Securing Information within SAP v4.6b

The following thoughts and best practices are the end result of an upgrade, experience with the necessary clean up after the cutover and review of best practices offered by third parties. In our upgrade, we implemented some additional levels of security from both a technical and process...
By
Lori Kirk
September 27, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg