SAP security configuration and deployment (Record no. 58724)

000 -LEADER
fixed length control field 05064cam a2200529Ia 4500
001 - CONTROL NUMBER
control field 12274010
003 - CONTROL NUMBER IDENTIFIER
control field FUTML
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170411113453.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110417s2009 maua gob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597492843
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1597492841
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780080570013
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0080570011
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV039828794
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CDX
System control number 9507773
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000050492740
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NZ1
System control number 15189178
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 396676197
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn316568748
035 ## - SYSTEM CONTROL NUMBER
System control number 12274010
037 ## - ACCESSION NUMBER
Accession NUmber B-035710
040 ## - CATALOGING SOURCE
Original cataloging agency OPELS
Language of cataloging eng
Transcribing agency OPELS
Modifying agency OPELS
049 ## - LOCAL HOLDINGS (OCLC)
Holding library TEFA
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number S36 2009
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 00 - TITLE STATEMENT
Title SAP security configuration and deployment
Remainder of title the IT administrator's guide to best practices /
Statement of responsibility, etc. Leslie Wun-Young, technical editor ; Joey Hirao ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Burlington, MA :
Name of publisher, distributor, etc. Syngress Pub.,
Date of publication, distribution, etc. c2009.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 372 p.:
Other physical details ill.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Access restricted by licensing agreement.
520 ## - SUMMARY, ETC.
Summary, etc. Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. * The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance. * This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record.
590 ## - LOCAL NOTE (RLIN)
Accession/Initials/Date of Entry B-035710/AMAKA/110417
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title SAP ERP.
9 (RLIN) 8595
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business enterprises
General subdivision Computer networks
-- Security measures.
9 (RLIN) 8596
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business information services
General subdivision Security measures.
9 (RLIN) 8597
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wun-Young, Leslie.
9 (RLIN) 8598
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hirao, Joey.
9 (RLIN) 8599
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title SAP security configuration and deployment.
Place, publisher, and date of publication Burlington, MA : Syngress Pub., c2009
International Standard Book Number 9781597492843
-- 1597492841
Record control number (DLC) 2008044540
-- (OCoLC)213839366
856 40 - ELECTRONIC LOCATION AND ACCESS
Link text Online book
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9781597492843
912 ## - Cataloguer Details
Cataloguer Details AMAKA
Keyed by AMAKA
Verified By SABA
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books,Booklets,Workbooks
949 ## - Local Processing Information
Book Location IBB LIBRARY GIDAN KWANO
Cutter Number .M674 1999
Barcode Number 2342107266
Copy Number NC-1
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Copy number Price effective from Koha item type
          IBB Library-Gidan Kwano IBB Library-Gidan Kwano 0000-00-00 local purchase B-035710 TK7871.85.M674 1999 2342107266 2017-04-11 nc-1 2017-04-11 Books,Booklets,Workbooks