Security, Audit and Control Features SAP R/3


Book Description

Current best practices and future trends in ERP issues are documented in a practical how-to guide to enable auditors and risk professionals (both IT and non-IT) to evaluate risks and controls in existing ERP implementations and to facilitate the design and building of better practice controls into system upgrades and enhancements. This is the first in a series of technical and risk management reference guides dealing with the world's three major ERP packages: SAP, Oracle Financials and PeopleSoft. SAP is one of the leading developers of enterprise applications worldwide. Its primary ERP product is SAP R/3. FAQs, audit programs, ICQs, references and tips for the assurance professional regarding SAP's Audit Information System and mySAP.com also are provided, making this publication an invaluable resource in today's environment. Call 1-847-253-1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.




Security and Data Protection with SAP Systems


Book Description

This official SAP book offers a complete overview of SAP security functions and their place in a company-wide security policy.










SAP Security Configuration and Deployment


Book Description

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise.This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations.Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. - The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance - This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes - Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP




Project Management


Book Description

Project Management covers the full range of issues of vital concern to IT managers working in today's hurry-up, budget-conscious business environment. The handbook provides valuable advice and guidance on how to get projects finished on-time, within budget, and to the complete satisfaction of users, whether a high-tech, low-tech, financial, manufacturing, or service organization. Project Management Handbook brings together contributions from an all-star team of more than 40 of experts working at leading enterprise organizations and consulting firms across America, and around the world. With the help of dozens of fascinating and instructive case studies and vignettes, reporting experiences in a wide range of business sectors, those experts share their insights and experience and extrapolate practicable guidelines and actions steps that project managers can put to work on their current projects.




Information Technology Control and Audit, Third Edition


Book Description

The headline-grabbing financial scandals of recent years have led to a great urgency regarding organizational governance and security. Information technology is the engine that runs modern organizations, and as such, it must be well-managed and controlled. Organizations and individuals are dependent on network environment technologies, increasing the importance of security and privacy. The field has answered this sense of urgency with advances that have improved the ability to both control the technology and audit the information that is the lifeblood of modern business. Reflects the Latest Technological Advances Updated and revised, this third edition of Information Technology Control and Audit continues to present a comprehensive overview for IT professionals and auditors. Aligned to the CobiT control objectives, it provides a fundamental understanding of IT governance, controls, auditing applications, systems development, and operations. Demonstrating why controls and audits are critical, and defining advances in technology designed to support them, this volume meets the increasing need for audit and control professionals to understand information technology and the controls required to manage this key resource. A Powerful Primer for the CISA and CGEIT Exams Supporting and analyzing the CobiT model, this text prepares IT professionals for the CISA and CGEIT exams. With summary sections, exercises, review questions, and references for further readings, it promotes the mastery of the concepts and practical implementation of controls needed to effectively manage information technology resources. New in the Third Edition: Reorganized and expanded to align to the CobiT objectives Supports study for both the CISA and CGEIT exams Includes chapters on IT financial and sourcing management Adds a section on Delivery and Support control objectives Includes additional content on audit and control of outsourcing, change management, risk management, and compliance