Muutke küpsiste eelistusi

CEH Certified Ethical Hacker All-in-One Exam Guide, Premium Third Edition with Online Practice Labs 3rd edition [Pehme köide]

  • Formaat: Paperback / softback, 464 pages, kõrgus x laius x paksus: 234x191x33 mm, kaal: 975 g
  • Ilmumisaeg: 16-Jan-2017
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 1260011178
  • ISBN-13: 9781260011173
Teised raamatud teemal:
  • Pehme köide
  • Hind: 204,39 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 464 pages, kõrgus x laius x paksus: 234x191x33 mm, kaal: 975 g
  • Ilmumisaeg: 16-Jan-2017
  • Kirjastus: McGraw-Hill Education
  • ISBN-10: 1260011178
  • ISBN-13: 9781260011173
Teised raamatud teemal:

Fully up-to-date coverage of every topic on the CEH v9 certification exam, plus one year of access* to the complete Ethical Hacker online lab environment from Practice Labs

Prepare for the EC Council's Certified Ethical Hacker v9 exam with complete confidence using this highly effective self-study system. CEH Certified Ethical Hacker All-in-One Exam Guide, Premium Third Edition with Online Practice Labs features the bestselling book by Matt Walker and one year of access to Practice Labs online lab training—carry out “real world” labs on real hardware simply accessed from a web browser. The Practice Labs platform offers an opportunity to work with industry standard technologies to help you develop a deeper understanding of the topics covered in the certification exam.

The one year of online access includes:

  • Real hardware and software needed to develop your practical skills—this is not a simulation but access to the actual equipment you would expect to find in any work place
  • CEH certification labs with clear lab steps—the associated lab guide provides realistic scenarios and step-by-step instructions
  • Real world configurations that provide sufficient hardware not only to carry out tasks but also to test the impact of those changes
  • Administrative access to the relevant devices, giving you complete control to carry out your own configurations or to follow the lab guide to configure specific technologies required for CEH
  • The ability to reset and start over with the click of a button—no fear of making mistakes!

Inside the book, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations. Topics include footprinting and reconnaissance, malware, hacking Web applications and mobile platforms, cloud computing vulnerabilities, and much more. Designed to help you pass the exam with ease, this authoritative resource will also serve as an essential on-the-job reference.

The book also includes:

  • Practice exam software with 300 practice questions (Windows only)
  • Secured book PDF

*For complete one-year access, initial registration must occur within the first two years of the Premium Third Edition’s date of publication.  

Acknowledgments xv
Introduction xvii
From the Author xxiv
Chapter 1 Getting Started: Essential Knowledge 1(42)
Security 101
2(20)
Essentials
2(10)
Security Basics
12(10)
Introduction to Ethical Hacking
22(11)
Hacking Terminology
22(6)
The Ethical Hacker
28(5)
Chapter Review
33(10)
Questions
37(3)
Answers
40(3)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker 43(36)
Footprinting
44(4)
Passive Footprinting
46(2)
Active Footprinting
48(1)
Footprinting Methods and Tools
48(23)
Search Engines
49(6)
Website and E-mail Footprinting
55(3)
DNS Footprinting
58(9)
Network Footprinting
67(3)
Other Tools
70(1)
Chapter Review
71(8)
Questions
74(2)
Answers
76(3)
Chapter 3 Scanning and Enumeration 79(52)
Fundamentals
80(13)
TCP/IP Networking
80(9)
Subnetting
89(4)
Scanning Methodology
93(18)
Identifying Targets
94(3)
Port Scanning
97(9)
Evasion
106(3)
Vulnerability Scanning
109(2)
Enumeration
111(9)
Windows System Basics
