ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Authorizations in SAP: 100 Things You Should Know About...

دانلود کتاب مجوزها در SAP: 100 چیزی که باید در مورد ...

Authorizations in SAP: 100 Things You Should Know About...

مشخصات کتاب

Authorizations in SAP: 100 Things You Should Know About...

ویرایش: 1 
نویسندگان:   
سری:  
ISBN (شابک) : 1592294065, 9781592294060 
ناشر: SAP PRESS 
سال نشر: 2012 
تعداد صفحات: 351 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 15 مگابایت 

قیمت کتاب (تومان) : 30,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 13


در صورت تبدیل فایل کتاب Authorizations in SAP: 100 Things You Should Know About... به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجوزها در SAP: 100 چیزی که باید در مورد ... نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجوزها در SAP: 100 چیزی که باید در مورد ...

با این کتاب یاد بگیرید که چگونه در زمان مدیریت امنیت سیستم SAP صرفه جویی کنید، که اسرار کار با مجوزها در سیستم SAP Basis را باز می کند. 100 نکته و راه حل را پیدا خواهید کرد که می توانید از آنها برای افزایش بهره وری و بهبود امنیت سیستم SAP خود استفاده کنید. نکات بر اساس حوزه مجوزهایی که تحت پوشش قرار می‌دهند، مانند امنیت توسعه، تولیدکننده نمایه، ارتقاها و موارد دیگر با هم گروه‌بندی می‌شوند. آنها با دقت انتخاب شده اند تا مجموعه ای از بهترین، مفیدترین و کمیاب ترین اطلاعات را ارائه دهند. با استفاده از این کتاب، می‌توانید سریع‌تر، آسان‌تر و مؤثرتر کار کنید.


توضیحاتی درمورد کتاب به خارجی

Learn how to save time when managing SAP system security with this book, which unlocks the secrets of working with authorizations in the SAP Basis system. Youll find 100 tips and workarounds you can use to increase productivity and improve the security of your SAP system. The tips are grouped together based on the area of authorizations they cover, such as development security, Profile Generator, upgrades, and more. They have been carefully selected to provide a collection of the best, most useful, and rarest information. With this book, you will be able to work more quickly, easily, and effectively.



