1. Tag Was ist DevOps?, Infrastruktur in Form von Code, Teil 1: Design und Sicherheit, Infrastruktur in Form von Code, Teil 2: CloudFormation und Konfigurationsmanagement2. Tag Continuous Integration in the Cloud, Continuous Delivery auf AWS, Bereits...
As with all programming languages, ABAP® based applications can contain security flaws. As a result of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn...
As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...
This class teaches you how to look for security vulnerabilities in ABAP® based business applications, understanding their root causes, what to do when you find them, and how to avoid creating them. In two four-hour sessions you will learn to detect c...
As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...
Foundations of FlowCreate Variables, Understand Algorithms, Explore Control Structures, Examine Flow Best PracticesScreen FlowsUse Elements and Resources, Control Field Visibility, Manage Data and Navigation, Surface a Flow, Complete the FlowRecord-T...