SAP security configuration and deployment the IT administrator's guide to best practices

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Burlington, MA Syngress Pub. c2009
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV042305285
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2009 xx o|||| 00||| eng d
020 |a 9781597492843  |9 978-1-59749-284-3 
020 |a 1597492841  |9 1-59749-284-1 
020 |a 9780080570013  |c electronic bk.  |9 978-0-08-057001-3 
020 |a 0080570011  |c electronic bk.  |9 0-08-057001-1 
035 |a (ZDB-33-EBS)ocn316568748 
035 |a (OCoLC)316568748 
035 |a (DE-599)BVBBV042305285 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 22 
245 1 0 |a SAP security configuration and deployment  |b the IT administrator's guide to best practices  |c Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.] 
264 1 |a Burlington, MA  |b Syngress Pub.  |c c2009 
300 |a 1 Online-Ressource (xvii, 372 p.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues.  
500 |a It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. * The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance.  
500 |a * This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP. 
500 |a Includes bibliographical references and index 
630 0 4 |a SAP ERP. 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a SAP ERP.  |2 blmlsh 
650 7 |a Business enterprises / Computer networks / Security measures  |2 local 
650 7 |a Business information services / Security measures  |2 local 
650 4 |a Unternehmen 
650 4 |a Business enterprises  |x Computer networks  |x Security measures 
650 4 |a Business information services  |x Security measures 
650 0 7 |a SAP Business Intelligence  |0 (DE-588)7519649-9  |2 gnd  |9 rswk-swf 
689 0 0 |a SAP Business Intelligence  |0 (DE-588)7519649-9  |D s 
689 0 |8 1\p  |5 DE-604 
700 1 |a Wun-Young, Leslie  |e Sonstige  |4 oth 
700 1 |a Hirao, Joey  |e Sonstige  |4 oth 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597492843  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD 
912 |a ZDB-33-EBS 
940 1 |q FAW_PDA_ESD 
940 1 |q FLA_PDA_ESD 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027742277 

Datensatz im Suchindex

_version_ 1819294008176803841
any_adam_object
building Verbundindex
bvnumber BV042305285
collection ZDB-33-ESD
ZDB-33-EBS
ctrlnum (ZDB-33-EBS)ocn316568748
(OCoLC)316568748
(DE-599)BVBBV042305285
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04491nam a2200601zc 4500</leader><controlfield tag="001">BV042305285</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2009 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492843</subfield><subfield code="9">978-1-59749-284-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492841</subfield><subfield code="9">1-59749-284-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080570013</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-057001-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080570011</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-057001-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn316568748</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)316568748</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305285</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SAP security configuration and deployment</subfield><subfield code="b">the IT administrator's guide to best practices</subfield><subfield code="c">Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 372 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. * The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">* This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">SAP ERP.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SAP ERP.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business information services / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business information services</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">SAP Business Intelligence</subfield><subfield code="0">(DE-588)7519649-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">SAP Business Intelligence</subfield><subfield code="0">(DE-588)7519649-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wun-Young, Leslie</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hirao, Joey</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492843</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742277</subfield></datafield></record></collection>
id DE-604.BV042305285
illustrated Not Illustrated
indexdate 2024-12-24T04:19:29Z
institution BVB
isbn 9781597492843
1597492841
9780080570013
0080570011
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027742277
oclc_num 316568748
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (xvii, 372 p.)
psigel ZDB-33-ESD
ZDB-33-EBS
FAW_PDA_ESD
FLA_PDA_ESD
publishDate 2009
publishDateSearch 2009
publishDateSort 2009
publisher Syngress Pub.
record_format marc
spelling SAP security configuration and deployment the IT administrator's guide to best practices Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.]
Burlington, MA Syngress Pub. c2009
1 Online-Ressource (xvii, 372 p.)
txt rdacontent
c rdamedia
cr rdacarrier
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues.
It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. * The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance.
* This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP.
Includes bibliographical references and index
SAP ERP.
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
SAP ERP. blmlsh
Business enterprises / Computer networks / Security measures local
Business information services / Security measures local
Unternehmen
Business enterprises Computer networks Security measures
Business information services Security measures
SAP Business Intelligence (DE-588)7519649-9 gnd rswk-swf
SAP Business Intelligence (DE-588)7519649-9 s
1\p DE-604
Wun-Young, Leslie Sonstige oth
Hirao, Joey Sonstige oth
http://www.sciencedirect.com/science/book/9781597492843 Verlag Volltext
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle SAP security configuration and deployment the IT administrator's guide to best practices
SAP ERP.
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
SAP ERP. blmlsh
Business enterprises / Computer networks / Security measures local
Business information services / Security measures local
Unternehmen
Business enterprises Computer networks Security measures
Business information services Security measures
SAP Business Intelligence (DE-588)7519649-9 gnd
subject_GND (DE-588)7519649-9
title SAP security configuration and deployment the IT administrator's guide to best practices
title_auth SAP security configuration and deployment the IT administrator's guide to best practices
title_exact_search SAP security configuration and deployment the IT administrator's guide to best practices
title_full SAP security configuration and deployment the IT administrator's guide to best practices Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.]
title_fullStr SAP security configuration and deployment the IT administrator's guide to best practices Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.]
title_full_unstemmed SAP security configuration and deployment the IT administrator's guide to best practices Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.]
title_short SAP security configuration and deployment
title_sort sap security configuration and deployment the it administrator s guide to best practices
title_sub the IT administrator's guide to best practices
topic SAP ERP.
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
SAP ERP. blmlsh
Business enterprises / Computer networks / Security measures local
Business information services / Security measures local
Unternehmen
Business enterprises Computer networks Security measures
Business information services Security measures
SAP Business Intelligence (DE-588)7519649-9 gnd
topic_facet SAP ERP.
COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Business enterprises / Computer networks / Security measures
Business information services / Security measures
Unternehmen
Business enterprises Computer networks Security measures
Business information services Security measures
SAP Business Intelligence
url http://www.sciencedirect.com/science/book/9781597492843
work_keys_str_mv AT wunyoungleslie sapsecurityconfigurationanddeploymenttheitadministratorsguidetobestpractices
AT hiraojoey sapsecurityconfigurationanddeploymenttheitadministratorsguidetobestpractices