Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately.
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Slava Gomzin, CISSP, PCIP, ECSP, Security+ is the Security and Payments Technologist at Hewlett-Packard. Prior to joining HP, Slava was a security architect and PCI ISA, corporate product security officer, and R&D and application security manager at Retalix, a Division of NCR Retail.
Inhaltsangabe
Introduction xxiii Part I Anatomy of Payment Application Vulnerabilities 1 Chapter 1 Processing Payment Transactions 3 Chapter 2 Payment Application Architecture 25 Chapter 3 PCI 55 Part II Attacks on Point of Sale Systems 91 Chapter 4 Turning 40 Digits into Gold 93 Chapter 5 Penetrating Security Free Zones 125 Chapter 6 Breaking into PCI-protected Areas 147 Part III Defense 165 Chapter 7 Cryptography in Payment Applications 167 Chapter 8 Protecting Cardholder Data 195 Chapter 9 Securing Application Code 219 Conclusion 249 Appendix A POS Vulnerability Rank Calculator 251 Appendix B Glossary 257 Index 265
Introduction xxiii Part I Anatomy of Payment Application Vulnerabilities 1 Chapter 1 Processing Payment Transactions 3 Chapter 2 Payment Application Architecture 25 Chapter 3 PCI 55 Part II Attacks on Point of Sale Systems 91 Chapter 4 Turning 40 Digits into Gold 93 Chapter 5 Penetrating Security Free Zones 125 Chapter 6 Breaking into PCI-protected Areas 147 Part III Defense 165 Chapter 7 Cryptography in Payment Applications 167 Chapter 8 Protecting Cardholder Data 195 Chapter 9 Securing Application Code 219 Conclusion 249 Appendix A POS Vulnerability Rank Calculator 251 Appendix B Glossary 257 Index 265
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der Steintor 70. V V GmbH (zukünftig firmierend: buecher.de internetstores GmbH)
Geschäftsführung: Monica Sawhney | Roland Kölbl
Sitz der Gesellschaft: Hannover
Amtsgericht Hannover HRB 227001
Steuernummer: 321/neu