Microsoft Dynamics AX 2012 R3 security :: a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations /
If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2015.
|
Schriftenreihe: | Professional expertise distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (1 volume) : illustrations. |
ISBN: | 1782175547 1782175539 9781782175537 9781782175544 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn913880034 | ||
003 | OCoLC | ||
005 | 20240405112445.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 150716s2015 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCO |d YDXCP |d IDEBK |d EBLCP |d DEBSZ |d OCLCO |d COO |d DEBBG |d OCLCQ |d MERUC |d OCLCF |d OCLCO |d CEF |d AU@ |d OCLCQ |d OCLCO |d WYU |d UAB |d OCLCQ |d OCLCO |d N$T |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 911845918 |a 913922276 | ||
020 | |a 1782175547 | ||
020 | |a 1782175539 | ||
020 | |a 9781782175537 | ||
020 | |a 9781782175544 |q (electronic bk.) | ||
035 | |a (OCoLC)913880034 |z (OCoLC)911845918 |z (OCoLC)913922276 | ||
037 | |a CL0500000614 |b Safari Books Online | ||
050 | 4 | |a T58.6 | |
082 | 7 | |a 658.70285 | |
049 | |a MAIN | ||
100 | 1 | |a Moustafa, Ahmed Mohamed Rafik, |e author. | |
245 | 1 | 0 | |a Microsoft Dynamics AX 2012 R3 security : |b a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / |c Ahmed Mohamed Rafik Moustafa. |
246 | 3 | 0 | |a Quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2015. | |
300 | |a 1 online resource (1 volume) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Professional expertise distilled | |
588 | 0 | |a Online resource; title from cover (Safari, viewed July 6, 2015). | |
500 | |a Includes index. | ||
505 | 0 | |a Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: MorphX Security System -- Introducing the MorphX development tool -- Application Object Tree -- The X++ code editor -- Compiler -- Debugger -- Projects -- The property sheet -- The cross-reference tool -- The Find tool -- The table browser tool -- The best practice tool -- The reverse engineering tool -- Developing a security artifact using AOT -- Setting permissions for a form -- Assigning permissions to privileges -- Validating and testing a security privilege -- Applying a configuration key -- Summary -- Chapter 2: Security Coding -- The fundamentals of security coding using X++ -- Using Code Access Security -- Securing an API on the AOS -- Security debugging -- Installing the debugger -- Enabling the debugger -- Adding users to the Debugging User local group -- The debugger user interface -- Debugger shortcut keys -- Security for the display and edit methods -- The Table Permissions Framework -- Summary -- Chapter 3: Developing Extensible Data Security -- The main concepts of XDS policies -- Designing and developing the XDS policy -- Creating the policy -- Adding constrained tables and views -- Setting the XDS policy context -- Debugging XDS policies -- Summary -- Chapter 4: Extending the Organization Model -- The organizational model framework -- Organization hierarchies -- The organizational model scenarios -- Integration with other frameworks' application modules -- Custom modeling scenarios -- Extending the organizational model -- Creating a custom type of operating unit -- Creating a new base enum value -- Creating a view -- Creating a menu item -- Extending the hierarchy designer -- Summary -- Chapter 5: Enterprise Portal Security -- The architecture of Enterprise Portal -- Web parts -- AOT elements. | |
505 | 8 | |a Datasets -- Controls -- Security in Enterprise Portal -- Securing web elements -- Record context and encryption -- Data access security -- Report access security -- Assigning a user to the DynamicsAXBrowser role -- Granting a user access permission to view reports -- Summary -- Index. | |
520 | |a If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX. | ||
630 | 0 | 0 | |a Microsoft Dynamics AX. |0 http://id.loc.gov/authorities/names/no2014126904 |
630 | 0 | 7 | |a Microsoft Dynamics AX |2 fast |
650 | 0 | |a Management information systems |x Security measures. | |
650 | 0 | |a Enterprise resource planning |v Software. | |
650 | 0 | |a Business |x Data processing |x Security measures. | |
650 | 6 | |a Systèmes d'information de gestion |x Sécurité |x Mesures. | |
650 | 6 | |a Progiciels de gestion intégrés |v Logiciels. | |
650 | 6 | |a Gestion |x Informatique |x Sécurité |x Mesures. | |
650 | 7 | |a Business |x Data processing |x Security measures |2 fast | |
650 | 7 | |a Enterprise resource planning |2 fast | |
655 | 7 | |a Software |2 fast | |
758 | |i has work: |a Microsoft Dynamics AX 2012 R3 Security (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3CtYWpdjVvP8Qy4mcmq33 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Moustafa, Ahmed Mohamed Rafik. |t Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations. |d Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015 |h viii, 79 pages |k Professional Expertise Distilled |z 9781782175537 |
830 | 0 | |a Professional expertise distilled. |0 http://id.loc.gov/authorities/names/no2015143013 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1016478 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1016478 | ||
938 | |a YBP Library Services |b YANK |n 12486992 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn913880034 |
---|---|
_version_ | 1804748453904908288 |
adam_text | |
any_adam_object | |
author | Moustafa, Ahmed Mohamed Rafik |
author_facet | Moustafa, Ahmed Mohamed Rafik |
author_role | aut |
author_sort | Moustafa, Ahmed Mohamed Rafik |
