Low Price Guarantee
We Take School POs
SAP Businessobjects Bi Security: Keep Your Bobj Safe
Contributor(s): Ah-Soon, Christian (Author), Gonzalez, David François (Author)

View larger image

ISBN: 1592294375     ISBN-13: 9781592294374
Publisher: SAP Press
Retail: $79.95OUR PRICE: $58.36  
  Buy 25 or more:OUR PRICE: $53.57   Save More!
  Buy 100 or more:OUR PRICE: $51.17   Save More!


  WE WILL NOT BE UNDERSOLD!   Click here for our low price guarantee

Binding Type: Hardcover
Published: December 2012
* Out of Print *
Additional Information
BISAC Categories:
- Computers | Security - General
- Computers | Enterprise Applications - Business Intelligence Tools
Dewey: 005.8
LCCN: 2012037440
Physical Information: 562 pages
Features: Illustrated
 
Descriptions, Reviews, Etc.
Publisher Description:

"Don't talk to strangers"--if only data security policies were this easy. Learn to keep your SAP BusinessObjects Business Intelligence data truly safe from unauthorized actions with this comprehensive guide. Begin with security basics and work your way to advanced concepts; along the way, you'll explore functional and data security, define a rights model, and secure data sources and universes. Step-by-step instructions ensure that you can implement important security techniques in your administration and design work. This book puts the master key to data security in your hands.

1. Best Practices Unveiled Implement a security system that is easy to understand, use, and enhance by using basic workflows.

2. Rights Framework Put the rights framework to work for you using group and folder inheritance and custom access levels.

3. Specific Rights Explore the specific rights of system and content objects stored in the CMS repository, as well as BI 4.0 suite applications.

4. Universe Security Compare security features of universes created with Universe Design Tool side by side with its successor, Information Design Tool.

5. SAP NetWeaver BW, LDAP, and Active Directory Learn how to secure your SAP BusinessObjects BI 4.0 system using external authentication systems and data sources.

Highlights Include:

  • SAP NetWeaver BW, LDAP, and Active Directory authentication
  • Single sign-on
  • Rights framework and inheritance model
  • Access levels
  • General and specific rights
  • Secured connections
  • Universe security
  • Access restriction
  • Data and business security profile
  • Scheduling, publications, and personalization profile


Contributor Bio(s): Ah-Soon, Christian: - Christian Ah-Soon has worked for SAP BusinessObjects for 13 years as a program manager on areas like administration, security, internationalization, and installation. Christian holds a Ph.D. in computer science and graduated from TELECOM Nancy.Gonzalez, David Francois: - David François Gonzalez is an SAP BusinessObjects product expert engineer with the research and development group based in France. David has worked for SAP BusinessObjects for 13 years, starting with the BusinessObjects V5 and the Supervisor product and later managing a team in charge of BusinessObjects V6 suite testing. David shifted to customer contact with XI R2 and XI 3.1, where he was in charge of customer environment replication. Four years ago, he started working very close to both the field and the customers, providing best practices and white papers on internal and external websites. Since then, he has participated in conferences such as Utilisateurs SAP Francophones and TechEd, and he regularly helps customers troubleshoot site problems and implement SAP BusinessObjects solutions.
 
Customer ReviewsSubmit your own review
 
To tell a friend about this book, you must Sign In First!