In this new blog we (myself + Michael Sun) want to describe the usage of performing ABAP function module calls with SAP Data Intelligence using Custom ABAP Operators ...
With this article, we start the second section of Secure ABAP Development Guide called ‘Critical Calls’. Not only injection vulnerabilities are able to harm the systems but also some statements in ...
If you want to isolate your code under test from the components it uses, you need to take a look at what your depended-on component is. Each isolation technique for a specific kind of depended-on ...
一部の結果でアクセス不可の可能性があるため、非表示になっています。
アクセス不可の結果を表示する