author_variant | a m r m amr amrm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | T58 |
callnumber-raw | T58.6 |
callnumber-search | T58.6 |
callnumber-sort | T 258.6 |
callnumber-subject | T - General Technology |
collection | ZDB-4-EBU |
contents | Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: MorphX Security System -- Introducing the MorphX development tool -- Application Object Tree -- The X++ code editor -- Compiler -- Debugger -- Projects -- The property sheet -- The cross-reference tool -- The Find tool -- The table browser tool -- The best practice tool -- The reverse engineering tool -- Developing a security artifact using AOT -- Setting permissions for a form -- Assigning permissions to privileges -- Validating and testing a security privilege -- Applying a configuration key -- Summary -- Chapter 2: Security Coding -- The fundamentals of security coding using X++ -- Using Code Access Security -- Securing an API on the AOS -- Security debugging -- Installing the debugger -- Enabling the debugger -- Adding users to the Debugging User local group -- The debugger user interface -- Debugger shortcut keys -- Security for the display and edit methods -- The Table Permissions Framework -- Summary -- Chapter 3: Developing Extensible Data Security -- The main concepts of XDS policies -- Designing and developing the XDS policy -- Creating the policy -- Adding constrained tables and views -- Setting the XDS policy context -- Debugging XDS policies -- Summary -- Chapter 4: Extending the Organization Model -- The organizational model framework -- Organization hierarchies -- The organizational model scenarios -- Integration with other frameworks' application modules -- Custom modeling scenarios -- Extending the organizational model -- Creating a custom type of operating unit -- Creating a new base enum value -- Creating a view -- Creating a menu item -- Extending the hierarchy designer -- Summary -- Chapter 5: Enterprise Portal Security -- The architecture of Enterprise Portal -- Web parts -- AOT elements. Datasets -- Controls -- Security in Enterprise Portal -- Securing web elements -- Record context and encryption -- Data access security -- Report access security -- Assigning a user to the DynamicsAXBrowser role -- Granting a user access permission to view reports -- Summary -- Index. |
ctrlnum | (OCoLC)913880034 |
dewey-full | 658.70285 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.70285 |
dewey-search | 658.70285 |
dewey-sort | 3658.70285 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05599cam a2200613 i 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn913880034</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240405112445.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">150716s2015 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">CEF</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WYU</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">911845918</subfield><subfield code="a">913922276</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782175547</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782175539</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782175537</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782175544</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)913880034</subfield><subfield code="z">(OCoLC)911845918</subfield><subfield code="z">(OCoLC)913922276</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000614</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T58.6</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.70285</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Moustafa, Ahmed Mohamed Rafik,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft Dynamics AX 2012 R3 security :</subfield><subfield code="b">a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations /</subfield><subfield code="c">Ahmed Mohamed Rafik Moustafa.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed July 6, 2015).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: MorphX Security System -- Introducing the MorphX development tool -- Application Object Tree -- The X++ code editor -- Compiler -- Debugger -- Projects -- The property sheet -- The cross-reference tool -- The Find tool -- The table browser tool -- The best practice tool -- The reverse engineering tool -- Developing a security artifact using AOT -- Setting permissions for a form -- Assigning permissions to privileges -- Validating and testing a security privilege -- Applying a configuration key -- Summary -- Chapter 2: Security Coding -- The fundamentals of security coding using X++ -- Using Code Access Security -- Securing an API on the AOS -- Security debugging -- Installing the debugger -- Enabling the debugger -- Adding users to the Debugging User local group -- The debugger user interface -- Debugger shortcut keys -- Security for the display and edit methods -- The Table Permissions Framework -- Summary -- Chapter 3: Developing Extensible Data Security -- The main concepts of XDS policies -- Designing and developing the XDS policy -- Creating the policy -- Adding constrained tables and views -- Setting the XDS policy context -- Debugging XDS policies -- Summary -- Chapter 4: Extending the Organization Model -- The organizational model framework -- Organization hierarchies -- The organizational model scenarios -- Integration with other frameworks' application modules -- Custom modeling scenarios -- Extending the organizational model -- Creating a custom type of operating unit -- Creating a new base enum value -- Creating a view -- Creating a menu item -- Extending the hierarchy designer -- Summary -- Chapter 5: Enterprise Portal Security -- The architecture of Enterprise Portal -- Web parts -- AOT elements.