LEADER 05566nam 2200685 450 001 9910460068403321 005 20200520144314.0 010 $a0-12-801651-5 035 $a(CKB)3710000000276874 035 $a(EBL)1832710 035 $a(OCoLC)897934305 035 $a(SSID)ssj0001453756 035 $a(PQKBManifestationID)11755185 035 $a(PQKBTitleCode)TC0001453756 035 $a(PQKBWorkID)11492714 035 $a(PQKB)10879257 035 $a(MiAaPQ)EBC1832710 035 $a(CaSebORM)9780128015797 035 $a(Au-PeEL)EBL1832710 035 $a(CaPaEBR)ebr10989017 035 $a(CaONFJC)MIL659967 035 $a(EXLCZ)993710000000276874 100 $a20141203h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPCI compliance $eunderstand and implement effective PCI data security standard compliance /$fBranden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy 205 $aFourth edition. 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (386 p.) 300 $aDescription based upon print version of record. 311 $a1-322-28687-6 311 $a0-12-801579-9 320 $aIncludes bibliographical references and index. 327 $a""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk"" 327 $a""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The a???gotchasa??? of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract"" 327 $a""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure"" 327 $a""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through"" 327 $a""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCIa???all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools"" 327 $a""Intrusion detection and prevention"" 330 $a Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi 606 $aData protection$xStandards 606 $aComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aData protection$xStandards. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aWilliams$b Branden R.$0864043 702 $aChuvakin$b Anton A. 702 $aMilroy$b Derek 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910460068403321 996 $aPCI compliance$91928670 997 $aUNINA