How to secure and monitor your SAP systems for cyber threats without third-party software
How to secure and monitor your SAP systems for cyber threats without third-party software
Publisher:
SAP Press
Date published:
2014
Record type:
Journal Title:
SAP Professional Journal
Source:
SAP Professional Journal, Volume 16, Update 4, 2014, pp. 50-56
Subject:
Abstract:
Secure your SAP systems from cyber attacks using SAP configuration validation.
Language:
Catagory URL:
CITATION: Dhillon, Aman. How to secure and monitor your SAP systems for cyber threats without third-party software . : SAP Press , 2014. SAP Professional Journal, Volume 16, Update 4, 2014, pp. 50-56 - Available at: https://library.au.int/how-secure-and-monitor-your-sap-systems-cyber-threats-without-third-party-software