Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Explore how to protect and defend your SAP S/4HANA applications, Fiori, Gateway, and the SAP HANA database platform. Learn how to create a consistent cross-system authorization concept and translate the technical specifics for each system into a comprehensive and consistent security model. Explore technical security aspects such as privileges and roles, authentication and encryption, and monitoring for S/4HANA. Compare and contrast SAP S/4HANA applications to the SAP ERP security model and identify what has changed. This book is up to date for SAP HANA 2.0! Dive into SAP S/4HANA authorizations and gain an understanding of the impact on the new front-end and database security setup, and why the different levels need to be consistent. Get best practices for SAP Fiori and Gateway. Find out why it is important to secure SAP HANA from an application layer point of view, as well as a database point of view. Take an in-depth look at how to secure the SAP Application Server, database, operating system, and the network infrastructure. - Effectively secure SAP S/4HANA, Fiori, and Gateway - Privileges and roles, authentication, encryption, and monitoring - Mobile access and SSO considerations - Cross-system authorization concepts and implementation
This book provides system architects, technical consultants, and IT management the tools to design a system architectures to deploy SAP applications on SAP HANA. Explore production and non-production systems, deployment options, backup and recovery, data replication, high-availability, and virtualization in detail. Dive into on-premise deployment options and data provisioning scenarios. Walk through scale-up and scale-out options and data partitioning considerations. Review the advantages and disadvantages of storage and system replication options and when to use each. Clarify how to leverage HANA for single node and distributed systems. Dive into a discussion on software and hardware virtualization. Compare the options available and guide your decision using flowcharts your organization can leverage to choose the proper technology for your environment and specific needs. This book enables readers to carefully evaluate and implement a well-considered SAP HANA scenario. - SAP HANA sizing, capacity planning guidelines, and data tiering - Deployment options and data provisioning scenarios - Backup and recovery options and procedures - Software and hardware virtualization in SAP HANA
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.