Microsoft Dynamics AX 2012 R3 Security

Nonfiction, Computers, Internet, Security, Application Software, Business Software
Cover of the book Microsoft Dynamics AX 2012 R3 Security by Ahmed Mohamed Rafik Moustafa, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Ahmed Mohamed Rafik Moustafa ISBN: 9781782175544
Publisher: Packt Publishing Publication: June 19, 2015
Imprint: Packt Publishing Language: English
Author: Ahmed Mohamed Rafik Moustafa
ISBN: 9781782175544
Publisher: Packt Publishing
Publication: June 19, 2015
Imprint: Packt Publishing
Language: English

Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakeholders to deal with business data smoothly and securely, avoiding security threats and raising their competencies in the market.

This book begins by providing you with the skills to develop security policies, permissions, and privileges using the AOT and secure tables. You will learn about the MorphX security system and customizing security and access permissions. Moving on, you will discover security mechanisms at the data level in tables. You will also learn to implement various security features, leading to best practices for setting up protection around your organization's valuable assets. By going step by step through every chapter, you will learn everything you need to configure the security of Microsoft Dynamics AX 2012 R3 to match your business needs.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakeholders to deal with business data smoothly and securely, avoiding security threats and raising their competencies in the market.

This book begins by providing you with the skills to develop security policies, permissions, and privileges using the AOT and secure tables. You will learn about the MorphX security system and customizing security and access permissions. Moving on, you will discover security mechanisms at the data level in tables. You will also learn to implement various security features, leading to best practices for setting up protection around your organization's valuable assets. By going step by step through every chapter, you will learn everything you need to configure the security of Microsoft Dynamics AX 2012 R3 to match your business needs.

More books from Packt Publishing

Cover of the book Unity iOS Game Development Beginners Guide by Ahmed Mohamed Rafik Moustafa
Cover of the book Mastering PHP Design Patterns by Ahmed Mohamed Rafik Moustafa
Cover of the book Microsoft System Center 2012 Service Manager Cookbook by Ahmed Mohamed Rafik Moustafa
Cover of the book Build Supercomputers with Raspberry Pi 3 by Ahmed Mohamed Rafik Moustafa
Cover of the book Migrating to Drupal 7 by Ahmed Mohamed Rafik Moustafa
Cover of the book SAP Lumira Essentials by Ahmed Mohamed Rafik Moustafa
Cover of the book Blockchain Developer's Guide by Ahmed Mohamed Rafik Moustafa
Cover of the book Programming Arduino with LabVIEW by Ahmed Mohamed Rafik Moustafa
Cover of the book Learning IBM Bluemix by Ahmed Mohamed Rafik Moustafa
Cover of the book Artificial Intelligence and Machine Learning Fundamentals by Ahmed Mohamed Rafik Moustafa
Cover of the book Mastering Predictive Analytics with R - Second Edition by Ahmed Mohamed Rafik Moustafa
Cover of the book Instant Pentaho Data Integration Kitchen by Ahmed Mohamed Rafik Moustafa
Cover of the book Odoo 11 Development Cookbook - Second Edition by Ahmed Mohamed Rafik Moustafa
Cover of the book Pentaho for Big Data Analytics by Ahmed Mohamed Rafik Moustafa
Cover of the book Implementing Domain-Specific Languages with Xtext and Xtend - Second Edition by Ahmed Mohamed Rafik Moustafa
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy