SAP Security and Authorizations /

This book gives technical consultants, IT managers, and authorization administrators an in-depth look at all aspects of IT security in the SAP NetWeaver environment. An introduction to the overall subject matter helps you get up to speed quickly on topics like risk evaluation, creating control optio...

Full description

Bibliographic Details
Main Authors: Linkies, Mario, author 653533, Off, Frank, author 653534
Format: text
Language:eng
Published: Bonn, Germany : Galileo Press, 2006
Subjects:
_version_ 1811129029830377472
author Linkies, Mario, author 653533
Off, Frank, author 653534
author_facet Linkies, Mario, author 653533
Off, Frank, author 653534
author_sort Linkies, Mario, author 653533
collection OCEAN
description This book gives technical consultants, IT managers, and authorization administrators an in-depth look at all aspects of IT security in the SAP NetWeaver environment. An introduction to the overall subject matter helps you get up to speed quickly on topics like risk evaluation, creating control options, designing security measures-and teaches you the appropriate procedures for implementing the supporting processes. You'll also benefit from an overview of international security standards and legal regulations (e.g., Sarbanes-Oxley Act and Basel ll), and you'll discover the best SAP security strategies and practices to ensure compliance. The seond part of the book is dedicated to the technical implementation of these security measures. From the authorization concept to measures concerning infrastructure in the portal environment and collaboration scenarios with SAP XI through to process planning, the authors leave no rock unturned. This book uses examples to describe the potential risks as well as specific application and system security concepts for individual SAP components and solutions.
first_indexed 2024-03-05T17:31:27Z
format text
id KOHA-OAI-TEST:610316
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-09-23T23:41:40Z
publishDate 2006
publisher Bonn, Germany : Galileo Press,
record_format dspace
spelling KOHA-OAI-TEST:6103162024-08-03T10:26:47ZSAP Security and Authorizations / Linkies, Mario, author 653533 Off, Frank, author 653534 textBonn, Germany : Galileo Press,2006©2006engThis book gives technical consultants, IT managers, and authorization administrators an in-depth look at all aspects of IT security in the SAP NetWeaver environment. An introduction to the overall subject matter helps you get up to speed quickly on topics like risk evaluation, creating control options, designing security measures-and teaches you the appropriate procedures for implementing the supporting processes. You'll also benefit from an overview of international security standards and legal regulations (e.g., Sarbanes-Oxley Act and Basel ll), and you'll discover the best SAP security strategies and practices to ensure compliance. The seond part of the book is dedicated to the technical implementation of these security measures. From the authorization concept to measures concerning infrastructure in the portal environment and collaboration scenarios with SAP XI through to process planning, the authors leave no rock unturned. This book uses examples to describe the potential risks as well as specific application and system security concepts for individual SAP components and solutions.This book gives technical consultants, IT managers, and authorization administrators an in-depth look at all aspects of IT security in the SAP NetWeaver environment. An introduction to the overall subject matter helps you get up to speed quickly on topics like risk evaluation, creating control options, designing security measures-and teaches you the appropriate procedures for implementing the supporting processes. You'll also benefit from an overview of international security standards and legal regulations (e.g., Sarbanes-Oxley Act and Basel ll), and you'll discover the best SAP security strategies and practices to ensure compliance. The seond part of the book is dedicated to the technical implementation of these security measures. From the authorization concept to measures concerning infrastructure in the portal environment and collaboration scenarios with SAP XI through to process planning, the authors leave no rock unturned. This book uses examples to describe the potential risks as well as specific application and system security concepts for individual SAP components and solutions.Nur Syuhada Farhany;Data protectionComputer securityURN:ISBN:9781592290628
spellingShingle Data protection
Computer security
Linkies, Mario, author 653533
Off, Frank, author 653534
SAP Security and Authorizations /
title SAP Security and Authorizations /
title_full SAP Security and Authorizations /
title_fullStr SAP Security and Authorizations /
title_full_unstemmed SAP Security and Authorizations /
title_short SAP Security and Authorizations /
title_sort sap security and authorizations
topic Data protection
Computer security
work_keys_str_mv AT linkiesmarioauthor653533 sapsecurityandauthorizations
AT offfrankauthor653534 sapsecurityandauthorizations