The issue you are reading concerns SAP Exploit. It was not easy for us to find the authors fluent in the
field and to collect the best quality articles that could be published. Still, we tried hard to meet your expectations for the best and most professional content of this month’s Exploiting Software. We want to assure you that the articles, its content and the method of addressing
SAP Exploit cannot be found anywhere else but in the issue you are currently looking at. We hope the knowledge you gain after reading Exploiting Software 01/2013 is useful and help you develop your skills.
We grouped the articles published in the issue into thematic sections. These are called: SAP Tools (the articles by Sergio Abraham, Ezequiel Gutesman, and Alexander Polyakov), SAP Resources (Derick Burton and Can John Guven’s publications) and Methods of Exploitation (in the papers of Moshe Panzer, Rodrigo Salvalagio and Luiz Milagres). The issue closes with the article by Natti Nachamias who describes the way to protect SAP Systems.