LEADER 02485nam 2200613 450 001 9910787603703321 005 20200520144314.0 010 $a1-118-81007-4 010 $a1-118-81010-4 035 $a(CKB)2670000000523086 035 $a(EBL)1629175 035 $a(SSID)ssj0001159714 035 $a(PQKBManifestationID)11679540 035 $a(PQKBTitleCode)TC0001159714 035 $a(PQKBWorkID)11116722 035 $a(PQKB)10515858 035 $a(Au-PeEL)EBL1629175 035 $a(CaPaEBR)ebr10837558 035 $a(CaONFJC)MIL573958 035 $a(OCoLC)874160809 035 $a(CaSebORM)9781118810071 035 $a(MiAaPQ)EBC1629175 035 $a(EXLCZ)992670000000523086 100 $a20131030h20142014 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacking point of sale $epayment application secrets, threats, and solutions /$fSlava Gomzin 205 $a1st edition 210 1$aIndianapolis, IN :$cJohn Wiley and Sons,$d[2014] 210 4$dİ2014 215 $a1 online resource (314 p.) 300 $aDescription based upon print version of record. 311 $a1-118-81011-2 320 $aIncludes bibliographical references and index. 327 $apart I. Anatomy of payment application vulnerability -- part II. Attacks on point-of-sale systems -- part III. Defense. 330 $a Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with p 606 $aComputer security 606 $aComputer networks$xSecurity measures 606 $aComputer hackers 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer hackers. 676 $a332.1788028558 700 $aGomzin$b Slava$01088177 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787603703321 996 $aHacking point of sale$93723966 997 $aUNINA