we have one parent role and we derived five roles from that and i assigned these derived roles to five users now i want to restrict 2 users for couple of T-codes and rest of the users work with those T-codes , How we can solve the problem
8 16423Security admin kept trace on a user.But while analyzing it is showing that "zero records" found.Then what to do?
4 13398Post New Cognizant SAP Security Interview Questions
What does ls lrt in unix?
For transporting data in the cloud, how you can you best secure data?
What types of data validation events are commonly seen in the client-side form validation?
what are the strength theories for yeilding and fracture materials. state the theory more suited for 1. mild steel or 2. concrete
How to add a check box or a dropdown list to a column in a datagrid?
What is password policy?
How can I tell if a site is using magento?
When the rendezvous point is insert?
What is a restricted user in SAP HANA system?
If a highly positively skewed variable has missing values and we replace them with mean, do we underestimate or overestimate the values?
Tell me what is blotch print?
Set on command is used for closed all opened files , initialize var and release resource , return cmd is used for return to calling program but my req. Is dnt close opened files and resource must released while doing transactions , how can i do this...?
What are the types of data validation?
What framework is used for performance testing/load testing?
What does odbc do in context with php?