Angebote zu "Security" (70 Treffer)

SAP Security
6,99 € *
ggf. zzgl. Versand

Das Buch richtet sich an SAP-Basisadministratoren (SAP NetWeaver Application Server ABAP), die ihre SAP-Landschaft absichern möchten. Der Fokus liegt dabei auf ABAP-Stacks, wobei aber auch Java-Stacks (oder AS Java) teilweise behandelt werden. Der Leser erfährt, wie ein SAP-System sicher konfiguriert wird, Grundlagen der Kommunikationssicherheit, Secure Code und Patch-Management erfolgreich umgesetzt werden und wie man SAP-Systeme effektiv überwachen kann. Des Weiteren vermittelt das Buch grundlegende Security-Kenntnisse bezüglich Rollen- und Berechtigungsmanagement sowie die dazugehörige Infrastruktur (Netzwerke / Betriebssysteme / Datenbanken / Frontends). Es wird aufgezeigt, wie Sicherheitslücken geschlossen und SAP-Systeme gehärtet werden können. Der Leser kann Angriffspunkte für Hacker identifizieren und absichern. Cyber-Angriffe können so durch Prävention von technischen Maßnahmen und Systemüberwachung verhindert werden.

Anbieter: Bol.de
Stand: 07.05.2017
Zum Angebot
SAP Security
6,99 € *
ggf. zzgl. Versand

Das Buch richtet sich an SAP-Basisadministratoren (SAP NetWeaver Application Server ABAP), die ihre SAP-Landschaft absichern möchten. Der Fokus liegt dabei auf ABAP-Stacks, wobei aber auch Java-Stacks (oder AS Java) teilweise behandelt werden. Der Leser erfährt, wie ein SAP-System sicher konfiguriert wird, Grundlagen der Kommunikationssicherheit, Secure Code und Patch-Management erfolgreich umgesetzt werden und wie man SAP-Systeme effektiv überwachen kann. Des Weiteren vermittelt das Buch grundlegende Security-Kenntnisse bezüglich Rollen- und Berechtigungsmanagement sowie die dazugehörige Infrastruktur (Netzwerke / Betriebssysteme / Datenbanken / Frontends). Es wird aufgezeigt, wie Sicherheitslücken geschlossen und SAP-Systeme gehärtet werden können. Der Leser kann Angriffspunkte für Hacker identifizieren und absichern. Cyber-Angriffe können so durch Prävention von technischen Maßnahmen und Systemüberwachung verhindert werden.

Anbieter: buch.de
Stand: 01.04.2017
Zum Angebot
SAP HANA Security Guide
63,99 € *
ggf. zzgl. Versand

How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Protect your SAP HANA system! Privileges and Roles Master the SAP HANA privilege types-system, object, package, analytic, and application-and learn to create and assign database and repository roles using SAP HANA Studio and SQLScript. Authentication and Encryption Learn to use Kerberos, SAML, and native authentication with step-by-step instructions and secure internal and external communication using encryption and SSL certificates. Monitoring Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges. Highlights: SAP HANA Studio Privileges Roles Database objects User accounts Authentication Lifecycle management Auditing Security tracing Certificate management Encryption Galileo Press heißt jetzt Rheinwerk Verlag.

Anbieter: buecher.de
Stand: 29.05.2017
Zum Angebot
SAP BusinessObjects BI Security
79,95 € *
ggf. zzgl. Versand

Don´t talk to strangers´´if only data security policies were this easy. Learn to keep your SAP BusinessObjects Business Intelligence data truly safe from unauthorized actions with this comprehensive guide. Begin with security basics and work your way to advanced concepts; along the way, youll explore functional and data security, define a rights model, and secure data sources and universes. Step-by-step instructions ensure that you can implement important security techniques in your administration and design work. This book puts the master key to data security in your hands. 1. Best Practices Unveiled Implement a security system that is easy to understand, use, and enhance by using basic workflows. 2. Rights Framework Put the rights framework to work for you using group and folder inheritance and custom access levels. 3. Specific Rights Explore the specific rights of system and content objects stored in the CMS repository, as well as BI 4.0 suite applications. 4. Universe Security Compare security features of universes created with Universe Design Tool side by side with its successor, Information Design Tool. 5. SAP NetWeaver BW, LDAP, and Active Directory Learn how to secure your SAP BusinessObjects BI 4.0 system using external authentication systems and data sources. Highlights Include: * SAP NetWeaver BW, LDAP, and Active Directory authentication * Single sign-on * Rights framework and inheritance model * Access levels * General and specific rights * Secured connections * Universe security * Access restriction * Data and business security profile * Scheduling, publications, and personalization profile

