|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn801816998 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
120726s2012 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d OCLCQ
|d SFB
|d DEBSZ
|d OCLCA
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d LIV
|d OCLCQ
|d CEF
|d OCLCQ
|d OCLCA
|d WYU
|d BRF
|d OCLCO
|d ORMDA
|d OCLCQ
|d ORMDA
|d OCLCO
|
019 |
|
|
|a 1351504084
|
020 |
|
|
|a 0738436569
|
020 |
|
|
|a 9780738436562
|
020 |
|
|
|z 9780738436562
|
029 |
1 |
|
|a AU@
|b 000050013194
|
029 |
1 |
|
|a AU@
|b 000053284447
|
029 |
1 |
|
|a DEBBG
|b BV040900443
|
029 |
1 |
|
|a DEBSZ
|b 37827130X
|
029 |
1 |
|
|a DEBSZ
|b 381364704
|
029 |
1 |
|
|a GBVCP
|b 785440461
|
035 |
|
|
|a (OCoLC)801816998
|z (OCoLC)1351504084
|
037 |
|
|
|a CL0500000153
|b Safari Books Online
|
037 |
|
|
|a 0738436569
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.59
|b I68 2012
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Integrating IBM security and SAP solutions /
|c Axel Buecker [and others].
|
260 |
|
|
|a [Poughkeepsie, NY?] :
|b IBM Corporation, International Technical Support Organization,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xviii, 410 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IBM redbooks
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM℗ʼ Redbooks℗ʼ publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli℗ʼ Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager. This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Business
|x Data processing
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Gestion
|x Informatique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Business
|x Data processing
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Bücker, Axel.
|
710 |
2 |
|
|a International Business Machines Corporation.
|b International Technical Support Organization.
|
776 |
0 |
8 |
|i Print version:
|a Bücker, Axel.
|t Integrating IBM security and SAP solutions.
|d Poughkeepsie, New York : IBM Corporation, International Technical Support Organization, 2012
|z 9780738436562
|
830 |
|
0 |
|a IBM redbooks.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0738436569/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|