PCI compliance: implementing effective PCI data security standards
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, Mass.
Syngress
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen. - Includes index Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs |
Beschreibung: | 1 Online-Ressource (xxii, 329 p.) |
ISBN: | 0080556388 9780080556383 9781597491655 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043045099 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080556388 |c electronic bk. |9 0-08-055638-8 | ||
020 | |a 9780080556383 |c electronic bk. |9 978-0-08-055638-3 | ||
020 | |a 9781597491655 |9 978-1-59749-165-5 | ||
035 | |a (OCoLC)298780450 | ||
035 | |a (DE-599)BVBBV043045099 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/0218 |2 22 | |
084 | |a ST 185 |0 (DE-625)143606: |2 rvk | ||
245 | 1 | 0 | |a PCI compliance |b implementing effective PCI data security standards |c Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors] |
264 | 1 | |a Burlington, Mass. |b Syngress |c c2007 | |
300 | |a 1 Online-Ressource (xxii, 329 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from title screen. - Includes index | ||
500 | |a Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what | ||
500 | |a Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Data protection / Standards |2 blmlsh | |
650 | 7 | |a Computer networks / Security measures |2 blmlsh | |
650 | 7 | |a Credit cards |2 blmlsh | |
650 | 7 | |a Liability for credit information |2 blmlsh | |
650 | 7 | |a Data protection / Standards |2 local | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 7 | |a Credit cards |2 local | |
650 | 7 | |a Liability for credit information |2 local | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Credit cards |2 fast | |
650 | 7 | |a Data protection / Standards |2 fast | |
650 | 7 | |a Liability for credit information |2 fast | |
650 | 4 | |a Data protection / Standards | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Credit cards | |
650 | 4 | |a Liability for credit information | |
650 | 4 | |a Data protection |x Standards | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Credit cards | |
650 | 4 | |a Liability for credit information | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chipkarte |0 (DE-588)4147723-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Chipkarte |0 (DE-588)4147723-6 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Bradley, Tony |e Sonstige |4 oth | |
700 | 1 | |a Burton, James D. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-59749-165-9 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214747 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469637 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214747 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214747 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175411616153600 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043045099 |
classification_rvk | ST 185 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)298780450 (DE-599)BVBBV043045099 |
dewey-full | 005.8/0218 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/0218 |
dewey-search | 005.8/0218 |
dewey-sort | 15.8 3218 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04974nmm a2200757zc 4500</leader><controlfield tag="001">BV043045099</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080556388</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055638-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080556383</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055638-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491655</subfield><subfield code="9">978-1-59749-165-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)298780450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043045099</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/0218</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 185</subfield><subfield code="0">(DE-625)143606:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">PCI compliance</subfield><subfield code="b">implementing effective PCI data security standards</subfield><subfield code="c">Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 329 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen. - Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection / Standards</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Credit cards</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Liability for credit information</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection / Standards</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Credit cards</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Liability for credit information</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Credit cards</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection / Standards</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Liability for credit information</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Credit cards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Liability for credit information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Credit cards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Liability for credit information</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chipkarte</subfield><subfield code="0">(DE-588)4147723-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Chipkarte</subfield><subfield code="0">(DE-588)4147723-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bradley, Tony</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Burton, James D.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-59749-165-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214747</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469637</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214747</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214747</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043045099 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:52Z |
institution | BVB |
isbn | 0080556388 9780080556383 9781597491655 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469637 |
oclc_num | 298780450 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxii, 329 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | PCI compliance implementing effective PCI data security standards Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors] Burlington, Mass. Syngress c2007 1 Online-Ressource (xxii, 329 p.) txt rdacontent c rdamedia cr rdacarrier Title from title screen. - Includes index Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Data protection / Standards blmlsh Computer networks / Security measures blmlsh Credit cards blmlsh Liability for credit information blmlsh Data protection / Standards local Computer networks / Security measures local Credit cards local Liability for credit information local Computer networks / Security measures fast Credit cards fast Data protection / Standards fast Liability for credit information fast Data protection / Standards Computer networks / Security measures Credit cards Liability for credit information Data protection Standards Computer networks Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Chipkarte (DE-588)4147723-6 gnd rswk-swf Chipkarte (DE-588)4147723-6 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Bradley, Tony Sonstige oth Burton, James D. Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 1-59749-165-9 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214747 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | PCI compliance implementing effective PCI data security standards COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Data protection / Standards blmlsh Computer networks / Security measures blmlsh Credit cards blmlsh Liability for credit information blmlsh Data protection / Standards local Computer networks / Security measures local Credit cards local Liability for credit information local Computer networks / Security measures fast Credit cards fast Data protection / Standards fast Liability for credit information fast Data protection / Standards Computer networks / Security measures Credit cards Liability for credit information Data protection Standards Computer networks Security measures Datensicherung (DE-588)4011144-1 gnd Chipkarte (DE-588)4147723-6 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4147723-6 |
title | PCI compliance implementing effective PCI data security standards |
title_auth | PCI compliance implementing effective PCI data security standards |
title_exact_search | PCI compliance implementing effective PCI data security standards |
title_full | PCI compliance implementing effective PCI data security standards Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors] |
title_fullStr | PCI compliance implementing effective PCI data security standards Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors] |
title_full_unstemmed | PCI compliance implementing effective PCI data security standards Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors] |
title_short | PCI compliance |
title_sort | pci compliance implementing effective pci data security standards |
title_sub | implementing effective PCI data security standards |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Data protection / Standards blmlsh Computer networks / Security measures blmlsh Credit cards blmlsh Liability for credit information blmlsh Data protection / Standards local Computer networks / Security measures local Credit cards local Liability for credit information local Computer networks / Security measures fast Credit cards fast Data protection / Standards fast Liability for credit information fast Data protection / Standards Computer networks / Security measures Credit cards Liability for credit information Data protection Standards Computer networks Security measures Datensicherung (DE-588)4011144-1 gnd Chipkarte (DE-588)4147723-6 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Data protection / Standards Computer networks / Security measures Credit cards Liability for credit information Data protection Standards Computer networks Security measures Datensicherung Chipkarte |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=214747 |
work_keys_str_mv | AT bradleytony pcicomplianceimplementingeffectivepcidatasecuritystandards AT burtonjamesd pcicomplianceimplementingeffectivepcidatasecuritystandards |