There are two major strategies for returning a database with suspect pages to a consistent state while users are accessing it: reload and repair.
Both strategies require:
A clean database dump
A series of reliable transaction log dumps up to the point at which the database is recovered with suspect pages
A transaction log dump to a device immediately after the database is recovered to capture changes to the offline pages
Continuous transaction log dumps to devices while users work in the partially offline database