In this new blog we (myself + Michael Sun) want to describe the usage of performing ABAP function module calls with SAP Data Intelligence using Custom ABAP Operators ...
With this article, we start the second section of Secure ABAP Development Guide called ‘Critical Calls’. Not only injection vulnerabilities are able to harm the systems but also some statements in ...
If you want to isolate your code under test from the components it uses, you need to take a look at what your depended-on component is. Each isolation technique for a specific kind of depended-on ...