SAP security configuration and deployment: the IT administrator's guide to best practices
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
c2009
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. * The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance. * This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP. Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xvii, 372 p.) |
ISBN: | 9781597492843 1597492841 9780080570013 0080570011 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305285 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2009 |||| o||u| ||||||eng d | ||
020 | |a 9781597492843 |9 978-1-59749-284-3 | ||
020 | |a 1597492841 |9 1-59749-284-1 | ||
020 | |a 9780080570013 |c electronic bk. |9 978-0-08-057001-3 | ||
020 | |a 0080570011 |c electronic bk. |9 0-08-057001-1 | ||
035 | |a (ZDB-33-EBS)ocn316568748 | ||
035 | |a (OCoLC)316568748 | ||
035 | |a (DE-599)BVBBV042305285 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a SAP security configuration and deployment |b the IT administrator's guide to best practices |c Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.] |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c c2009 | |
300 | |a 1 Online-Ressource (xvii, 372 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. | ||
500 | |a It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. * The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance. | ||
500 | |a * This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP. | ||
500 | |a Includes bibliographical references and index | ||
630 | 0 | 4 | |a SAP ERP. |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a SAP ERP. |2 blmlsh | |
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 local | |
650 | 7 | |a Business information services / Security measures |2 local | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Business information services |x Security measures | |
650 | 0 | 7 | |a SAP Business Intelligence |0 (DE-588)7519649-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a SAP Business Intelligence |0 (DE-588)7519649-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Wun-Young, Leslie |e Sonstige |4 oth | |
700 | 1 | |a Hirao, Joey |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597492843 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742277 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804152888226742272 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042305285 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn316568748 (OCoLC)316568748 (DE-599)BVBBV042305285 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04476nmm a2200589zc 4500</leader><controlfield tag="001">BV042305285</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492843</subfield><subfield code="9">978-1-59749-284-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492841</subfield><subfield code="9">1-59749-284-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080570013</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-057001-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080570011</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-057001-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn316568748</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)316568748</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305285</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SAP security configuration and deployment</subfield><subfield code="b">the IT administrator's guide to best practices</subfield><subfield code="c">Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 372 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. * The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">* This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">SAP ERP.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SAP ERP.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business information services / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business information services</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">SAP Business Intelligence</subfield><subfield code="0">(DE-588)7519649-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">SAP Business Intelligence</subfield><subfield code="0">(DE-588)7519649-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wun-Young, Leslie</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hirao, Joey</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492843</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742277</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV042305285 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9781597492843 1597492841 9780080570013 0080570011 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742277 |
oclc_num | 316568748 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xvii, 372 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Syngress Pub. |
record_format | marc |
spelling | SAP security configuration and deployment the IT administrator's guide to best practices Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.] Burlington, MA Syngress Pub. c2009 1 Online-Ressource (xvii, 372 p.) txt rdacontent c rdamedia cr rdacarrier Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. * The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance. * This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP. Includes bibliographical references and index SAP ERP. COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh SAP ERP. blmlsh Business enterprises / Computer networks / Security measures local Business information services / Security measures local Unternehmen Business enterprises Computer networks Security measures Business information services Security measures SAP Business Intelligence (DE-588)7519649-9 gnd rswk-swf SAP Business Intelligence (DE-588)7519649-9 s 1\p DE-604 Wun-Young, Leslie Sonstige oth Hirao, Joey Sonstige oth http://www.sciencedirect.com/science/book/9781597492843 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | SAP security configuration and deployment the IT administrator's guide to best practices SAP ERP. COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh SAP ERP. blmlsh Business enterprises / Computer networks / Security measures local Business information services / Security measures local Unternehmen Business enterprises Computer networks Security measures Business information services Security measures SAP Business Intelligence (DE-588)7519649-9 gnd |
subject_GND | (DE-588)7519649-9 |
title | SAP security configuration and deployment the IT administrator's guide to best practices |
title_auth | SAP security configuration and deployment the IT administrator's guide to best practices |
title_exact_search | SAP security configuration and deployment the IT administrator's guide to best practices |
title_full | SAP security configuration and deployment the IT administrator's guide to best practices Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.] |
title_fullStr | SAP security configuration and deployment the IT administrator's guide to best practices Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.] |
title_full_unstemmed | SAP security configuration and deployment the IT administrator's guide to best practices Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.] |
title_short | SAP security configuration and deployment |
title_sort | sap security configuration and deployment the it administrator s guide to best practices |
title_sub | the IT administrator's guide to best practices |
topic | SAP ERP. COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh SAP ERP. blmlsh Business enterprises / Computer networks / Security measures local Business information services / Security measures local Unternehmen Business enterprises Computer networks Security measures Business information services Security measures SAP Business Intelligence (DE-588)7519649-9 gnd |
topic_facet | SAP ERP. COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Business enterprises / Computer networks / Security measures Business information services / Security measures Unternehmen Business enterprises Computer networks Security measures Business information services Security measures SAP Business Intelligence |
url | http://www.sciencedirect.com/science/book/9781597492843 |
work_keys_str_mv | AT wunyoungleslie sapsecurityconfigurationanddeploymenttheitadministratorsguidetobestpractices AT hiraojoey sapsecurityconfigurationanddeploymenttheitadministratorsguidetobestpractices |