Anbieter: buch.de
Stand: 07.05.2017
Zum Angebot
SAP BusinessObjects BI Security
79,95 € *
ggf. zzgl. Versand

Don´t talk to strangers´´if only data security policies were this easy. Learn to keep your SAP BusinessObjects Business Intelligence data truly safe from unauthorized actions with this comprehensive guide. Begin with security basics and work your way to advanced concepts; along the way, youll explore functional and data security, define a rights model, and secure data sources and universes. Step-by-step instructions ensure that you can implement important security techniques in your administration and design work. This book puts the master key to data security in your hands. 1. Best Practices Unveiled Implement a security system that is easy to understand, use, and enhance by using basic workflows. 2. Rights Framework Put the rights framework to work for you using group and folder inheritance and custom access levels. 3. Specific Rights Explore the specific rights of system and content objects stored in the CMS repository, as well as BI 4.0 suite applications. 4. Universe Security Compare security features of universes created with Universe Design Tool side by side with its successor, Information Design Tool. 5. SAP NetWeaver BW, LDAP, and Active Directory Learn how to secure your SAP BusinessObjects BI 4.0 system using external authentication systems and data sources. Highlights Include: * SAP NetWeaver BW, LDAP, and Active Directory authentication * Single sign-on * Rights framework and inheritance model * Access levels * General and specific rights * Secured connections * Universe security * Access restriction * Data and business security profile * Scheduling, publications, and personalization profile

Anbieter: Bol.de
Stand: 23.02.2017
Zum Angebot
SAP Security als eBook Download von Christoph S...
6,99 € *
ggf. zzgl. Versand
(6,99 € / in stock)

SAP Security:Mehr Sicherheit und Schutz durch Härtung der SAP-Systeme Christoph Störkle

Anbieter: Hugendubel.de
Stand: 14.06.2017
Zum Angebot
SAP Security Interview Questions, Answers, and ...
8,88 € *
ggf. zzgl. Versand
(8,88 € / in stock)

SAP Security Interview Questions, Answers, and Explanations: Equity Press

Anbieter: Hugendubel.de
Stand: 14.06.2017
Zum Angebot
SAP Security - Mehr Sicherheit und Schutz durch...
6,99 € *
ggf. zzgl. Versand

Das Buch richtet sich an SAP-Basisadministratoren (SAP NetWeaver Application Server ABAP), die ihre SAP-Landschaft absichern möchten. Der Fokus liegt dabei auf ABAP-Stacks, wobei aber auch Java-Stacks (oder AS Java) teilweise behandelt werden. Der Leser erfährt, wie ein SAP-System sicher konfiguriert wird, Grundlagen der Kommunikationssicherheit, Secure Code und Patch-Management erfolgreich umgesetzt werden und wie man SAP-Systeme effektiv überwachen kann. Des Weiteren vermittelt das Buch grundlegende Security-Kenntnisse bezüglich Rollen- und Berechtigungsmanagement sowie die dazugehörige Infrastruktur (Netzwerke / Betriebssysteme / Datenbanken / Frontends). Es wird aufgezeigt, wie Sicherheitslücken geschlossen und SAP-Systeme gehärtet werden können. Der Leser kann Angriffspunkte für Hacker identifizieren und absichern. Cyber-Angriffe können so durch Prävention von technischen Maßnahmen und Systemüberwachung verhindert werden. Christoph Störkle, 1984 geboren, schreibt überwiegend Sachbücher. Nach dem Studium der Angewandten Informatik und Auslandsaufenthalten war er bei diversen Unternehmen aus den unterschiedlichsten Branchen tätig.

Anbieter: ciando eBooks
Stand: 27.09.2016
Zum Angebot
SAP Security Configuration and Deployment: The ...
73,00 € *
ggf. zzgl. Versand

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world´s largest enterprise software company and the world´s third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP ´community´ seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It´s a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the ´Black Box´ mystique that surrounds SAP security. The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance. This book contains information about SAP security that is not available anywhere else to help the reader avoid the ´´gotchas´´ that may leave them vulnerable during times of upgrade or other system changes Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP.

Anbieter: buch.de
Stand: 07.05.2017
Zum Angebot
SAP Security Configuration and Deployment: The ...
73,00 € *
ggf. zzgl. Versand

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world´s largest enterprise software company and the world´s third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP ´community´ seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It´s a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the ´Black Box´ mystique that surrounds SAP security. The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance. This book contains information about SAP security that is not available anywhere else to help the reader avoid the ´´gotchas´´ that may leave them vulnerable during times of upgrade or other system changes Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP.

Anbieter: Bol.de
Stand: 18.02.2017
Zum Angebot