<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Process and procedure in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-process-and-procedure/m-p/3583193#M862636</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Naveen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security concept is very vast concept you can follow the sap library and i am giving the link of sap library &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please go trough it .In this topics each and every concept you have to see in depth and security implimentation is also like a &lt;STRONG&gt;ASAP&lt;/STRONG&gt; methodology. Follow the link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw70/helpdata/EN/52/6715a2439b11d1896f0000e8322d00/frameset.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw70/helpdata/EN/52/6715a2439b11d1896f0000e8322d00/frameset.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;removed by moderator&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raju.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edited by: Julius Bussche on Mar 17, 2008 3:05 PM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Mar 2008 14:25:18 GMT</pubDate>
    <dc:creator>Former Member</dc:creator>
    <dc:date>2008-03-17T14:25:18Z</dc:date>
    <item>
      <title>Security Process and procedure</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-process-and-procedure/m-p/3583191#M862634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can anyone explain about SAP security process and  procedure?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Naveen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Mar 2008 06:22:18 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-process-and-procedure/m-p/3583191#M862634</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-17T06:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Security Process and procedure</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-process-and-procedure/m-p/3583192#M862635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Naveen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security process and procedure are well explained in SAP Security Course books ADM940,ADM950,.,etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rakesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Mar 2008 14:24:08 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-process-and-procedure/m-p/3583192#M862635</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-17T14:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security Process and procedure</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/security-process-and-procedure/m-p/3583193#M862636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Naveen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security concept is very vast concept you can follow the sap library and i am giving the link of sap library &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please go trough it .In this topics each and every concept you have to see in depth and security implimentation is also like a &lt;STRONG&gt;ASAP&lt;/STRONG&gt; methodology. Follow the link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://help.sap.com/saphelp_nw70/helpdata/EN/52/6715a2439b11d1896f0000e8322d00/frameset.htm" target="test_blank"&gt;http://help.sap.com/saphelp_nw70/helpdata/EN/52/6715a2439b11d1896f0000e8322d00/frameset.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;removed by moderator&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raju.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edited by: Julius Bussche on Mar 17, 2008 3:05 PM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Mar 2008 14:25:18 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/security-process-and-procedure/m-p/3583193#M862636</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2008-03-17T14:25:18Z</dc:date>
    </item>
  </channel>
</rss>

