Format:
Online Ressource (xviii, 348 p.)
,
ill.
Edition:
2nd ed
Edition:
Online-Ausg.
ISBN:
1597494992
,
9781597494991
,
9781597495394
,
1597495395
Content:
Foreword≤ -- Acknowledgments -- Chapter≤1: About PCI and This Book -- Chapter≤2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter≤11: Don't Fear the Assessor -- Chapter≤12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS
Content:
Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the current PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Completely updated to follow the PCI DSS standard 1.2.1 Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure Both authors have broad information security backgrounds, including extensive PCI DSS experience
Note:
Includes index. - Includes bibliographical references and index. - Description based on print version record
,
Foreword€Acknowledgments -- Chapter€1: About PCI and This Book -- Chapter€2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter€11: Don't Fear the Assessor -- Chapter€12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS.
,
Foreword≤ -- Acknowledgments -- Chapter≤1: About PCI and This Book -- Chapter≤2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter≤11: Don't Fear the Assessor -- Chapter≤12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS.
Additional Edition:
ISBN 1597494992
Additional Edition:
ISBN 1597495395
Additional Edition:
Erscheint auch als Druck-Ausgabe PCI compliance Burlington, MA : Syngress, c2010
Language:
English
Keywords:
Chipkarte
;
Datensicherung
;
Electronic books
;
Electronic books
;
Electronic books
Bookmarklink