whts the differents between SoX ,SoD??????wht kind of work Sox do as wel .....SoD do? whts is virsa??????? and VRAT,,,,VFAT,, how it workin security.
3 13173Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
3048two company codes ex 1001,1002 and two users ,one user need to access both company codes and another user need to access only one company code need to access by giving same role (one role ) to both of them.how can give access or restrict company codes in one role?
2 8395how to assign the selected transaction in role example in the role we have a Two transactions(T1,T2)so we have a users U1,U2. i need to assign the T1 and lock the T2 to U1, and U2 assign the bothT1,T2
1 4143How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.
2227Post New IBM SAP Security Interview Questions
What happens if number of reducers are 0?
What is the difference between database.insert and insert?
Can we add duplicate keys in a hashmap? What will happen if we attempt to add duplicate values?
how to call a dll as a COM dll?
How Secure SAP Hybris Is?
What does whoami do?
Is tomcat good for production?
How do you do shell scripting in linux?
Is it possible to read/write files to-and-from PL/SQL?
Tell me what will be the output of an application engine to use component variables instead of state record?
Does imap sync deleted messages from server?
What is message contract in wcf?
Suppose you have to collect the first name, middle name and the last name of students from the below table. But, you observe that there few missing values either in the first name, middle name and the last name columns. How will you return the first non-null values?
What are the functional requirements that are used in the embedded systems?
What is use of UNNEST Function?