112(2)
Enumeration Techniques
114(6)
Chapter Review
120(11)
Questions
125(3)
Answers
128(3)
Chapter 4 Sniffing and Evasion 131(46)
Essentials
132(12)
Network Knowledge for Sniffing
132(11)
Active and Passive Sniffing
143(1)
Sniffing Tools and Techniques
144(9)
Techniques
144(5)
Tools
149(4)
Evasion
153(14)
Devices Aligned Against You
153(8)
Evasion Techniques
161(6)
Chapter Review
167(10)
Questions
172(3)
Answers
175(2)
Chapter 5 Attacking a System 177(40)
Getting Started
178(15)
Windows Security Architecture
178(9)
Linux Security Architecture
187(4)
Methodology
191(2)
Hacking Steps
193(17)
Authentication and Passwords
193(7)
Privilege Escalation and Executing Applications
200(3)
Hiding Files and Covering Tracks
203(7)
Chapter Review
210(7)
Questions
213(3)
Answers
216(1)
Chapter 6 Web-Based Hacking: Servers and Applications 217(38)
Web Servers
218(16)
Web Organizations
218(4)
Attack Methodology
222(1)
Web Server Architecture
223(6)
Web Server Attacks
229(5)
Attacking Web Applications
234(12)
Application Attacks
235(11)
Countermeasures
246(1)
Chapter Review
246(9)
Questions
250(3)
Answers
253(2)
Chapter 7 Wireless Network Hacking 255(32)
Wireless Networking
256(16)
Wireless Terminology, Architecture, and Standards
256(8)
Wireless Hacking
264(8)
The Mobile World
272(7)
Mobile Platforms and Attacks
274(3)
Mobile Attacks
277(2)
Chapter Review
279(8)
Questions
283(2)
Answers
285(2)
Chapter 8 Security in Cloud Computing 287(18)
Cloud Computing
288(11)
Cloud Security
292(3)
Threats and Attacks
295(4)
Chapter Review
299(6)
Questions
302(2)
Answers
304(1)
Chapter 9 Trojans and Other Attacks 305(34)
The "Malware" Attacks
306(13)
Trojans
308(5)
Viruses and Worms
313(6)
Remaining Attacks
319(9)
Denial of Service
320(3)
Session Hijacking
323(5)
Chapter Review
328(11)
Questions
334(2)
Answers
336(3)
Chapter 10 Cryptography 101 339(40)
Cryptography and Encryption Overview
340(11)
Encryption Algorithms and Techniques
341(10)
PKI, the Digital Certificate, and Digital Signatures
351(8)
The PM System
352(3)
Digital Certificates
355(3)
Digital Signatures
358(1)
Encrypted Communication and Cryptography Attacks
359(11)
Encrypted Communication
362(6)
Cryptography Attacks
368(2)
Chapter Review
370(9)
Questions
373(4)
Answers
377(2)
Chapter 11 Low Tech: Social Engineering and Physical Security 379(30)
Social Engineering
380(16)
Human-Based Attacks
381(6)
Computer-Based Attacks
387(7)
Mobile-Based Attacks
394(2)
Physical Security
396(7)
Physical Security 101
396(7)
Chapter Review
403(6)
Questions
405(3)
Answers
408(1)
Chapter 12 The Pen Test: Putting It All Together 409(18)
Methodology and Steps
410(12)
The Security Assessments
411(8)
Security Assessment Deliverables
419(1)
Guidelines
420(1)
More Terminology
420(2)
Chapter Review
422(5)
Questions
424(2)
Answers
426(1)
Appendix A Tool, Sites, and References 427(22)
Vulnerability Research Sites
427(1)
Footprinting Tools
428(2)
People Search Tools
428(1)
Competitive Intelligence
428(1)
Tracking Online Reputation
428(1)
Website Research/Web Updates Tools
429(1)
DNS and Whois Tools
429(1)
Traceroute Tools and Links
429(1)
Website Mirroring Tools and Sites
430(1)
E-mail Tracking
430(1)
Google Hacking
430(1)
Scanning and Enumeration Tools
430(5)
Ping Sweep
430(1)
Scanning Tools
431(1)
Banner Grabbing
431(1)
Vulnerability Scanning
432(1)
Network Mapping
432(1)
Proxy, Anonymizer, and Tunneling
432(1)
Enumeration
433(1)
SNMP Enumeration
433(1)
LDAP Enumeration
434(1)
NTP Enumeration
434(1)
Registry Tools
434(1)
Windows Service Monitoring Tools
434(1)
File/Folder Integrity Checkers
434(1)
System Hacking Tools
435(4)
Default Password Search Links
435(1)
Password Hacking Tools
435(1)
DoS/DDos
435(1)
Sniffing
436(1)
Keyloggers and Screen Capture
436(1)
Privilege Escalation
436(1)
Executing Applications
