Contents
xvi
Sybase IQ
CHAPTER 13 Transport-Layer Security............................................................ 589
About transport-layer security ...................................................... 590
FIPS 140-2 certification......................................................... 590
About public-key cryptography.............................................. 591
Client architecture ................................................................. 592
Digital certificates .................................................................. 592
The role of digital certificates................................................. 593
Using chains of certificates.................................................... 594
Server authentication ............................................................ 595
Setting up transport-layer security ............................................... 595
Invoking transport-layer security .................................................. 596
Self-signed certificates .......................................................... 597
Certificate authorities ................................................................... 600
Certificate chains.......................................................................... 601
Enterprise root certificates ........................................................... 602
Creating the certificates......................................................... 603
Using the signed certificates ................................................. 604
Globally signed certificates .......................................................... 605
Getting server-authentication certificates..................................... 606
Using a global certificate as a server certificate .................... 607
Verifying certificate fields ............................................................. 608
Verifying fields in certificate chains ....................................... 608
Using a globally-signed certificate as an enterprise certificate 608
Using transport-layer security for web services ........................... 610
CHAPTER 14 Data Backup, Recovery, and Archiving..................................... 613
Backup protects your data ........................................................... 613
Backing up your database............................................................ 614
Types of data stores.............................................................. 614
Types of backups .................................................................. 615
Selecting archive devices...................................................... 619
Preparing for backup............................................................. 620
Concurrency and backups..................................................... 622
The BACKUP statement........................................................ 623
Backup examples.................................................................. 629
Recovery from errors during backup..................................... 630
After you complete a backup................................................. 631
Performing backups with non-Sybase products.................... 631
Virtual Backups ............................................................................ 632
Types of Virtual Backups....................................................... 632
Virtual Backup with SAN snapshot or shadow hardware ...... 634
Performing system-level backups ................................................ 634
Shutting down the database (non-multiplex)......................... 635
Shutting down the database (multiplex) ................................ 635