Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Mastering Microsoft Dynamics NAV 2016
  • Toc
  • feedback
Mastering Microsoft Dynamics NAV 2016

Mastering Microsoft Dynamics NAV 2016

By : Sah
3.3 (3)
close
Mastering Microsoft Dynamics NAV 2016

Mastering Microsoft Dynamics NAV 2016

3.3 (3)
By: Sah

Overview of this book

The book begins by giving you a brief introduction to setting up your NAV environment and shows you how to install and configure it according to your requirements. You will then dive deep into the latest design patterns, network architecture, and topologies. We will show you how you can integrate NAV with the Microsoft platform, and secure your deployment by managing roles and permissions. Moving on, we will explain how to monitor and manage server instances using the Administration tool. We’ll discuss how you can take advantage of the expanded extensibility and connectivity capabilities for a tighter integration with the cloud as well as handheld devices. Then, we’ll show you how you can make use of the PowerBI capabilities that have been built into Dynamics NAV. By the end of the book, you will be confident in developing and administering a Dynamics NAV implementation that will leverage all of the new features.
Table of Contents (13 chapters)
close

Security updates


In this complex world of software engineering, it is essential that software works reliably and does not compromise the security or stability of the IT environment. When it comes to big programs like operating systems and Microsoft Dynamics NAV, it is even more important that the coordination between the developers is precise. To minimize any problems, programs are tested thoroughly in different phases of code and integrations testing before release. However, attackers continually strive to find weaknesses in software, so anticipating all future attacks is not always possible.

Whatever the nature and size of the organization, from large scale to small-sized ones, it is vital to have a good update management strategy, even if the organization does not yet have an effective change and configuration management in place. The vast majority of successful attacks against computer systems occur against those systems where security updates have not been installed or have not been...

bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete