SAP application security learning guide

Learn best practices for SAP security and applications security in this learning guide from SearchSAP.com and SearchAppSecurity.com.


This guide was created in partnership between:

                   


If you're like most IT professionals, security is at the forefront of your concerns. This learning guide pulls SAP security and application security information from both SearchSAP.com and its sister site, SearchAppSecurity.com, to provide the most comprehensive resource around. Discover valuable tips, expert advice and step-by-step guides to help you establish security best practices. Most importantly, you can rest easy, knowing your SAP system and applications are secure.

Also, don't forget to send us an e-mail to let us know what other resource guides you'd like to see on SearchSAP.com.

Best regards,
The editors of SearchSAP.com and SearchAppSecurity.com

TABLE OF CONTENTS

   Fundamentals of SAP security and app security
   Threats to security
   Analysis
   Action
   More Learning Guides













  Fundamentals of SAP security and app security

[Return to Table of Contents]


  Threats to security

[Return to Table of Contents]

Web application threats

Authentication and Authorisation

Web services

  Analysis

[Return to Table of Contents]

SAP vulnerability analysis

Standards and Regulations

RFID

  Action

[Return to Table of Contents]

Countermeasures

Vulnerability management

Disaster recovery

Deploying applications securely

Incorporating security in the software development lifecycle

  More learning guides

[Return to Table of Contents]

This was first published in February 2006

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Business applications

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close