Read more
Klappentext SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Throughout the world! high-profile large organizations (aerospace and defense! automotive! banking! chemicals! financial service providers! healthcare! high tech! insurance! oil and gas! pharmaceuticals! retail! telecommunications! and utilities)and governments are using SAP software to process its most mission-critical! highly sensitive data. Despite this widespread use! there have been very few books written on SAP implementation and security! despite a great deal of interest. This book is designed for these network and systems administrator who deal with the complexity of having to make judgemental decisions regarding enormously complicated and technical data in the SAP landscape! as well as pay attention to new compliance rules and security regulations. Zusammenfassung Suitable for those network and systems administrators who deal with the complexity of having to make judgmental decisions regarding technical data in the SAP landscape! this book offers coverage of the essentials of SAP security: risk and control management! identity and access management! data protection and privacy! and corporate governance. Inhaltsverzeichnis SAP Security Introduction; Authorization Concept and Security Mechanics; Security Administration and Parameters; Security: Authorization Documentation and Tracing; Transaction Security; Table Security; Program Security; Profile Generator; Interfaces and Conversions; Systems Monitoring and Management; System Profiles; Job Scheduling; Programming; Database management and monitoring; Technical Infrastructure; Identity and Access Management; Data Protection; Platform/Operating System Security; Vulnerability Management; Secure Change Management; Disaster Recovery; Regulatory Compliance, Auditing, Governance & Risk Compliance
List of contents
SAP Security Introduction; Authorization Concept and Security Mechanics; Security Administration and Parameters; Security: Authorization Documentation and Tracing; Transaction Security; Table Security; Program Security; Profile Generator; Interfaces and Conversions; Systems Monitoring and Management; System Profiles; Job Scheduling; Programming; Database management and monitoring; Technical Infrastructure; Identity and Access Management; Data Protection; Platform/Operating System Security; Vulnerability Management; Secure Change Management; Disaster Recovery; Regulatory Compliance, Auditing, Governance & Risk Compliance