Your complete reference to securing SAP HANA!

Cover of SAP HANA Security Guide Cover of SAP HANA Security Guide

SAP HANA Security Guide

written by
$69.99

Available

$79.95

Available

$89.99

Available

541 pages, , Print edition hardcover
ISBN 978-1-4932-1441-9
541 pages,
E-book formats: EPUB, MOBI, PDF, online
ISBN 978-1-4932-1443-3
541 pages, , Print edition hardcover
E-book formats: EPUB, MOBI, PDF, online
ISBN 978-1-4932-1442-6
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Protect your SAP HANA system!
  • The comprehensive guide to SAP HANA security, from authentication to auditing
  • Learn to develop a complete security model using practical examples and case studies
  • Identify the critical settings necessary to pass an SAP HANA security audit
About the Book About the E-book 475 pages, hardcover, 1.5 in. Reference book format 6.9 x 9 in. Printed black and white on 60# offset paper from sustainable sources. Smyth-sewn casebound for durability. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout. E-book in full color. PDF (20 MB), EPUB (15 MB), and MOBI file (30 MB) for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.

In this book, you'll learn about:

  1. Privileges and Roles

    Master the SAP HANA privilege types—system, object, package, analytic, and application—and learn to create and assign database and repository roles using SAP HANA Studio and SQLScript.

  2. Authentication and Encryption

    Learn to use Kerberos, SAML, and native authentication with step-by-step instructions and secure internal and external communication using encryption and SSL certificates.

  3. Monitoring

    Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges.

Highlights include:

  • SAP HANA Studio
  • Privileges
  • Roles
  • Database objects
  • User accounts
  • Authentication
  • Lifecycle management
  • Auditing
  • Security tracing
  • Certificate management
  • Encryption
»Protect and defend your SAP HANA database.«

Jonathan Haun currently serves as a director within Protiviti’s Data and Analytics Group. Over the past several years, he has had the opportunity to help several clients implement solutions using SAP HANA.

more >

You may also like:

  • Cover of SAP Fiori Implementation and Development
    SAP Fiori Implementation and Development

    Anil Bavaraju

    615 pages, hardcover

    The SAP Fiori 2.0 design concept is here. See how to take your UI to the next level with this all-in-one resource to implementing and developing analytical, transactional, and fact sheet apps. Get the low-down on SAP Fiori's all-new look, More about the book

    from $69.99

    Available

    E-book | Print edition | Bundle
  • Cover of SAP BW/4HANA
    SAP BW/4HANA
    An Introduction

    Jesper Christensen, Joe Darlak, Riley Harrington, Li Kong, Marcos Poles, Christian Savelli

    427 pages, hardcover

    What is SAP BW/4HANA? More importantly, what can it do for you? Between these pages, you'll explore the answers to these questions, from simplified data models and SAP BW/4HANA Analytics to automated data lifecycle management. You'll find step-by-step instructions for More about the book

    from $59.99

    Available

    E-book | Print edition | Bundle
  • Cover of Implementing SAP Fiori Security
    Implementing SAP Fiori Security

    Gary Prewett, Michael Pytel

    108 pages

    Understand the who, what, when, and how of securing SAP Fiori applications with this E-Bite! Dive into the architecture of SAP Fiori to see what needs to be protected. Next, answer the how with the tools you'll use: SAP Mobile More about the book

    $19.99

    Available

    E-Bite