LAN-based backup strategy, 295
Local Security Authentication Subsystem (LSASS), 74
Logging
circular, 85–86
file record checksumming, 83–84
functioning of, 79–81
physical, 82
Logical database corruption, 104–5
Logical Disk Manager (LDM), 137
Logical storage, 52–54
Log record checksum (LRCK), 83–84
Long-value B-Trees, 74
LooksAlive, 270–71
Lost client opportunity, 29–30
illustrating, 30
measure, 29
See also Downtime