PCI compliance :: implementing effective PCI data security standards /
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, Mass. :
Syngress,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs. |
Beschreibung: | 1 online resource (xxii, 329 pages) : illustrations |
ISBN: | 9780080556383 0080556388 1281112666 9781281112668 9786611112660 6611112669 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn298780450 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 081125s2007 maua o 001 0 eng d | ||
040 | |a CtWfDGI |b eng |e pn |c COCUF |d N$T |d YDXCP |d MERUC |d UBY |d ZCU |d E7B |d OCLCQ |d UMI |d CEF |d NHM |d IDEBK |d OCLCQ |d B24X7 |d DEBSZ |d OCLCQ |d OCLCO |d OCLCF |d OCLCQ |d OPELS |d BAKER |d DKDLA |d UX0 |d OCLCQ |d COO |d OCLCQ |d AGLDB |d LIV |d OCLCQ |d JBG |d NLE |d D6H |d UAB |d OCLCQ |d VTS |d AU@ |d UKMGB |d STF |d WYU |d LEAUB |d M8D |d VT2 |d VLY |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
015 | |a GBB6H5422 |2 bnb | ||
016 | 7 | |a 017585204 |2 Uk | |
019 | |a 162131597 |a 190823381 |a 430101391 |a 441816912 |a 474428587 |a 505138122 |a 507428413 |a 647691991 |a 733060579 |a 1044298299 |a 1056423991 |a 1058121578 |a 1060866782 |a 1103266322 |a 1129375662 |a 1153024535 |a 1162214123 |a 1192351230 |a 1240514512 | ||
020 | |a 9780080556383 |q (electronic bk.) | ||
020 | |a 0080556388 |q (electronic bk.) | ||
020 | |a 1281112666 | ||
020 | |a 9781281112668 | ||
020 | |a 9786611112660 | ||
020 | |a 6611112669 | ||
020 | |z 9781597491655 | ||
020 | |z 1597491659 |q (pbk.) | ||
035 | |a (OCoLC)298780450 |z (OCoLC)162131597 |z (OCoLC)190823381 |z (OCoLC)430101391 |z (OCoLC)441816912 |z (OCoLC)474428587 |z (OCoLC)505138122 |z (OCoLC)507428413 |z (OCoLC)647691991 |z (OCoLC)733060579 |z (OCoLC)1044298299 |z (OCoLC)1056423991 |z (OCoLC)1058121578 |z (OCoLC)1060866782 |z (OCoLC)1103266322 |z (OCoLC)1129375662 |z (OCoLC)1153024535 |z (OCoLC)1162214123 |z (OCoLC)1192351230 |z (OCoLC)1240514512 | ||
037 | |a CL0500000045 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 |b P414 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8/0218 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a PCI compliance : |b implementing effective PCI data security standards / |c Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors]. |
260 | |a Burlington, Mass. : |b Syngress, |c ©2007. | ||
300 | |a 1 online resource (xxii, 329 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what. | |
520 | |a Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs. | ||
546 | |a English. | ||
650 | 0 | |a Data protection |x Standards. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Credit cards. |0 http://id.loc.gov/authorities/subjects/sh85033865 | |
650 | 0 | |a Liability for credit information. |0 http://id.loc.gov/authorities/subjects/sh85076405 | |
650 | 6 | |a Protection de l'information (Informatique) |v Normes. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Cartes de crédit. | |
650 | 6 | |a Responsabilité pour renseignements sur la solvabilité. | |
650 | 6 | |a Protection de l'information (Informatique) |x Normes. | |
650 | 7 | |a credit cards. |2 aat | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Data protection |x Standards. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Credit cards. |2 blmlsh | |
650 | 7 | |a Liability for credit information. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Credit cards |2 fast | |
650 | 7 | |a Data protection |x Standards |2 fast | |
650 | 7 | |a Liability for credit information |2 fast | |
700 | 1 | |a Bradley, Tony, |d 1969- |4 edt |1 https://id.oclc.org/worldcat/entity/E39PCjJf89GqXvhr8hPVCbwQv3 |0 http://id.loc.gov/authorities/names/n2005051377 | |
700 | 1 | |a Burton, James D. |4 ctb | |
776 | 0 | 8 | |i Print version: |t PCI compliance. |d Burlington, MA : Syngress, ©2007 |z 9781597491655 |z 1597491659 |w (DLC) 2007298374 |w (OCoLC)144227882 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214747 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597491655 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00025451 | ||
938 | |a Baker & Taylor |b BKTY |c 59.95 |d 59.95 |i 1597491659 |n 0007167681 |s active | ||
938 | |a EBSCOhost |b EBSC |n 214747 | ||
938 | |a YBP Library Services |b YANK |n 2758423 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn298780450 |
---|---|
_version_ | 1816881684483670016 |
adam_text | |
any_adam_object | |
author2 | Bradley, Tony, 1969- Burton, James D. |
author2_role | edt ctb |
author2_variant | t b tb j d b jd jdb |
author_GND | http://id.loc.gov/authorities/names/n2005051377 |
author_facet | Bradley, Tony, 1969- Burton, James D. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 P414 2007eb |
callnumber-search | QA76.9.A25 P414 2007eb |
callnumber-sort | QA 276.9 A25 P414 42007EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what. |
ctrlnum | (OCoLC)298780450 |
dewey-full | 005.8/0218 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/0218 |
dewey-search | 005.8/0218 |
