文档介绍:Elsevier,Inc.,theauthor(s),andanypersonorfirminvolvedinthewriting,editing,orproduction(collectively“Makers”)ofthisbook(“theWork”),expressedorimplied,,,includinganylossofprofits,lostsavings,,,includingbackupandotherappropriateprecautions,works,data,®,Syngress®,“CareerAdvancementThroughSkillEnhancement®,”“AsktheAuthorUPDATE®,”and“HackProofing®,”areregisteredtrademarksofElsevier,Inc.“Syngress:TheDefinitionofaSeriousSecurityLibrary”™,“MissionCritical™,”and“TheOnlyWaytoStopaHackeristoThinkLikeOne™”aretrademarksofElsevier,,,,MA01803SAPSecurityConfigurationandDeploymentTheITAdministrator’sGuidetoBestPracticesCopyright©2009byElsevier,,nopartofthispublicationmaybereproducedordistributedinanyformorbyanymeans,orstoredinsdatabaseorretrievalsystem,withoutthepriorwrittenpermissionofthepublisher,withtheexceptionthattheprogramlistingsmaybeentered,stored,putersystem, 2 3 4 5 6 7 8 9 0ISBN13:978-1-59-749-284-3Publisher:LauraColantoniPageLayoutandArt:SPIAcquisitionsEditor:AndrewWilliamsCopyEditor:ChristinaSolstadTechnicalEditor:LeslieWun-YoungIndexer:SPIDevelopmentalEditor:GaryByrneCoverDesigner:MichaelKavishForinformationonrights,translations,andbulksales,mercialSalesDirectorandRights,atSyngressPublishing;