Table of Contents

  1. Ensuring a Robust System
    1. Auditing
    2. Security
    3. Time Effects
  2. Data Integrity
    1. Domain Constraints
    2. Entity Integrity
    3. Column Constraints
    4. User-Defined Integrity Constraints
    5. Referential Integrity
    6. Cascade Events