dewey-sort | 15.8 3218 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06037cam a2200829 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn298780450</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">081125s2007 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CtWfDGI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">COCUF</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">UBY</subfield><subfield code="d">ZCU</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">CEF</subfield><subfield code="d">NHM</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">BAKER</subfield><subfield code="d">DKDLA</subfield><subfield code="d">UX0</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">NLE</subfield><subfield code="d">D6H</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">AU@</subfield><subfield code="d">UKMGB</subfield><subfield code="d">STF</subfield><subfield code="d">WYU</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">VT2</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6H5422</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">017585204</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162131597</subfield><subfield code="a">190823381</subfield><subfield code="a">430101391</subfield><subfield code="a">441816912</subfield><subfield code="a">474428587</subfield><subfield code="a">505138122</subfield><subfield code="a">507428413</subfield><subfield code="a">647691991</subfield><subfield code="a">733060579</subfield><subfield code="a">1044298299</subfield><subfield code="a">1056423991</subfield><subfield code="a">1058121578</subfield><subfield code="a">1060866782</subfield><subfield code="a">1103266322</subfield><subfield code="a">1129375662</subfield><subfield code="a">1153024535</subfield><subfield code="a">1162214123</subfield><subfield code="a">1192351230</subfield><subfield code="a">1240514512</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080556383</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080556388</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281112666</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281112668</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611112660</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611112669</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597491655</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597491659</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)298780450</subfield><subfield code="z">(OCoLC)162131597</subfield><subfield code="z">(OCoLC)190823381</subfield><subfield code="z">(OCoLC)430101391</subfield><subfield code="z">(OCoLC)441816912</subfield><subfield code="z">(OCoLC)474428587</subfield><subfield code="z">(OCoLC)505138122</subfield><subfield code="z">(OCoLC)507428413</subfield><subfield code="z">(OCoLC)647691991</subfield><subfield code="z">(OCoLC)733060579</subfield><subfield code="z">(OCoLC)1044298299</subfield><subfield code="z">(OCoLC)1056423991</subfield><subfield code="z">(OCoLC)1058121578</subfield><subfield code="z">(OCoLC)1060866782</subfield><subfield code="z">(OCoLC)1103266322</subfield><subfield code="z">(OCoLC)1129375662</subfield><subfield code="z">(OCoLC)1153024535</subfield><subfield code="z">(OCoLC)1162214123</subfield><subfield code="z">(OCoLC)1192351230</subfield><subfield code="z">(OCoLC)1240514512</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000045</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">P414 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/0218</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">PCI compliance :</subfield><subfield code="b">implementing effective PCI data security standards /</subfield><subfield code="c">Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, Mass. :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, 329 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Standards.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Credit cards.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85033865</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Liability for credit information.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85076405</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="v">Normes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cartes de crédit.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Responsabilité pour renseignements sur la solvabilité.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="x">Normes.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">credit cards.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="x">Standards.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Credit cards.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Liability for credit information.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Credit cards</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="x">Standards</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Liability for credit information</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bradley, Tony,</subfield><subfield code="d">1969-</subfield><subfield code="4">edt</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjJf89GqXvhr8hPVCbwQv3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2005051377</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Burton, James D.</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">PCI compliance.</subfield><subfield code="d">Burlington, MA : Syngress, ©2007</subfield><subfield code="z">9781597491655</subfield><subfield code="z">1597491659</subfield><subfield code="w">(DLC) 2007298374</subfield><subfield code="w">(OCoLC)144227882</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214747</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597491655</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00025451</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">59.95</subfield><subfield code="d">59.95</subfield><subfield code="i">1597491659</subfield><subfield code="n">0007167681</subfield><subfield code="s">active</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">214747</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2758423</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn298780450 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:38Z |
institution | BVB |
isbn | 9780080556383 0080556388 1281112666 9781281112668 9786611112660 6611112669 |
language | English |