437(1)
Spyware
437(1)
Mobile Spyware
437(1)
Covering Tracks
438(1)
Packet Crafting/Spoofing
438(1)
Session Hijacking
438(1)
Clearing Tracks
438(1)
Cryptography and Encryption
439(1)
Encryption Tools
439(1)
Hash Tools
439(1)
Steganography
439(1)
Stego Detection
440(1)
Cryptanalysis
440(1)
Sniffing
440(1)
Packet Capture
440(1)
Wireless
441(1)
MAC Flooding/Spoofing
441(1)
ARP Poisoning
441(1)
Wireless
441(3)
Discovery
441(1)
Attack and Analysis
441(1)
Packet Sniffing
442(1)
WEP/WPA Cracking
442(1)
Bluetooth
442(1)
Mobile Attacks
442(1)
Mobile Wireless Discovery
443(1)
Mobile Device Tracking
443(1)
Rooting/Jailbreaking
443(1)
MDM
443(1)
Trojans and Malware
444(1)
Anti-Malware (AntiSpyware and Anitvirus)
444(1)
Crypters and Packers
444(1)
Monitoring Tools
444(1)
Attack Tools
445(1)
Web Attacks
445(1)
Attack tools
445(1)
SQL Injection
446(1)
Miscellaneous
446(1)
Cloud Security
446(1)
IDS
446(1)
Evasion Tools
446(1)
Pen Test Suites
447(1)
VPN/FW Scanner
447(1)
Social Engineering
447(1)
Extras
447(1)
Linux Distributions
447(1)
Tools, Sites, and References Disclaimer
447(2)
Appendix B About the Premium CD-ROM 449(2)
Practice Labs System Requirements
449(1)
Total Tester System Requirements
449(1)
Installing and Running Total Tester
449(1)
About Total Tester
450(1)
Lab Reference
450(1)
PDF Copy of the Book
450(1)
Technical Support
450(1)
Glossary 451(1890681913)
Index 4839781493212668
Preface 23(8)
1 Introduction to SAP Extended Warehouse Management 31(36)
1.1 The SAP Product Pyramid
31(3)
1.2 Introducing SAP Business Suite
34(6)
1.2.1 SAP Event Management
36(1)
1.2.2 SAP Supply Network Collaboration
37(1)
1.2.3 SAP Transportation Management
37(1)
1.2.4 SAP Demand Planning
38(1)
1.2.5 SAP Supply Network Planning
38(1)
1.2.6 SAP Production Planning and Detailed Scheduling
38(1)
1.2.7 SAP Service Parts Planning
39(1)
1.2.8 SAP Auto ID Enterprise
39(1)
1.2.9 SAP Extended Warehouse Management
40(1)
1.3 Warehouse Management in General
40(1)
1.4 Warehouse Management Solutions from SAP
41(2)
1.5 Comparing SAP Extended Warehouse Management and SAP ERP Warehouse Management
43(6)
1.5.1 Mapping a Warehouse Complex in a Warehouse Management System
43(1)
1.5.2 Functionalities
44(2)
1.5.3 Planning Capabilities
46(1)
1.5.4 Monitoring Capabilities
46(2)
1.5.5 Reporting and Analytics
48(1)
1.5.6 Output Management Capabilities
48(1)
1.5.7 Connect with Supporting Warehouse Technologies
49(1)
1.5.8 User Interfaces
49(1)
1.6 Business Benefits of SAP EWM
49(3)
1.7 Deployment Options of SAP EWM
52(2)
1.7.1 Deploying SAP EWM on SAP ERP
53(1)
1.7.2 Deploying SAP EWM on SAP Supply Chain Management
53(1)
1.8 ASAP 8 Implementation Methodology and SAP EWM
54(10)
1.8.1 Project Preparation
55(2)
1.8.2 Business Blueprint
57(3)
1.8.3 Realization
60(3)
1.8.4 Final Preparation
63(1)
1.8.5 Go-Live and Support
64(1)
1.8.6 Run SAP EWM
64(1)
1.9 Key Reference Points
64(1)
1.10 SAP EWM on SAP HANA
65(1)
1.11 Summary
65(2)
2 Organizational Structure and Definition 67(20)
2.1 Client
69(1)
2.2 Company Code
70(1)
2.3 Plant
71(1)
2.4 Storage Location
72(1)
2.5 Warehouse
73(12)
2.5.1 Overview of Warehouse
73(1)
2.5.2 Definition and Assignment of Warehouse-Specific Settings in SAP ERP
74(2)
2.5.3 Maintaining SAP EWM Parameters in SAP ERP
76(1)
2.5.4 Distribution Model Generation
77(2)
2.5.5 Define Queue for Transfer to SAP EWM
79(1)
2.5.6 Decentralized Warehouse Management System Integration
79(1)
2.5.7 Assignment of a Decentralized SAP Supply Chain Management System
80(1)
2.5.8 Delivery Split
80(2)
2.5.9 Warehouse Number Customizing
82(1)
2.5.10 Define and Assign the SAP EWM Warehouse Number
82(1)
2.5.11 SAP ERP and SAP EWM Warehouse Integration
83(2)
2.6 Summary
85(2)
3 Warehouse Structure 87(50)
3.1 SAP EWM and SAP ERP Linkage
89(1)
3.2 Storage Type
90(28)
