Security for SAP S/4HANA, SAP ERP, the cloud, and more!

SAP System Security

$94.99

Available

$99.95

Available

$109.99

Available

Print edition E-book Bundle
622 pages, , Print edition hardcover
ISBN 978-1-4932-2774-7
622 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2775-4
622 pages, , Print edition hardcover
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2776-1
Stay ahead of security issues with this comprehensive guide! Get click-by-click instructions to configure the essential areas of SAP system security: application, database, platform, and infrastructure. Perform key tasks such as setting up user authentication, securing network protocols, and working with logs in your environment. Whether your system is on-premise or in the cloud, boost your security with expert advice to ensure it stays safe!
  • Configure application, platform, database, and infrastructure security
  • Set up identity and access management with user accounts, authorizations, and authentication
  • Secure SAP S/4HANA, SAP ERP, SAP Fiori, and cloud-based applications
About the E-book About the Book E-book in full color. PDF (32 MB) and EPUB (16 MB) files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application. 622 pages, hardcover, 1.44 in. Reference book format 7 x 10 in. Printed black and white on 50# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font. One-column layout.

In this book, you’ll learn about:

  1. Application Security

    Begin with an overview of user management and authentication. Design secure roles that meet your business and compliance needs. Set up single sign-on and learn to secure and manage access to your SAP Fiori apps.

  2. Database Security

    Protect your data with encryption. Use logging and monitoring transactions to secure your databases and stay ahead of unusual behavior.

  3. Platform Security

    Set up system parameters and understand how to control changes in your environment. Use change request management and Focused Build for SAP Solution Manager to securely change over your system, and keep an eye on events with SAP Enterprise Threat Detection.

  4. Infrastructure Security

    Establish access controls and learn to manage network connections using SAProuter. Get tips and best practices for securing cloud-based applications on SAP Business Technology Platform.

Highlights include:

  • SAP S/4HANA
  • SAP Fiori
  • Cloud applications
  • User management and authentication
  • Authorizations and role design
  • Logging and monitoring
  • Data security
  • Client security
  • Kernel security
  • Transport security

Dr. Pradeep Kumar Mishra began his professional journey as a university mathematics teacher before transitioning to computer science.

more >

You may also like:

  • Cover of Ethical Hacking

    Ethical Hacking
    The Practical Guide for Pentesting and Red Teaming

    Florian Dalwigk

    850 pages, paperback

    Is your IT system truly secure? There’s only one way to find out: learn to think like a hacker and test it yourself! You’ll start by understanding how to find vulnerabilities through techniques like footprinting, scanning, enumeration, and fuzzing. Then More about the book

    approx. $54.99

    Pre-order now
    Available on 05/27/2026

    E-book | Print edition | Bundle
  • Cover of Auditing SAP S/4HANA

    Auditing SAP S/4HANA

    Steve Biskie

    509 pages, hardcover

    Performing or preparing for an SAP S/4HANA audit? This is the comprehensive guide you need! Understand what goes into an audit, from the objectives and timing to the reporting process. Prepare an audit roadmap for the system as a whole, More about the book

    from $114.99

    Available

    E-book | Print edition | Bundle
  • Cover of Cybersecurity for SAP

    Cybersecurity for SAP

    Gaurav Singh, Juan Perez-Etchegoyen

    455 pages, hardcover

    Protect your SAP system from bad actors! Start by getting a thorough grounding in the why and what of cybersecurity before diving into the how. Create your security roadmap using tools like SAP’s secure operations map and the NIST Cybersecurity More about the book

    from $84.99

    Available

    E-book | Print edition | Bundle