He performed countless SAP code audits and has been researching security defects specific to SAP / ABAP applications. He has spoken several times at SAP TechEd and presented his SAP security research at security conferences like BlackHat, Hack In The Box …
Read full article here..
Related topicsSAP Resolves High Risk Flaws with February 2018 Patches
The 11 new notes impact Internet Graphics Server (IGS), NetWeaver System Landscape Directory, HANA Extended Application Services, ABAP File Interface, SAP CRM, ERP Financials Information […]What’s New In ABAP – Series 01, Episode 04 – Table Expressions
Whatever you can do with ‘Read’ you do it in a very short form of table expressions using ABAP 7.40. It is new way of […]Learn SAP Testing: Create your First SAP Test Case
… internal company processed many not be accurately mapped using the readily available SAP business transactions. In such cases custom code is created using ABAP. […]Journal Entry API & Extension – Implementing Custom Fields Using Substitution
The Journal Entry API uses communication arrangement SAP_COM_0002 which was configured as well in the … In this example, we’ll use a standard string function […]CV for SAP ABAP.docx
Share on Facebook, opens a new window Share on Twitter, opens a new window Share on LinkedIn Share by email, opens mail client Has experience […]