3.2.1 General
91(9)
3.2.2 Putaway Control
100(11)
3.2.3 Stock Removal Control
111(4)
3.2.4 Goods Movement Control
115(2)
3.2.5 Replenishment
117(1)
3.3 Storage Section
118(1)
3.4 Storage Bin
119(10)
3.4.1 Storage Bin Types
119(1)
3.4.2 Bin Access Type
119(1)
3.4.3 Storage Bin Structure
120(1)
3.4.4 Storage Bin Master
121(2)
3.4.5 Loading Storage Bins
123(1)
3.4.6 Mass Changes to Storage Bins
124(1)
3.4.7 Generating Storage Bins
124(2)
3.4.8 Loading Storage Bins Sorting
126(1)
3.4.9 Sorting Storage Bins
126(1)
3.4.10 Fixed Bin Assignments
127(1)
3.4.11 Maintaining Verification Field
128(1)
3.4.12 Printing Labels for Storage Bins
129(1)
3.5 Staging Area
129(1)
3.6 Warehouse Door
130(1)
3.7 Activity Area
131(1)
3.8 Work Center
132(4)
3.8.1 Specify Work Center Layout
132(1)
3.8.2 Definition of Work Center
133(1)
3.8.3 Optimize Work Center Determination
134(1)
3.8.4 Definition of Master Data Attributes
135(1)
3.8.5 Determination of Work Center
135(1)
3.8.6 Work Center Print Control
135(1)
3.9 Summary
136(1)
4 Master Data 137(68)
4.1 Supply Chain Unit
139(2)
4.1.1 Maintaining a Supply Chain Unit
139(1)
4.1.2 Assignment of Supply Chain Units
140(1)
4.1.3 Supply Chain Unit Calendar Assignment
141(1)
4.2 Business Partners
141(11)
4.2.1 Maintain Business Partner Screen
143(3)
4.2.2 Plant
146(1)
4.2.3 Customer
146(2)
4.2.4 Vendor
148(1)
4.2.5 Party Entitled to Dispose
149(1)
4.2.6 Carrier
149(1)
4.2.7 Employee
150(1)
4.2.8 Miscellaneous Roles
150(2)
4.3 Warehouse Product Master
152(36)
4.3.1 Material Master in SAP ERP
152(7)
4.3.2 Product Master in SAP EWM
159(28)
4.3.3 SAP EWM-Specific Master Data Settings
187(1)
4.4 Transportation Data
188(4)
4.4.1 Prerequisite Configuration
188(1)
4.4.2 Transportation Hierarchy
189(1)
4.4.3 Transportation Lanes
190(1)
4.4.4 Transportation Zones
190(1)
4.4.5 Transportation Routes
190(1)
4.4.6 Carrier Profiles
191(1)
4.5 Packaging Materials
192(1)
4.6 Packaging Specifications
193(9)
4.6.1 Structure of Packaging Specification
194(3)
4.6.2 Maintain Packaging Specification
197(1)
4.6.3 Initial Data Transfer of Packaging Specification
198(1)
4.6.4 Determination of Packaging Specification
199(2)
4.6.5 Activating the Packaging Specification
201(1)
4.6.6 Distribution of Packaging Specifications
201(1)
4.7 Route Determination
202(1)
4.8 Summary
203(2)
5 Cross-Process Definitions 205(74)
5.1 Handling Units
205(14)
5.1.1 Handling Unit Configuration Settings in SAP Extended Warehouse Management
207(5)
5.1.2 Packing Materials and Specifications
212(1)
5.1.3 Post Processing Framework Customizing for Handling Unit Printing
213(1)
5.1.4 Automatic Packing in Inbound Delivery
214(1)
5.1.5 Packing during Warehouse Task Confirmation
215(1)
5.1.6 Status Management
216(1)
5.1.7 Packing and Deconsolidation Using Radio Frequency
217(2)
5.2 Warehouse Order
219(9)
5.2.1 Warehouse Order Overview
219(2)
5.2.2 Warehouse Order Settings
221(7)
5.3 Storage Control
228(5)
5.3.1 Storage Control Overview
228(2)
5.3.2 Process-Oriented Storage Control
230(2)
5.3.3 Layout-Oriented Storage Control
232(1)
5.4 Exception Handling
233(6)
5.4.1 Configuring Exception Codes
234(4)
5.4.2 Exception Code Profile Assignment
238(1)
5.4.3 Maintain Business Context
238(1)
5.5 Batch Management
239(6)
5.5.1 Batch Management-Specific Configuration
240(3)
5.5.2 Batch Management in Goods Receipt
243(1)
5.5.3 Batch Management in Goods Issue
244(1)
5.5.4 Batch Status Management
244(1)
5.5.5 Documentary Batch Management
244(1)
5.6 Stock Identification
245(3)
5.6.1 Usage of Stock Identification
246(1)
5.6.2 Splitting Warehouse Tasks
247(1)
5.6.3 Splitting Stock in Goods Receipt
247(1)
5.6.4 Splitting Stock in Goods Issue
247(1)
5.7 Resource Management
248(11)
5.7.1 Queue Definition
248(2)
5.7.2 Resource
250(2)
5.7.3 Definition and Execution of Resource Execution Constraints
