Personnaliser

OK

SAP System Security Guide - Alessandro Banzer

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

114,91 €

Produit Neuf

  • Ou 28,73 € /mois

    • Livraison : 3,99 €
    • Livré entre le 24 et le 28 avril
    Voir les modes de livraison

    M_plus_L

    PRO Vendeur favori

    4,8/5 sur + de 1 000 ventes

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Sap System Security Guide de Alessandro Banzer Format Relié  - Livre Littérature Générale

        Note : 0 0 avis sur Sap System Security Guide de Alessandro Banzer Format Relié  - Livre Littérature Générale

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Sap System Security Guide de Alessandro Banzer Format Relié

         - Livre Littérature Générale

        Livre Littérature Générale - Alessandro Banzer - 01/10/2018 - Relié - Langue : Anglais

        . .

      • Auteur(s) : Alessandro Banzer - Joe Markgraf
      • Editeur : Rheinwerk Publishing Inc.
      • Langue : Anglais
      • Parution : 01/10/2018
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 574
      • Expédition : 1185
      • Dimensions : 23.6 x 18.4 x 41.0
      • ISBN : 9781493214815



      • Résumé :
        ... Preface ... 19

        ... Target Audience ... 19

        ... System Administration: A Vast Field of Options ... 20

        ... What Is Basis? ... 21

        ... Structure of This Book ... 23

        1 ... Introduction ... 25

        1.1 ... Potential Threats ... 26

        1.2 ... The Onion Concept ... 34

        1.3 ... Risk and True Cost of Security ... 37

        1.4 ... The Administrator's Role in Security ... 40

        1.5 ... Summary ... 43

        2 ... Configuring Profiles and Parameters ... 45

        2.1 ... Understanding System Parameters ... 46

        2.2 ... System Profiles ... 47

        2.3 ... Profile and Parameter Structure ... 49

        2.4 ... Static and Dynamic Parameters ... 53

        2.5 ... Viewing and Setting Parameters ... 55

        2.6 ... Key Security-Related Parameters ... 64

        2.7 ... Controlling Access to Change Parameters ... 66

        2.8 ... Summary ... 67

        3 ... Restricting Transactional Access ... 69

        3.1 ... Clients ... 71

        3.2 ... Who Should Be Able to Lock and Unlock Transactions? ... 71

        3.3 ... Which Transactions to Lock ... 71

        3.4 ... Locking Transactions ... 73

        3.5 ... Viewing Locked Transactions ... 76

        3.6 ... Summary ... 78

        4 ... Securing Clients ... 79

        4.1 ... Client Settings ... 81

        4.2 ... Client Logon Locking ... 89

        4.3 ... Summary ... 92

        5 ... Securing the Kernel ... 93

        5.1 ... Understanding the Kernel ... 94

        5.2 ... Common Cryptographic Library ... 102

        5.3 ... Kernel Update ... 104

        5.4 ... Summary ... 114

        6 ... Managing Users ... 115

        6.1 ... What Is a User ID in SAP? ... 115

        6.2 ... Different User Types ... 115

        6.3 ... The User Buffer ... 117

        6.4 ... Creating and Maintaining a User ... 118

        6.5 ... Copy a User ... 128

        6.6 ... Change Documents for Users ... 129

        6.7 ... Mass User Changes with Transaction SU10 ... 131

        6.8 ... User Naming Convention ... 139

        6.9 ... Security Policies ... 140

        6.10 ... Maintain User Groups ... 145

        6.11 ... Central User Administration ... 147

        6.12 ... User Lock Status ... 151

        6.13 ... User Classification ... 152

        6.14 ... User-Related Tables ... 153

        6.15 ... Securing Default Accounts ... 154

        6.16 ... User Access Reviews ... 156

        6.17 ... Inactive Users ... 157

        6.18 ... Password and Logon Security ... 158

        6.19 ... Segregation of Duties ... 163

        6.20 ... Summary ... 165

        7 ... Configuring Authorizations ... 167

        7.1 ... Authorization Fundamentals ... 168

        7.2 ... SAP Role Design Concepts ... 180

        7.3 ... The Profile Generator ... 192

        7.4 ... Assign and Remove Roles ... 219

        7.5 ... Lock and Unlock Transactions ... 221

        7.6 ... Transaction SUIM: User Information System ... 221

        7.7 ... Role Transport ... 226

        7.8 ... Common Standard Profiles ... 228

        7.9 ... Types of Transactions ... 229

        7.10 ... Table Authorizations ... 239

        7.11 ... Printer Authorizations ... 249

        7.12 ... Other Important Authorization Objects ... 249

        7.13 ... Transaction SACF: Switchable Authorizations ... 253

        7.14 ... Customizing Entries in Tables PRGN_CUST and SSM_CUST ... 255

        7.15 ... Mass Maintenance of Values within Roles ... 257

        7.16 ... Upgrading to a New Release ... 260

        7.17 ... ABAP Debugger ... 267

        7.18 ... Authorization Redesign and Cleanup...

        Biographie:
        Joe Markgraf is a senior cloud architect and advisor for SAP HANA Enterprise Cloud at SAP. Before joining SAP he worked as a Basis and security administrator, contributing to both small- and large-scale SAP system implementations. He holds a business degree with a focus on information system management from Oregon State University. He enjoys playing vintage video games and shooting sports with his family in Washington State....

        Sommaire:

        If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Get the technical know-how to identify vulnerabilities, defend your system from internal and external threats, and pass audits. Secure your SAP system from the ground up!

        Highlights include:
        Password security
        CommonCryptoLib
        Single sign-on (SSO)
        Authorizations
        Transport security
        Audit logging
        Patching
        Client locking
        RFC security
        Operating system and database security

        Highlights:

        • Password security
        • CommonCryptoLib
        • Single sign-on (SSO)
        • Authorizations
        • Transport security
        • Audit logging
        • Patching
        • Client locking
        • RFC security
        • Operating system and database security

        ...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com