• Complain

Jonathan Haun - SAP HANA 2.0 Security Guide

Here you can read online Jonathan Haun - SAP HANA 2.0 Security Guide full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Rheinwerk Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Jonathan Haun SAP HANA 2.0 Security Guide
  • Book:
    SAP HANA 2.0 Security Guide
  • Author:
  • Publisher:
    Rheinwerk Publishing
  • Genre:
  • Year:
    2020
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

SAP HANA 2.0 Security Guide: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "SAP HANA 2.0 Security Guide" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Jonathan Haun: author's other books


Who wrote SAP HANA 2.0 Security Guide? Find out the surname, the name of the author of the book and a list of all author's works by series.

SAP HANA 2.0 Security Guide — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "SAP HANA 2.0 Security Guide" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Jonathan Haun

SAP HANA 2.0 Security Guide

2nd edition 2020

Imprint This e-book is a publication many contributed to specifically Editor - photo 1
Imprint

This e-book is a publication many contributed to, specifically:

Editor Meagan White
Acquisitions Editor Hareem Shafi
Copyeditor Yvette Chin
Cover Design Graham Geary
Photo Credit iStockphoto.com/173255520/ aluxum
Production E-Book Hannah Lane
Typesetting E-Book III-satz, Husby (Germany)

We hope that you liked this e-book. Please share your feedback with us and read the to find out how to contact us.


The Library of Congress has cataloged the printed edition as follows:
Names: Haun, Jonathan, author.
Title: SAP HANA 2.0 security guide / Jonathan Haun.
Other titles: SAP HANA security guide
Description: 2nd edition. | Bonn ; Boston : Rheinwerk Publishing, 2020. |
Revised editon of: SAP HANA security guide.
Identifiers: LCCN 2020000009 (print) | LCCN 2020000010 (ebook) | ISBN
9781493218967 (hardcover) | ISBN 9781493218974 (ebook)
Subjects: LCSH: Database security. | Computer security. | Business
enterprises--Computer networks--Security measures. | SAP HANA
(Electronic resource)
Classification: LCC QA76.9.D314 H348 2020 (print) | LCC QA76.9.D314
(ebook) | DDC 005.8--dc23
LC record available at https://lccn.loc.gov/2020000009
LC ebook record available at https://lccn.loc.gov/2020000010

ISBN 978-1-4932-1896-7 (print)
ISBN 978-1-4932-1897-4 (e-book)
ISBN 978-1-4932-1898-1 (print and e-book)


2020 by Rheinwerk Publishing Inc., Boston (MA)
2nd, updated and revised edition 2020

Dear Reader,

Recently, a new branch of a bank was built on my route to work. Because I was driving past it twice a day, I got to see how it was built, brick-by-brick. First the ground was leveled, and then the foundation poured. From there, the whole building was framed and then gradually filled in with brick and plaster. At some point, pre-roof, the vault was lifted in, disappearing into the building before I could even see it.

While building a secure bank branch and setting up security in your SAP HANA system are wildly different processes, there are some lessons to be drawn. A new SAP HANA system is good chance to start your security practices fresh, leveling on the ground beneath you. Layers of security in the form of privileges, authorizations, certificates, and other measures are the best way to put up walls and vaults between those who should have access, and those who shouldnt.

What did you think about SAP HANA 2.0 Security Guide ? Your comments and suggestions are the most useful tools to help us make our books the best they can be. Please feel free to contact me and share any praise or criticism you may have.

Thank you for purchasing a book from SAP PRESS!

Meagan White
Editor, SAP PRESS


www.sap-press.com
Rheinwerk Publishing Boston, MA

Notes on Usage

This e-book is protected by copyright . By purchasing this e-book, you have agreed to accept and adhere to the copyrights. You are entitled to use this e-book for personal purposes. You may print and copy it, too, but also only for personal use. Sharing an electronic or printed copy with others, however, is not permitted, neither as a whole nor in parts. Of course, making them available on the Internet or in a company network is illegal as well.

For detailed and legally binding usage conditions, please refer to the section .

This e-book copy contains a digital watermark , a signature that indicates which person may use this copy:

Notes on the Screen Presentation

You are reading this e-book in a file format (EPUB or Mobi) that makes the book content adaptable to the display options of your reading device and to your personal needs. Thats a great thing; but unfortunately not every device displays the content in the same way and the rendering of features such as pictures and tables or hyphenation can lead to difficulties. This e-book was optimized for the presentation on as many common reading devices as possible.

If you want to zoom in on a figure (especially in iBooks on the iPad), tap the respective figure once. By tapping once again, you return to the previous screen. You can find more recommendations on the customization of the screen layout on the .

Preface

SAP HANA powers SAP applications and hosts data from a variety of sources, functionalities that are often critical to an organizations operations. Failure to properly secure an SAP HANA environment often can lead to system instability and hurt data integrity; therefore, SAP HANA security must be given the proper attention and scrutiny.

Purpose

This book was written with the goal of educating readers about securing SAP HANA. Well focus on key aspects of the SAP HANA security model, including user provisioning, role creation, privilege assignment, encryption, auditing, and authentication. Well also discuss the tools you can use to create and maintain an SAP HANA security model. Such information is critical for SAP HANA security architects to implement security models for their organizations. This information is also necessary for organizations to protect the data hosted within SAP HANA and to maintain the reliability of systems that rely on SAP HANA.

Who Should Read This Book?

This book will help security teams, SAP Basis teams, security consultants, and anyone looking for a comprehensive guide to implementing an SAP HANA security model.

We recommend the following prerequisites for readers of this book:

  • General knowledge of the SAP HANA cockpit

  • General knowledge of SQL

  • Experience working in areas of database administration

  • Experience working with database objects such as tables, views, and stored procedures

Each chapter is structured to offer background and theory for specific security-related concepts. Many chapters conclude with a case studycentering on the fictitious E-Corporationfor a real-world application of the topics covered in the book. Our goal is to provide you with technical knowledge and a unique perspective on how security has been implemented in the field based on real customer engagements.

Structure of This Book

The book is structured into 18 chapters. The Introduction and discuss the various privilege types within SAP HANA. The remaining chapters discuss SAP HANA authentication, encryption, lifecycle management, audit policies, security troubleshooting, and general recommendations for securing your SAP HANA environment.

Introduction

Representing the next evolution of data management for many organizations, SAP HANA also powers critical applications for managing your organization. Thus, SAP HANA can be a valuable asset in many organizations. Because of its importance, SAP HANA must be secured. In the Introduction, well provide an overview of SAP HANAs hardware and software layers. Well introduce the basic concepts of SAP HANA security and list several reasons why securing your SAP HANA environment is important.

: Managing Security with the SAP HANA Cockpit

This chapter introduces the SAP HANA cockpit, a key tool for managing SAP HANA security. Well start with an overview of the architecture of the SAP HANA cockpit. Well explain how you can navigate the SAP HANA cockpit. Well also provide a detailed workflow to help identify key security management areas within the SAP HANA cockpit, including all security-related functionalities, the SAP HANA database explorer, and the SQL console.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «SAP HANA 2.0 Security Guide»

Look at similar books to SAP HANA 2.0 Security Guide. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «SAP HANA 2.0 Security Guide»

Discussion, reviews of the book SAP HANA 2.0 Security Guide and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.