Protect your SAP HANA 2.0 system!

SAP HANA 2.0 Security Guide

written by
$79.99

Available

$89.95

Available

$99.99

Available

Print edition

E-book

Bundle

$89.95

Available

$79.99

Available

$99.99

Available

608 pages, 2nd, updated and revised edition , Print edition hardcover
ISBN 978-1-4932-1896-7
608 pages, 2nd, updated and revised edition
E-book formats: EPUB, MOBI, PDF, online
ISBN 978-1-4932-1897-4
608 pages, 2nd, updated and revised edition , Print edition hardcover
E-book formats: EPUB, MOBI, PDF, online
ISBN 978-1-4932-1898-1
Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces.
  • The comprehensive guide to SAP HANA 2.0 security, from authentication to auditing
  • Develop a complete security model using practical examples and case studies
  • Identify critical settings necessary to pass an SAP HANA security audit
About the Book About the E-book 608 pages, hardcover, 1.7 in. Reference book format 6.9 x 9 in. Printed black and white on 60# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout. E-book in full color. PDF (14 MB), EPUB (9 MB), and MOBI (21 MB) file for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.

In this book, you'll learn about:

  1. Privileges

    Understand the SAP HANA privilege types—system, object, package, analytic, and application—and see what it takes to assign them using SQL, SAP HANA cockpit, and SAP HANA Web-Based Development Workbench.

  2. User Accounts and Roles

    Create and manage user accounts with SAP HANA cockpit, LDAP integration, SQL, and more. Then learn to create and assign database and repository roles using these same tools.

  3. Monitoring

    Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges.

Highlights include:

  • SAP HANA cockpit
  • Privileges
  • Catalog objects
  • User accounts
  • Roles
  • Authentication
  • Certificate management
  • Encryption
  • Lifecycle management
  • Auditing
  • Security tracing
»Jonathan Haun knows his stuff. This book is appropriately called “a comprehensive guide” – I can’t think of anything related to HANA security that isn’t covered here.«
First Edition Reviewer

Jonathan Haun is a senior director at Enowa LLC where he is responsible for managing the business intelligence and technology practices.

more >

You may also like:

  • Cover of SAP System Security Guide
    SAP System Security Guide

    Joe Markgraf, Alessandro Banzer

    574 pages, hardcover

    If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Get the technical know-how More about the book

    from $69.99

    Available

    E-book | Print edition | Bundle
  • Cover of SAP HANA Administration
    SAP HANA Administration

    Richard Bremer, Lars Breddemann

    722 pages, hardcover

    Who says that a leopard can’t change its spots? With the advent of SAP HANA, database administration is evolving—and you can evolve along with it. Learn how traditional administration concepts are applied in SAP HANA, and find out about the More about the book

    from $59.99

    Available

    E-book | Print edition | Bundle
  • Cover of Security for SAP Cloud Systems
    Security for SAP Cloud Systems

    Ming Chang

    124 pages

    Data breaches, account hijacking, exploits—you know the threats to your data. With this E-Bite, see how SAP secures your cloud system. Discover the tools you can use to protect your data: single sign-on, the code vulnerability analyzer, SAP Solution Manager, More about the book

    $29.99

    Available

    E-Bite