252(3)
5.7.4 Maintain Resource Group
255(1)
5.7.5 Maintain the Queue Sequence for Resource Groups
255(1)
5.7.6 Maintain Resource
256(1)
5.7.7 Maintain Execution Priorities
256(1)
5.7.8 Maintain Users
257(1)
5.7.9 Processor
257(1)
5.7.10 System-Guided Using Resource Management
258(1)
5.7.11 Resource Monitoring
258(1)
5.8 Post Processing Framework
259(8)
5.8.1 Purpose of the Post Processing Framework
260(1)
5.8.2 Structure of the Post Processing Framework
260(2)
5.8.3 Configuring the Post Processing Framework
262(2)
5.8.4 Printing via Post Processing Framework
264(3)
5.9 Travel Distance Calculation
267(3)
5.9.1 Settings for Travel Distance Calculation
268(1)
5.9.2 Examples of Travel Distance Calculation
269(1)
5.9.3 Network Generation
270(1)
5.10 Serial Number Management
270(9)
5.10.1 Serial Number Profile
272(2)
5.10.2 Provisional Serial Number
274(1)
5.10.3 Settings/Configuration
274(1)
5.10.4 Serial Number in Deliveries
275(1)
5.10.5 Serial Number in a Warehouse Task
276(1)
5.10.6 Serial Number in the Warehouse Monitor
276(1)
5.11 Summary
277(2)
6 Integrating SAP Extended Warehouse Management with SAP ERP 279(26)
6.1 Dependency of Systems on Business Scenarios
279(5)
6.1.1 Application Link Enabling
281(1)
6.1.2 Intermediate Document
281(1)
6.1.3 Remote Function Call
282(2)
6.2 Settings
284(8)
6.2.1 Basic Settings
284(2)
6.2.2 General Settings
286(3)
6.2.3 Delivery Settings and Integration
289(1)
6.2.4 Goods Movement Mapping
290(1)
6.2.5 Map Storage Locations
290(1)
6.2.6 Customer-Specific Movement Types
290(1)
6.2.7 Transportation Settings
291(1)
6.3 Data Load Systems
292(1)
6.4 Migration from LE-WM
292(7)
6.4.1 Warehouse Product Migration
293(1)
6.4.2 Storage Bin Migration
294(2)
6.4.3 Stock Migration
296(1)
6.4.4 Physical Inventory Completeness Migration
297(1)
6.4.5 Map Storage Unit Type to Packaging Material
298(1)
6.4.6 Map Warehouse Management Unit of Measure to Packaging Material
298(1)
6.5 Master Data Integration between SAP ERP and SAP EWM
299(4)
6.5.1 Basic Setup
299(1)
6.5.2 Integration of Master Data via CIF
299(4)
6.5.3 Integration of Master Data via IDoc
303(1)
6.6 Logistics Inventory Management Engine
303(1)
6.7 Summary
303(2)
7 Inbound Processing 305(64)
7.1 Basic Setup for Inbound Delivery Processing
306(12)
7.1.1 Introduction to Document and Item Categories
307(1)
7.1.2 Defining Document Types
308(2)
7.1.3 Defining Item Type
310(1)
7.1.4 Document Type and Item Type Mapping from SAP ERP to SAP EWM
311(2)
7.1.5 Determining Document Types and Item Types in SAP EWM
313(1)
7.1.6 Existence Check of Packaging Specification
314(2)
7.1.7 Batch Management and Remaining Shelf Life Check in the Inbound Delivery
316(1)
7.1.8 Defining Print Profiles
317(1)
7.2 General SAP EWM Delivery Document Structure
318(4)
7.3 Inbound Delivery Notification
322(6)
7.3.1 Inbound Delivery Notification against Advance Shipping Notice
324(3)
7.3.2 Notification Delivery in SAP EWM for the Purchase Order/Production Order
327(1)
7.4 Inbound Delivery in SAP EWM
328(4)
7.5 Communication between SAP EWM and SAP ERP
332(1)
7.6 Check-In Process
333(5)
7.7 Unloading and Goods Receipt
338(4)
7.7.1 Unloading
340(1)
7.7.2 Goods Receipt
341(1)
7.8 Putaway Processing
342(20)
7.8.1 Configuration Setup for Putaway
343(1)
7.8.2 Putaway Rules
344(2)
7.8.3 Availability Group Configuration for Putaway
346(3)
7.8.4 Process-Oriented Storage Control for Inbound Processes
349(4)
7.8.5 Layout-Oriented Storage Control for Inbound Processes
353(2)
7.8.6 Deconsolidation Process
355(2)
7.8.7 Value-Added Services for Inbound Processes
357(1)
7.8.8 Final Putaway
358(4)
7.9 Check-Out Process
362(1)
7.10 Expected Goods Receipt
363(2)
7.10.1 Push/Pull Expected Goods Receipt from SAP EWM
363(1)
7.10.2 Maintaining the Expected Goods Receipt Notification