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Datasets -- Controls -- Security in Enterprise Portal -- Securing web elements -- Record context and encryption -- Data access security -- Report access security -- Assigning a user to the DynamicsAXBrowser role -- Granting a user access permission to view reports -- Summary -- Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Dynamics AX.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2014126904</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Dynamics AX</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Enterprise resource planning</subfield><subfield code="v">Software.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes d'information de gestion</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Progiciels de gestion intégrés</subfield><subfield code="v">Logiciels.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion</subfield><subfield code="x">Informatique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Enterprise resource planning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Microsoft Dynamics AX 2012 R3 Security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3CtYWpdjVvP8Qy4mcmq33</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Moustafa, Ahmed Mohamed Rafik.</subfield><subfield code="t">Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations.</subfield><subfield code="d">Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015</subfield><subfield code="h">viii, 79 pages</subfield><subfield code="k">Professional Expertise Distilled</subfield><subfield code="z">9781782175537</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Professional expertise distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015143013</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1016478</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1016478</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12486992</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Software fast |
genre_facet | Software |
id | ZDB-4-EBU-ocn913880034 |
illustrated | Illustrated |
indexdate | 2024-07-16T15:04:07Z |
institution | BVB |
isbn | 1782175547 1782175539 9781782175537 9781782175544 |
language | English |
oclc_num | 913880034 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations. |
psigel | ZDB-4-EBU |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing, |
record_format | marc |
series | Professional expertise distilled. |
series2 | Professional expertise distilled |
spelling | Moustafa, Ahmed Mohamed Rafik, author. Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / Ahmed Mohamed Rafik Moustafa. Quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations Birmingham, UK : Packt Publishing, 2015. 1 online resource (1 volume) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier Professional expertise distilled Online resource; title from cover (Safari, viewed July 6, 2015). Includes index. Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: MorphX Security System -- Introducing the MorphX development tool -- Application Object Tree -- The X++ code editor -- Compiler -- Debugger -- Projects -- The property sheet -- The cross-reference tool -- The Find tool -- The table browser tool -- The best practice tool -- The reverse engineering tool -- Developing a security artifact using AOT -- Setting permissions for a form -- Assigning permissions to privileges -- Validating and testing a security privilege -- Applying a configuration key -- Summary -- Chapter 2: Security Coding -- The fundamentals of security coding using X++ -- Using Code Access Security -- Securing an API on the AOS -- Security debugging -- Installing the debugger -- Enabling the debugger -- Adding users to the Debugging User local group -- The debugger user interface -- Debugger shortcut keys -- Security for the display and edit methods -- The Table Permissions Framework -- Summary -- Chapter 3: Developing Extensible Data Security -- The main concepts of XDS policies -- Designing and developing the XDS policy -- Creating the policy -- Adding constrained tables and views -- Setting the XDS policy context -- Debugging XDS policies -- Summary -- Chapter 4: Extending the Organization Model -- The organizational model framework -- Organization hierarchies -- The organizational model scenarios -- Integration with other frameworks' application modules -- Custom modeling scenarios -- Extending the organizational model -- Creating a custom type of operating unit -- Creating a new base enum value -- Creating a view -- Creating a menu item -- Extending the hierarchy designer -- Summary -- Chapter 5: Enterprise Portal Security -- The architecture of Enterprise Portal -- Web parts -- AOT elements. Datasets -- Controls -- Security in Enterprise Portal -- Securing web elements -- Record context and encryption -- Data access security -- Report access security -- Assigning a user to the DynamicsAXBrowser role -- Granting a user access permission to view reports -- Summary -- Index. If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX. Microsoft Dynamics AX. http://id.loc.gov/authorities/names/no2014126904 Microsoft Dynamics AX fast Management information systems Security measures. Enterprise resource planning Software. Business Data processing Security measures. Systèmes d'information de gestion Sécurité Mesures. Progiciels de gestion intégrés Logiciels. Gestion Informatique Sécurité Mesures. Business Data processing Security measures fast Enterprise resource planning fast Software fast has work: Microsoft Dynamics AX 2012 R3 Security (Text) https://id.oclc.org/worldcat/entity/E39PD3CtYWpdjVvP8Qy4mcmq33 https://id.oclc.org/worldcat/ontology/hasWork Print version: Moustafa, Ahmed Mohamed Rafik. Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations. Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015 viii, 79 pages Professional Expertise Distilled 9781782175537 Professional expertise distilled. http://id.loc.gov/authorities/names/no2015143013 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1016478 Volltext |
