| Contents at a Glance | 5 |
|---|
| Contents | 7 |
|---|
| About the Authors | 20 |
|---|
| Acknowledgments | 22 |
|---|
| Introduction | 23 |
|---|
| Who This Book Is For | 24 |
| Valuable Resources | 24 |
| How This Book Is Structured | 25 |
| Errata | 27 |
| Contacting the Authors | 27 |
| Overview of SQL Server | 28 |
|---|
| SQL Server 2008 Overview | 29 |
| The Vision of SQL Server 2008 | 29 |
| SQL Server 2008 Editions | 31 |
| A Word on Server Consolidation | 32 |
| Summary | 33 |
| SQL Server Installation and Configuration | 35 |
| SQL Server Requirements | 35 |
| Upgrading to SQL Server 2008 | 36 |
| Summary | 49 |
| Enterprise Data Platform | 50 |
|---|
| Policy Management | 51 |
| Needs Addressed by Policy Management | 51 |
| Policy Management Components | 52 |
| Sample Policies | 62 |
| Policy Management Administration | 66 |
| Summary | 69 |
| High Availability | 70 |
| High Availability Defined | 71 |
| Database Mirroring | 72 |
| Database Snapshots and Mirroring | 94 |
| Windows Clustering in SQL Server | 99 |
| SQL Server Replication | 99 |
| Reducing Planned Downtime | 102 |
| Summary | 103 |
| Performance | 104 |
| Managing and Monitoring Resources | 104 |
| Optimizing Storage | 117 |
| Improving Query Performance | 124 |
| Summary | 131 |
| Security | 132 |
| Disabled Database Engine Features | 132 |
| Principals and Securables | 137 |
| Permissions | 147 |
| Code Access Security | 151 |
| Auditing in SQL Server 2008 | 155 |
| Summary | 163 |
| SQL Server Encryption | 164 |
| Encryption Keys | 165 |
| Transparent Data Encryption | 179 |
| Extensible Key Management | 182 |
| Encryption Without Keys | 182 |
| Hashing and Signing Data | 183 |
| Security Catalog Views | 184 |
| Query Efficiency | 185 |
| Summary | 186 |
| Automation and Monitoring | 187 |
| SQL Server Agent | 188 |
| Maintenance Plans | 206 |
| SQLCMD | 214 |
| PowerShell for SQL Server | 217 |
| Database Mail | 224 |
| SQL Profiler | 230 |
| Extended Events | 236 |
| Summary | 241 |
| Service Broker | 243 |
| What Is Service Broker? | 244 |
| Creating Service Broker Applications | 247 |
| Service Broker Routing and Security | 258 |
| Message Priorities | 280 |
| Troubleshooting Service Broker Using SSBDiagnose | 283 |
| Summary | 284 |
| Integrated Full-Text Search | 285 |
| Creating Full-Text Catalogs and Indexes | 285 |
| Querying with iFTS | 295 |
| Managing Thesaurus Files | 300 |
| Using Stoplists | 303 |
| Searching Documents | 304 |
| Managing iFTS | 305 |
| Summary | 306 |
| Development in SQL Server | 307 |
|---|
| New Datatypes in SQL Server 2008 | 308 |
| Spatial Support in SQL Server 2008 | 308 |
| How Time Has Changed in SQL Server | 314 |
| A New Hierarchical Datatype | 320 |
| Filestream Support | 325 |
| Summary | 335 |
| T-SQL Enhancements for Developers | 336 |
| Notable DML Features | 336 |
| General Development | 371 |
| Summary | 387 |
| T-SQL Enhancements for DBAs | 388 |
| Locking Enhancements | 388 |
| Metadata Views | 389 |
| Notable SQL Server Performance Monitor Counters | 395 |
| DDL Triggers | 395 |
| Indexing and Performance Enhancements | 399 |
| <
|