364(1)
7.10.3 Maintaining the Expected Goods Receipt
364(1)
7.11 Stock-Specific Unit of Measure in the Inbound Process
365(1)
7.12 Summary
366(3)
8 Advanced Production Integration 369(18)
8.1 Master Data and Settings for Advanced Production Integration
371(5)
8.1.1 Define Production Supply Areas
374(1)
8.1.2 Mapping and Replication of Production Supply Areas
374(1)
8.1.3 Assignment of Bin to Production Supply Area
375(1)
8.2 Integration of Production Supply in SAP EWM
376(1)
8.3 Component Staging for Production
377(1)
8.4 Batches in Staging and Consumption
378(1)
8.5 Catch Weight in Staging and Consumption
379(1)
8.6 Staging and Consumption
379(1)
8.7 Receipt from Production
380(1)
8.8 Consumption Posting/Back Flushing for Production Supply
381(1)
8.9 Goods Issue for Production Supply
382(1)
8.10 Goods Receipt from Production
383(2)
8.10.1 Receipt from Production in Advanced Production Integration
383(1)
8.10.2 Receipt of Handling Units from Production
384(1)
8.11 Summary
385(2)
9 Outbound Processing 387(48)
9.1 Basic Setup for Outbound Delivery Processing
389(7)
9.1.1 Document Type and Item Type Mapping
389(2)
9.1.2 Route Determination
391(1)
9.1.3 Batch Management in the Outbound Delivery
391(1)
9.1.4 Warehouse Process Type Determination
392(2)
9.1.5 Warehouse Order Creation for Outbound Delivery
394(1)
9.1.6 Storage Control in Outbound Processes
394(2)
9.2 Stock Removal Strategy Definition
396(3)
9.2.1 Storage Type Determination
397(1)
9.2.2 Storage Type Search Sequence Determination
398(1)
9.3 Stock Determination and Valuation
399(2)
9.3.1 Stock Determination
400(1)
9.3.2 Stock Valuation
401(1)
9.4 Wave Management
401(4)
9.4.1 Wave Templates
403(1)
9.4.2 Wave Template Attributes
403(2)
9.5 Door and Staging Area Determination
405(3)
9.6 Outbound Delivery Creation
408(7)
9.6.1 Overview of the Outbound Delivery Process
408(2)
9.6.2 Direct Outbound Delivery Process
410(4)
9.6.3 Outbound Process with Cartonization Planning
414(1)
9.7 Check-In/Check-Out Process
415(2)
9.8 Picking and Loading Execution
417(11)
9.8.1 Execution with the Pick List
418(2)
9.8.2 Execution with Mobile Devices
420(2)
9.8.3 Pick Denial/Handling Differences in Picking
422(1)
9.8.4 Packing
423(3)
9.8.5 Pick, Pack, and Pass
426(2)
9.9 Invoice before Goods Issue
428(2)
9.10 Post Goods Issue
430(1)
9.11 Stock-Specific Unit of Measure in the Outbound Process
431(1)
9.12 Canceling Outbound Delivery
431(3)
9.13 Summary
434(1)
10 Shipping and Receiving 435(28)
10.1 Yard Management
435(12)
10.1.1 Yard Management Activities
436(1)
10.1.2 Activation of Yard Management
437(1)
10.1.3 Yard Structure
438(3)
10.1.4 Yard Organizational Units Definition and Bin Assignments
441(2)
10.1.5 Transportation Unit
443(2)
10.1.6 Vehicles
445(1)
10.1.7 Check-In and Check-Out
445(1)
10.1.8 Functions of Yard Management
446(1)
10.1.9 Yard Monitoring
446(1)
10.1.10 Yard Activity Updates in SAP ERP
447(1)
10.2 Transportation Units and Vehicles
447(3)
10.3 Transportation Management Linkage with SAP EWM
450(6)
10.3.1 Basics
452(1)
10.3.2 SAP TM Interfaces
452(2)
10.3.3 Maintain Shipments
454(1)
10.3.4 Maintain Freight Documents
455(1)
10.4 Staging Area and Door Determination (Inbound/Outbound)
456(3)
10.5 Transit Warehousing
459(1)
10.6 Summary
460(3)
11 Physical Inventory 463(30)
11.1 Physical Inventory Types
464(2)
11.1.1 Periodic Inventory
465(1)
11.1.2 Cycle Counting
465(1)
11.1.3 Continuous Inventory
465(1)
11.1.4 Sampling
466(1)
11.2 Physical Inventory Procedures
466(3)
11.2.1 Ad Hoc Physical Inventory
467(1)
11.2.2 Annual Physical Inventory
467(1)
11.2.3 Cycle Counting
467(1)
11.2.4 Storage Bin Check
468(1)
11.2.5 Low Stock Check
468(1)
11.2.6 Zero Stock Check
469(1)
11.2.7 Putaway Physical Inventory
469(1)
11.2.8 External Procedure
469(1)
