2008 R2 : Database Backup and Restore (part 6) - Backup Scenarios |
Typically, several different types of backups are used in a comprehensive backup plan. These backups are often combined to produce maximum recoverability while balancing the load on the system and amount of time to recover the database. The following backup scenarios outline some of the ways SQL Server backups are used. |
|
|
|
SQL Server 2008 R2 : Database Backup and Restore (part 3) - Backup Devices |
A backup device is used to provide a storage destination for the database backups created with SQL Server. Backups can be written to logical or physical devices. A logical device is essentially an alias to the physical device and makes it easier to refer to the device when performing database backups. |
|
|
|
|
|
|
|
|
|
SQL Injection : Code-Level Defenses - Validating Input |
When performing input validation you should always ensure that the input is in its canonical (simplest) form before making any input validation decisions. This may involve decoding the input into a simpler format, or just rejecting input that isn't already in canonical format where non-canonical input isn't expected. |
|
SQL Injection : Code-Level Defenses - Using Parameterized Statements |
One of the root causes of SQL injection is the creation of SQL queries as strings that are then sent to the database for execution. This behavior, commonly known as dynamic string building or dynamic SQL, is one of the primary causes of an application being vulnerable to SQL injection. |
|
SQL Server 2005 : Extending User-Defined Aggregates |
Each of the other SQLCLR features, with the possible exception of triggers, will see more use in production applications than will aggregates, but aggregates and types are the only members of the group that can help developers do things that simply were not possible before. |
|