oclc_num | 298780450 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxii, 329 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress, |
record_format | marc |
spelling | PCI compliance : implementing effective PCI data security standards / Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors]. Burlington, Mass. : Syngress, ©2007. 1 online resource (xxii, 329 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what. Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. *PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data *Information with helps to develop and implement an effective security strategy to keep their infrastructure compliant *The authors are well known and each has an extensive information security background, making them ideal for conveying the information the reader needs. English. Data protection Standards. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Credit cards. http://id.loc.gov/authorities/subjects/sh85033865 Liability for credit information. http://id.loc.gov/authorities/subjects/sh85076405 Protection de l'information (Informatique) Normes. Réseaux d'ordinateurs Sécurité Mesures. Cartes de crédit. Responsabilité pour renseignements sur la solvabilité. credit cards. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Data protection Standards. blmlsh Computer networks Security measures. blmlsh Credit cards. blmlsh Liability for credit information. blmlsh Computer networks Security measures fast Credit cards fast Data protection Standards fast Liability for credit information fast Bradley, Tony, 1969- edt https://id.oclc.org/worldcat/entity/E39PCjJf89GqXvhr8hPVCbwQv3 http://id.loc.gov/authorities/names/n2005051377 Burton, James D. ctb Print version: PCI compliance. Burlington, MA : Syngress, ©2007 9781597491655 1597491659 (DLC) 2007298374 (OCoLC)144227882 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214747 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597491655 Volltext |
spellingShingle | PCI compliance : implementing effective PCI data security standards / Ch. 1. About PCI and this book -- Ch. 2. Introduction to fraud, ID theft, and regulatory mandates -- Ch. 3. Why PCI is important -- Ch. 4. Building & maintaining a secure network -- Ch. 5. Protect cardholder data -- Ch. 6. Logging access & events chapter -- Ch. 7. Strong access control -- Ch. 8. Vulnerability management -- Ch. 9. Monitoring and testing -- Ch. 10. How to plan a project to meet compliance -- Ch. 11. Responsibilities -- Ch. 12. Planning to fail your first audit -- Ch. 13. You're compliant, now what. Data protection Standards. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Credit cards. http://id.loc.gov/authorities/subjects/sh85033865 Liability for credit information. http://id.loc.gov/authorities/subjects/sh85076405 Protection de l'information (Informatique) Normes. Réseaux d'ordinateurs Sécurité Mesures. Cartes de crédit. Responsabilité pour renseignements sur la solvabilité. credit cards. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Data protection Standards. blmlsh Computer networks Security measures. blmlsh Credit cards. blmlsh Liability for credit information. blmlsh Computer networks Security measures fast Credit cards fast Data protection Standards fast Liability for credit information fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85033865 http://id.loc.gov/authorities/subjects/sh85076405 |
title | PCI compliance : implementing effective PCI data security standards / |
title_auth | PCI compliance : implementing effective PCI data security standards / |
title_exact_search | PCI compliance : implementing effective PCI data security standards / |
title_full | PCI compliance : implementing effective PCI data security standards / Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors]. |
title_fullStr | PCI compliance : implementing effective PCI data security standards / Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors]. |
title_full_unstemmed | PCI compliance : implementing effective PCI data security standards / Tony Bradley, technical editor ; James D. Burton Jr. ... [et al., contributors]. |
title_short | PCI compliance : |
title_sort | pci compliance implementing effective pci data security standards |
title_sub | implementing effective PCI data security standards / |
topic | Data protection Standards. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Credit cards. http://id.loc.gov/authorities/subjects/sh85033865 Liability for credit information. http://id.loc.gov/authorities/subjects/sh85076405 Protection de l'information (Informatique) Normes. Réseaux d'ordinateurs Sécurité Mesures. Cartes de crédit. Responsabilité pour renseignements sur la solvabilité. credit cards. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Data protection Standards. blmlsh Computer networks Security measures. blmlsh Credit cards. blmlsh Liability for credit information. blmlsh Computer networks Security measures fast Credit cards fast Data protection Standards fast Liability for credit information fast |
topic_facet | Data protection Standards. Computer networks Security measures. Credit cards. Liability for credit information. Protection de l'information (Informatique) Normes. Réseaux d'ordinateurs Sécurité Mesures. Cartes de crédit. Responsabilité pour renseignements sur la solvabilité. credit cards. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Credit cards Data protection Standards Liability for credit information |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214747 https://www.sciencedirect.com/science/book/9781597491655 |
work_keys_str_mv | AT bradleytony pcicomplianceimplementingeffectivepcidatasecuritystandards AT burtonjamesd pcicomplianceimplementingeffectivepcidatasecuritystandards |