PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new P...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Ausgabe: | 4th ed |
Schlagworte: | |
Zusammenfassung: | Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information. Completely updated to follow the most current PCI DSS standard, version 3.0Packed with help to develop and implement an effective strategy to keep infrastructure compliant and secureIncludes coverage of new and emerging technologies such as NFC, P2PE, CNP/Mobile, and EMVBoth authors have broad information security backgrounds, including extensive PCI DSS experience |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (386 pages) |
ISBN: | 9780128016510 9780128015797 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043613391 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128016510 |9 978-0-12-801651-0 | ||
020 | |a 9780128015797 |c Print |9 978-0-12-801579-7 | ||
035 | |a (ZDB-30-PQE)EBC1832710 | ||
035 | |a (ZDB-89-EBL)EBL1832710 | ||
035 | |a (ZDB-38-EBR)ebr10989017 | ||
035 | |a (OCoLC)897934305 | ||
035 | |a (DE-599)BVBBV043613391 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Williams, Branden R. |e Verfasser |4 aut | |
245 | 1 | 0 | |a PCI Compliance |b Understand and Implement Effective PCI Data Security Standard Compliance |
250 | |a 4th ed | ||
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (386 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information. Completely updated to follow the most current PCI DSS standard, version 3.0Packed with help to develop and implement an effective strategy to keep infrastructure compliant and secureIncludes coverage of new and emerging technologies such as NFC, P2PE, CNP/Mobile, and EMVBoth authors have broad information security backgrounds, including extensive PCI DSS experience | ||
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Data protection -- Standards | |
700 | 1 | |a Chuvakin, Anton |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Williams, Branden R |t . PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029027450 |
Datensatz im Suchindex
_version_ | 1804176357123424256 |
---|---|
any_adam_object | |
author | Williams, Branden R. |
author_facet | Williams, Branden R. |
author_role | aut |
author_sort | Williams, Branden R. |
author_variant | b r w br brw |
building | Verbundindex |
bvnumber | BV043613391 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1832710 (ZDB-89-EBL)EBL1832710 (ZDB-38-EBR)ebr10989017 (OCoLC)897934305 (DE-599)BVBBV043613391 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 4th ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03126nmm a2200409zc 4500</leader><controlfield tag="001">BV043613391</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128016510</subfield><subfield code="9">978-0-12-801651-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128015797</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-801579-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1832710</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1832710</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10989017</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)897934305</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043613391</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Williams, Branden R.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">PCI Compliance</subfield><subfield code="b">Understand and Implement Effective PCI Data Security Standard Compliance</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4th ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (386 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information. Completely updated to follow the most current PCI DSS standard, version 3.0Packed with help to develop and implement an effective strategy to keep infrastructure compliant and secureIncludes coverage of new and emerging technologies such as NFC, P2PE, CNP/Mobile, and EMVBoth authors have broad information security backgrounds, including extensive PCI DSS experience</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection -- Standards</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chuvakin, Anton</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Williams, Branden R</subfield><subfield code="t">. PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029027450</subfield></datafield></record></collection> |
id | DE-604.BV043613391 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:54Z |
institution | BVB |
isbn | 9780128016510 9780128015797 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029027450 |
oclc_num | 897934305 |
open_access_boolean | |
physical | 1 online resource (386 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Williams, Branden R. Verfasser aut PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance 4th ed Saint Louis Elsevier Science 2014 © 2015 1 online resource (386 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information. Completely updated to follow the most current PCI DSS standard, version 3.0Packed with help to develop and implement an effective strategy to keep infrastructure compliant and secureIncludes coverage of new and emerging technologies such as NFC, P2PE, CNP/Mobile, and EMVBoth authors have broad information security backgrounds, including extensive PCI DSS experience Computer networks -- Security measures Data protection -- Standards Chuvakin, Anton Sonstige oth Erscheint auch als Druck-Ausgabe Williams, Branden R . PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance |
spellingShingle | Williams, Branden R. PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance Computer networks -- Security measures Data protection -- Standards |
title | PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance |
title_auth | PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance |
title_exact_search | PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance |
title_full | PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance |
title_fullStr | PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance |
title_full_unstemmed | PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance |
title_short | PCI Compliance |
title_sort | pci compliance understand and implement effective pci data security standard compliance |
title_sub | Understand and Implement Effective PCI Data Security Standard Compliance |
topic | Computer networks -- Security measures Data protection -- Standards |
topic_facet | Computer networks -- Security measures Data protection -- Standards |
work_keys_str_mv | AT williamsbrandenr pcicomplianceunderstandandimplementeffectivepcidatasecuritystandardcompliance AT chuvakinanton pcicomplianceunderstandandimplementeffectivepcidatasecuritystandardcompliance |