11.3 Physical Inventory Settings
469(9)
11.3.1 Physical Inventory Area-Specific Settings
470(1)
11.3.2 Warehouse-Specific Settings
471(6)
11.3.3 Printing Physical Inventory Documents
477(1)
11.4 Physical Inventory Process
478(7)
11.4.1 Create a Physical Inventory Document
479(3)
11.4.2 Process Physical Inventory
482(1)
11.4.3 Difference Analyzer
483(1)
11.4.4 Stock Comparison with SAP ERP
484(1)
11.4.5 Post Differences Automatically to SAP ERP System
484(1)
11.5 Stock-Specific Unit of Measure in Physical Inventory
485(2)
11.6 Physical Inventory Counting via Radio Frequency
487(1)
11.7 Reporting
488(3)
11.7.1 Reports in Physical Inventory
488(2)
11.7.2 Physical Inventory Progress Report
490(1)
11.7.3 Physical Inventory Count Overview
490(1)
11.7.4 Physical Inventory Document Overview
491(1)
11.8 Summary
491(2)
12 Internal Movements 493(30)
12.1 Replenishment
493(14)
12.1.1 Replenishment Configuration
494(5)
12.1.2 Replenishment Strategies
499(8)
12.2 Rearrangement
507(4)
12.2.1 Rearrangement Configuration
507(2)
12.2.2 Slotting Data
509(1)
12.2.3 Performing Slotting and Rearrangement
509(1)
12.2.4 Alerts for Rearrangement
510(1)
12.3 Stock Transfer
511(3)
12.3.1 Document Type and Item Type Mapping
511(1)
12.3.2 Internal Stock Transfer Process
512(2)
12.4 Ad Hoc Movements
514(2)
12.4.1 Creation of Ad Hoc Warehouse Tasks
514(1)
12.4.2 Execution of Ad Hoc Warehouse Tasks
514(2)
12.5 Posting Changes
516(6)
12.5.1 Planned Posting Change from SAP ERP
517(1)
12.5.2 Basic Settings
517(3)
12.5.3 Direct Posting Change
520(1)
12.5.4 Processing Posting Changes
520(1)
12.5.5 Automatic Posting Change
521(1)
12.6 Summary
522(1)
13 Warehouse Monitoring 523(22)
13.1 Warehouse Management Monitor
524(13)
13.1.1 Understanding the Warehouse Management Monitor
525(9)
13.1.2 Configuring the Monitoring Tree
534(1)
13.1.3 Customizing Warehouse Monitor Nodes
535(2)
13.2 Easy Graphics Framework
537(3)
13.2.1 Warehouse Cockpit
538(2)
13.3 Graphical Warehouse Layout
540(2)
13.4 Alerts
542(1)
13.5 Summary
543(2)
14 Radio Frequency Framework 545(18)
14.1 Basic Settings
546(11)
14.1.1 Logical Transactions
546(7)
14.1.2 RF Menu and Screen Manager
553(2)
14.1.3 Verification Control
555(1)
14.1.4 Assign Presentation Profile to Warehouse
556(1)
14.1.5 RF Function Keys
556(1)
14.2 RF Navigation
557(3)
14.2.1 Standard Navigation
557(1)
14.2.2 Direct Navigation
558(1)
14.2.3 Virtual Navigation
559(1)
14.3 Processing Using RF
560(1)
14.4 SAP Solutions for Auto-ID and Item Serialization
561(1)
14.5 Summary
562(1)
15 Labor Management 563(24)
15.1 Labor Management Activation
564(6)
15.1.1 Employee Master
566(1)
15.1.2 Formulas and Conditions
567(3)
15.2 Engineered Labor Standards
570(4)
15.2.1 Determining Engineered Labor Standards
571(2)
15.2.2 Uploading Engineered Labor Standards
573(1)
15.3 Direct Labor Activities
574(3)
15.4 Indirect Labor Activities
577(2)
15.4.1 Create External Storage Process Steps for Indirect Labor
577(1)
15.4.2 Capturing Indirect Labor efforts
577(2)
15.5 Planning and Simulation
579(3)
15.5.1 Workload Planning for Active Documents
580(1)
15.5.2 Preprocessing
580(1)
15.5.3 View Planned Workload Data
581(1)
15.5.4 Simulation
582(1)
15.6 Employee Performance
582(2)
15.6.1 Employee Performance Documents
583(1)
15.6.2 Transfer Performance Documents to Human Resources
583(1)
15.7 Labor Demand Planning
584(1)
15.8 Summary
585(2)
16 Quality Management 587(22)
16.1 Quality Inspection Engine Architecture
588(1)
16.2 Quality Inspection Engine Data
589(1)
16.3 Customizing Quality Management
590(3)
16.4 Quality Management Master Data
593(2)
16.4.1 Warehouse-Specific Quality Management Data
593(1)
16.4.2 Maintain Inspection Rule
594(1)
16.4.3 Sample-Drawing Procedure
594(1)
16.4.4 Maintain Quality Level
595(1)
16.4.5 Dynamic Modification
595(1)
