HHIDE_DUMP
Гость
H
HHIDE_DUMP
Гость
Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces.
- The comprehensive guide to SAP HANA 2.0 security, from authentication to auditing
- Develop a complete security model using practical examples and case studies
- Identify critical settings necessary to pass an SAP HANA security audit
Скрытое содержимое доступно для зарегистрированных пользователей!