Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protecte...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Somerset
Wiley
2014
|
Ausgabe: | 1st ed |
Schlagworte: | |
Zusammenfassung: | Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (314 pages) |
ISBN: | 9781118810101 9781118810118 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043607422 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118810101 |9 978-1-118-81010-1 | ||
020 | |a 9781118810118 |c Print |9 978-1-118-81011-8 | ||
035 | |a (ZDB-30-PQE)EBC1629175 | ||
035 | |a (ZDB-89-EBL)EBL1629175 | ||
035 | |a (ZDB-38-EBR)ebr10837558 | ||
035 | |a (OCoLC)874160809 | ||
035 | |a (DE-599)BVBBV043607422 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 332.1788028558 | |
100 | 1 | |a Gomzin, Slava |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking Point of Sale |b Payment Application Secrets, Threats, and Solutions |
250 | |a 1st ed | ||
264 | 1 | |a Somerset |b Wiley |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (314 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem | ||
650 | 4 | |a Computer hackers | |
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Computer security | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Gomzin, Slava |t Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions |
912 | |a ZDB-30-PQE |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029021481 |
Datensatz im Suchindex
_version_ | 1804176354267103232 |
---|---|
any_adam_object | |
author | Gomzin, Slava |
author_facet | Gomzin, Slava |
author_role | aut |
author_sort | Gomzin, Slava |
author_variant | s g sg |
building | Verbundindex |
bvnumber | BV043607422 |
collection | ZDB-30-PQE ZDB-38-ESG |
ctrlnum | (ZDB-30-PQE)EBC1629175 (ZDB-89-EBL)EBL1629175 (ZDB-38-EBR)ebr10837558 (OCoLC)874160809 (DE-599)BVBBV043607422 |
dewey-full | 332.1788028558 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 332 - Financial economics |
dewey-raw | 332.1788028558 |
dewey-search | 332.1788028558 |
dewey-sort | 3332.1788028558 |
dewey-tens | 330 - Economics |
discipline | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02828nmm a2200409zc 4500</leader><controlfield tag="001">BV043607422</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118810101</subfield><subfield code="9">978-1-118-81010-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118810118</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-118-81011-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1629175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1629175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10837558</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874160809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043607422</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">332.1788028558</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gomzin, Slava</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking Point of Sale</subfield><subfield code="b">Payment Application Secrets, Threats, and Solutions</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Somerset</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (314 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Gomzin, Slava</subfield><subfield code="t">Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029021481</subfield></datafield></record></collection> |
id | DE-604.BV043607422 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:51Z |
institution | BVB |
isbn | 9781118810101 9781118810118 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029021481 |
oclc_num | 874160809 |
open_access_boolean | |
physical | 1 online resource (314 pages) |
psigel | ZDB-30-PQE ZDB-38-ESG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Gomzin, Slava Verfasser aut Hacking Point of Sale Payment Application Secrets, Threats, and Solutions 1st ed Somerset Wiley 2014 © 2014 1 online resource (314 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem Computer hackers Computer networks -- Security measures Computer security Erscheint auch als Druck-Ausgabe Gomzin, Slava Hacking Point of Sale : Payment Application Secrets, Threats, and Solutions |
spellingShingle | Gomzin, Slava Hacking Point of Sale Payment Application Secrets, Threats, and Solutions Computer hackers Computer networks -- Security measures Computer security |
title | Hacking Point of Sale Payment Application Secrets, Threats, and Solutions |
title_auth | Hacking Point of Sale Payment Application Secrets, Threats, and Solutions |
title_exact_search | Hacking Point of Sale Payment Application Secrets, Threats, and Solutions |
title_full | Hacking Point of Sale Payment Application Secrets, Threats, and Solutions |
title_fullStr | Hacking Point of Sale Payment Application Secrets, Threats, and Solutions |
title_full_unstemmed | Hacking Point of Sale Payment Application Secrets, Threats, and Solutions |
title_short | Hacking Point of Sale |
title_sort | hacking point of sale payment application secrets threats and solutions |
title_sub | Payment Application Secrets, Threats, and Solutions |
topic | Computer hackers Computer networks -- Security measures Computer security |
topic_facet | Computer hackers Computer networks -- Security measures Computer security |
work_keys_str_mv | AT gomzinslava hackingpointofsalepaymentapplicationsecretsthreatsandsolutions |