فهرست مطالب

Displaying the Technical Names of Transactions in the SAP Easy Access Menu en Masse
	And Here’s How ...
Improving Your User Master Record Accuracy with Hidden Fields
	And Here’s How ...
Defining an SAP User ID Naming Convention to Manage User Master Records
	And Here’s How ...
Using BAPIs to Help Mass-Maintain the User Master Record
	And Here’s How ...
Customizing the Rules for Automatically Generated Passwords During User Creation
	And Here’s How ...
Finding and Using User Parameters to Prepopulate Transactional Fields
	And Here’s How ...
Improving Your Business Reporting through User Groups
	And Here’s How ...
Working with Inactive Users
	And Here’s How ...
Customizing SAP and User Menus through the Session Manager
	And Here’s How ...
Assigning Roles through an Organization Structure without SAP HCM Deployed
	And Here’s How ...
Constraining Organization Structure Visibility through an HR Personnel Development Profile
	And Here’s How ...
Automatically Maintaining Structural Authorizations
	And Here’s How ...
Linking User Master Records to HR Data
	And Here’s How ...
Performing Mass Changes for Users and Roles in Java
	And Here’s How ...
Displaying Authorization Errors in Transaction Log SU53 for Different Users
	And Here’s How ...
Customizing Users’ Selection en Masse
	And Here’s How ...
Mass-Changing Secure Network Communications Data for SSO User Mapping
	And Here’s How ...
Validating Your ABAP Code before Moving into the Production System
	And Here’s How ...
Archiving and Restoring a User’s Favorites
	And Here’s How ...
Displaying the Security Data Dictionary Definition with the Object Navigator
	And Here’s How ...
Finding Vulnerability Strings in Your ABAP Code
	And Here’s How ...
Creating a Transaction Variant to Restrict User Activities
	And Here’s How ...
Finding Authorization Object Documentation
	And Here’s How ...
Searching for Values and Definitions in ABAP Data Dictionary Tables
	And Here’s How ...
Mass-Exporting Query User Group Information
	And Here’s How ...
Managing an Authorization Check in the Transaction Header
	And Here’s How ...
Restricting a User’s Access to Called Transactions
	And Here’s How ...
Managing Customizing Tables in a Production System
	And Here’s How ...
Analyzing Your Security System to Keep it Updated
	And Here’s How ...
Using Parameter Transactions to Avoid Giving Direct Tables/Programs Access to End Users
	And Here’s How ...
Discovering Maintenance Customizing Transactions with a Table Name
	And Here’s How ...
Finding Roles That Contain Transactions at the Menu Level
	And Here’s How ...
Permanently Enable the Technical Name View in Transaction PFCG’s Authorization Tree
	And Here’s How ...
Creating a Sustainable Authorization Roles Naming Convention
	And Here’s How ...
Evaluating the Manual or Modified Authorization Status during Profile Generator Maintenance
	And Here’s How ...
Creating an SAP_ALL Display-Only Role
	And Here’s How ...
Maintaining an Aligned Set of Job Roles with a Naming Convention
	And Here’s How ...
Designing and Assigning a Basic Role to All Users
	And Here’s How ...
Maintaining Derived Roles to Improve Authorization Maintenance
	And Here’s How ...
Discovering Misalignment between Transactions by Downloading Data to Spreadsheets
	And Here’s How ...
Finding Misinterpreted Authorization Wildcards in Your Roles
	And Here’s How ...
Performing Mass Downloads and Uploads of Standard Authorization Values
	And Here’s How ...
Setting Up Mass Adjustments for Derived Roles
	And Here’s How ...
Troubleshooting Authorization Problems for Users
	And Here’s How ...
Customizing Your Tree Menu Settings to Avoid Duplicate Structures
	And Here’s How ...
Automatically Populating the Authorization Objects Transaction Link When Performing a Developer Trace
	And Here’s How ...
Adjusting Query Maintenance to Avoid Security Problems
	And Here’s How ...
Cleaning Up Unused Batch Jobs
	And Here’s How ...
Setting Up Authorizations to Allow Internet Service
	And Here’s How ...
Avoiding Security Holes during SAP Menu Role Maintenance
	And Here’s How ...
Changing the Rules to Generate Profile Names
	And Here’s How ...
Comparing Authorization Roles to Check for Alignment Between Systems
	And Here’s How ...
Replacing the Parent Role of a Derived Role en Masse
	And Here’s How ...
Generating Large Quantities of Profiles for Roles in a Single Transaction
	And Here’s How ...
Using SAP BAPIs to Manage Roles with an External Program
	And Here’s How ...
Using Manual Composite Profiles to Bypass the Profile Technical Limit of 312
	And Here’s How ...
Using Parameter IDs and Customizing Transactions to Manage Authorizations
	And Here’s How ...
Removing Expired User-Role Links
	And Here’s How ...
Filtering Roles by Their Status
	And Here’s How ...
Tailoring Your Ad-Hoc Analysis by Using Custom Groups in RAR and ARA
	And Here’s How ...
Modifying Your Selection Criteria for User/Roles Analysis in SAP GRC 10.0
	And Here’s How ...
Clustering Data to Enhance Your RAR Reporting for Easier Consumption
	And Here’s How ...
Performing a User Impact Risk Analysis
	And Here’s How ...
Setting Selection Criteria for the Web Interface as a Default Value
	And Here’s How ...
Defining a Firefighter User ID Naming Method
	And Here’s How ...
Using Organizational-Level Mapping in Business Role Management to Improve Role Derivation
	And Here’s How ...
Using Business Role Management to Define Business Roles in Place of Composite Roles
	And Here’s How ...
Setting Up Data Segregation in SAP GRC ARA
	And Here’s How ...
Keeping Your Mitigation Tables Clean and Accurate with the Invalid Mitigation Report
	And Here’s How ...
Making Your Roles Compliant with Transaction SU25
	And Here’s How ...
Deciding How to Set Up Your Authorization Upgrade
	And Here’s How ...
Managing Derived Roles during an Upgrade
	And Here’s How ...
Converting a Manually Created Profile into a Role
	And Here’s How ...
Avoid Maintaining a Role’s Authorization Tree Twice When New Transaction Codes Are Added
	And Here’s How ...
Identifying New Transactions in a Role’s Menu
	And Here’s How ...
Communicating Password Requirement Changes During SAP Upgrades
	And Here’s How ...
Searching for Roles or Users Using Transaction SUIM with Asterisk Searching
	And Here’s How ...
Using the Security Audit Log to Manage Your Super Users’ Access
	And Here’s How ...
Changing the Classification of an Audit Log Message
	And Here’s How ...
Configuring the SAP System to Log Activity in the Security Structure
	And Here’s How ...
Activating Table Tracing to Log the Details of Changes Made
	And Here’s How ...
Viewing All Instances of Profile Parameters
	And Here’s How ...
Identifying Alias Transactions to Eliminate Unauthorized System Access
	And Here’s How ...
Finding a Specific User Who Has Made Changes to Values
	And Here’s How ...
Identifying Query Changes
	And Here’s How ...
Protecting and Auditing Your Remote Function Call
	And Here’s How ...
Using a Spreadsheet to Collect Authorization Data
	And Here’s How ...
Defining a Template for Gathering and Defining Your Job Role Data
	And Here’s How ...
Defining a Template for Gathering the Organizational Constraints of Job Role Data
	And Here’s How ...
Defining a Template for Gathering the Nonorganizational Constraints of Job Role Data
	And Here’s How ...
Using Pivot Tables and Authorization Reports to Customize Data for the Reader
	And Here’s How ...
Defining Data for User Revalidation
	And Here’s How ...
Revalidating Roles and Providing Documentation for Analysis
	And Here’s How ...
Making Sure Users Are Assigned Only to the Roles and Transactions They Use
	And Here’s How ...
Using Indirect Role Assignment to Simplify User Maintenance and Reporting
	And Here’s How ...
Defining Business Owners
	And Here’s How ...
Finding Misalignments between Organizational-Level Pop-Ups and Authorization Data in Derived Roles
	And Here’s How ...
Finding Manually Created Authorizations in a Role’s Authorization Tree
	And Here’s How ...
Substituting SAP Queries with Specific Transaction Codes
	And Here’s How ...
Using a Query to Find Manually Created Authorizations and Convert them to Roles
	And Here’s How ...




نظرات کاربران