16.5 Inspection Object Type
595(2)
16.6 Quality Inspection Groups
597(1)
16.7 Quality Inspection Process
597(5)
16.7.1 Recurring Inspections
598(1)
16.7.2 Acceptance Sampling
599(1)
16.7.3 Presampling in Production
600(1)
16.7.4 Goods Receipt Control
601(1)
16.8 Quality Inspection Document Creation
602(1)
16.9 Inspection Decision Recording
602(1)
16.10 Follow-Up Actions
602(1)
16.11 Warehouse Inspection Monitoring
603(1)
16.12 Quality Inspection Using Radio Frequency
604(1)
16.13 Quality Inspection in Returns Management
605(2)
16.13.1 Returns in the Distribution Network
606(1)
16.13.2 Advance Returns Management
606(1)
16.14 Summary
607(2)
17 Value-Added Services 609(22)
17.1 Configuration
611(4)
17.1.1 Product Group Type and Product Group
611(1)
17.1.2 Setting Up Value-Added Service Relevance
612(2)
17.1.3 Maintaining Value-Added Service Settings for a Warehouse
614(1)
17.2 Master Data
615(5)
17.2.1 Maintaining the Material Master
615(3)
17.2.2 Creation of Packaging Specification for Value-Added Services
618(2)
17.3 Warehouse Processes
620(5)
17.3.1 Goods Receipts Process
621(2)
17.3.2 Goods Issue Process
623(1)
17.3.3 Internal Warehouse Processes
624(1)
17.4 Orders
625(2)
17.5 Value-Added Services Execution Using the Work Center
627(1)
17.6 Auxiliary Product Consumption Posting
628(1)
17.7 Summary
629(2)
18 Cross-Docking 631(20)
18.1 Planned Cross-Docking
632(10)
18.1.1 Transportation Cross-Docking
634(3)
18.1.2 Merchandise Cross-Docking
637(5)
18.2 Opportunistic Cross-Docking
642(6)
18.2.1 Push Deployment and Pick from Goods Receipt
642(2)
18.2.2 SAP EWM-Triggered Opportunistic Cross-Docking
644(4)
18.3 Exceptions in Cross-Docking
648(1)
18.4 Summary
648(3)
19 Material Flow System 651(16)
19.1 Structure of MFS
652(4)
19.1.1 Programmable Logic Controller
653(1)
19.1.2 Communication Channel
653(1)
19.1.3 Communication Point
654(1)
19.1.4 Conveyor Segment
654(1)
19.1.5 Resources
655(1)
19.2 Setting Up the Material Flow System
656(2)
19.3 Repeating or Resending an Acknowledgment Telegram
658(1)
19.3.1 Telegram Repetition and Channel Check
658(1)
19.3.2 Reprocessing Incoming Telegrams
659(1)
19.3.3 Periodic Custom Logic
659(1)
19.4 Material Flow System in the Warehouse Management Monitor
659(1)
19.5 Exception Handling in the Material Flow System
660(1)
19.6 Material Flow System in the Easy Graphics Framework
660(1)
19.7 Material Flow System for Case Conveyor Systems
661(4)
19.7.1 Setting Up Material Flow Systems for Case Conveyor Systems
661(1)
19.7.2 Putaway and Stock Removal Strategy
662(1)
19.7.3 Handling Unit Movements
663(1)
19.7.4 Routing for Case Conveyor Systems
664(1)
19.7.5 Material Flow System Actions for Case Conveyor Systems
664(1)
19.7.6 Process Examples
665(1)
19.8 Summary
665(2)
20 Kitting 667(12)
20.1 Kit to Order Using Sales Orders
669(5)
20.1.1 Kit to Order Using Sales Orders in SAP CRM
670(1)
20.1.2 Kit to Order Using Sales Orders in SAP ERP
671(3)
20.2 Kit to Stock
674(1)
20.2.1 Kit to Stock Using Production Orders
674(1)
20.2.2 Kit to Stock Initiated from VAS in SAP EWM
675(1)
20.3 Reverse Kitting
675(1)
20.4 Summary
676(3)
21 Dock Appointment Scheduling 679(10)
21.1 SAP Dock Appointment Scheduling Settings
680(1)
21.2 Docking Locations and Loading Points
681(2)
21.2.1 Docking Location
681(1)
21.2.2 Loading Points
682(1)
21.3 Appointment Management
683(3)
21.3.1 Alliance with Carriers
683(1)
21.3.2 Integration with SAP EWM
683(3)
21.4 Summary
686(3)
22 User Maintenance and Archiving 689(10)
22.1 Roles for SAP EWM
689(7)
22.1.1 Standard Roles
691(3)
22.1.2 Identity Management Integration
694(1)
22.1.3 Roles for Dock Appointment Scheduling
694(2)
22.2 Data Archiving
696(1)
22.3 Summary
697(2)
Conclusion 699(2)
The Authors 701(2)
Index 703
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).