spellingShingle | Moustafa, Ahmed Mohamed Rafik Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / Professional expertise distilled. Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: MorphX Security System -- Introducing the MorphX development tool -- Application Object Tree -- The X++ code editor -- Compiler -- Debugger -- Projects -- The property sheet -- The cross-reference tool -- The Find tool -- The table browser tool -- The best practice tool -- The reverse engineering tool -- Developing a security artifact using AOT -- Setting permissions for a form -- Assigning permissions to privileges -- Validating and testing a security privilege -- Applying a configuration key -- Summary -- Chapter 2: Security Coding -- The fundamentals of security coding using X++ -- Using Code Access Security -- Securing an API on the AOS -- Security debugging -- Installing the debugger -- Enabling the debugger -- Adding users to the Debugging User local group -- The debugger user interface -- Debugger shortcut keys -- Security for the display and edit methods -- The Table Permissions Framework -- Summary -- Chapter 3: Developing Extensible Data Security -- The main concepts of XDS policies -- Designing and developing the XDS policy -- Creating the policy -- Adding constrained tables and views -- Setting the XDS policy context -- Debugging XDS policies -- Summary -- Chapter 4: Extending the Organization Model -- The organizational model framework -- Organization hierarchies -- The organizational model scenarios -- Integration with other frameworks' application modules -- Custom modeling scenarios -- Extending the organizational model -- Creating a custom type of operating unit -- Creating a new base enum value -- Creating a view -- Creating a menu item -- Extending the hierarchy designer -- Summary -- Chapter 5: Enterprise Portal Security -- The architecture of Enterprise Portal -- Web parts -- AOT elements. Datasets -- Controls -- Security in Enterprise Portal -- Securing web elements -- Record context and encryption -- Data access security -- Report access security -- Assigning a user to the DynamicsAXBrowser role -- Granting a user access permission to view reports -- Summary -- Index. Microsoft Dynamics AX. http://id.loc.gov/authorities/names/no2014126904 Microsoft Dynamics AX fast Management information systems Security measures. Enterprise resource planning Software. Business Data processing Security measures. Systèmes d'information de gestion Sécurité Mesures. Progiciels de gestion intégrés Logiciels. Gestion Informatique Sécurité Mesures. Business Data processing Security measures fast Enterprise resource planning fast |
subject_GND | http://id.loc.gov/authorities/names/no2014126904 |
title | Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / |
title_alt | Quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations |
title_auth | Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / |
title_exact_search | Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / |
title_full | Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / Ahmed Mohamed Rafik Moustafa. |
title_fullStr | Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / Ahmed Mohamed Rafik Moustafa. |
title_full_unstemmed | Microsoft Dynamics AX 2012 R3 security : a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / Ahmed Mohamed Rafik Moustafa. |
title_short | Microsoft Dynamics AX 2012 R3 security : |
title_sort | microsoft dynamics ax 2012 r3 security a quick guide to planning designing and debugging operational level security for microsoft dynamics ax 2012 r3 implementations |
title_sub | a quick guide to planning, designing, and debugging operational-level security for Microsoft Dynamics AX 2012 R3 implementations / |
topic | Microsoft Dynamics AX. http://id.loc.gov/authorities/names/no2014126904 Microsoft Dynamics AX fast Management information systems Security measures. Enterprise resource planning Software. Business Data processing Security measures. Systèmes d'information de gestion Sécurité Mesures. Progiciels de gestion intégrés Logiciels. Gestion Informatique Sécurité Mesures. Business Data processing Security measures fast Enterprise resource planning fast |
topic_facet | Microsoft Dynamics AX. Microsoft Dynamics AX Management information systems Security measures. Enterprise resource planning Software. Business Data processing Security measures. Systèmes d'information de gestion Sécurité Mesures. Progiciels de gestion intégrés Logiciels. Gestion Informatique Sécurité Mesures. Business Data processing Security measures Enterprise resource planning Software |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1016478 |
work_keys_str_mv | AT moustafaahmedmohamedrafik microsoftdynamicsax2012r3securityaquickguidetoplanningdesigninganddebuggingoperationallevelsecurityformicrosoftdynamicsax2012r3implementations AT moustafaahmedmohamedrafik quickguidetoplanningdesigninganddebuggingoperationallevelsecurityformicrosoftdynamicsax2012r3implementations |