Introduction : What's going on?
Chapter 1 The ladder to accomplished
Chapter 2 Are you sure you want to?
Chapter 3 Automate Everything
Chapter 4 No place for Just in Case
Chapter 5 Data Cleaning
Chapter 6 Use Keys to Protect Data
Chapter 7 People Power
Chapter 8 Verification
Chapter 9 Ready Steady Go
Chapter 10 Migration is data processing
Chapter 11 Legacy Data Access
Chapter 12 Seeing The Light
Appendix : Technical Resources
About the Author
Bibliography
Acknowledgements