Feature

SAP application security learning guide


This guide was created in partnership between:

                   


If you're like most IT professionals, security is at the forefront of your concerns. This learning guide pulls SAP security and application security information from both SearchSAP.com and its sister site, SearchAppSecurity.com, to provide the most comprehensive resource around. Discover valuable tips, expert advice and step-by-step guides to help you establish security best practices. Most importantly, you can rest easy, knowing your SAP system and applications are secure.

Also, don't forget to send us an e-mail to let us know what other resource guides you'd like to see on SearchSAP.com.

Best regards,
The editors of SearchSAP.com and SearchAppSecurity.com

TABLE OF CONTENTS

   Fundamentals of SAP security and app security
   Threats to security
   Analysis
   Action
   More Learning Guides













  Fundamentals of SAP security and app security

[Return to Table of Contents]


  Threats to security

[Return to Table of Contents]

Web application threats

Authentication and Authorisation

Web services

  Analysis

[Return to Table of Contents]

SAP vulnerability analysis

Standards and Regulations

RFID

  Action

[Return to Table of Contents]

Countermeasures

Vulnerability management

Disaster recovery

Deploying applications securely

Incorporating security in the software development lifecycle

  More learning guides

[Return to Table of Contents]


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in February 2006

 

COMMENTS powered by Disqus  //  Commenting policy