O'Reilly logo

Defensive Database Programming with SQL Server by Alex Kuznetsov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Common Problems with Data Integrity

SQL Server provides built-in tools, in the form of constraints and triggers, which are designed to enforce data integrity rules in the database. Alternatively, we can choose to enforce data integrity in our applications. Which approach is best? To make an informed decision, we need to understand the advantages and potential difficulties involved in each approach, as well as the downstream ramifications of making the wrong choice.

In this chapter, we shall discuss benefits and common problems associated with each of the following approaches:

  • using our applications to enforce data integrity rules

  • using constraints to enforce data integrity rules

  • using triggers to enforce data integrity rules.

Triggers are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required