Chapter 1: Choosing Which Application Data to Store in Your Application
Chapter 2: Basic Database Security Principles
Chapter 3: Disaster Recovery Techniques to Protect Your Database
Chapter 4: Transferring Your Database to Other Systems