top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy
PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy
Autore Williams Branden R.
Edizione [Fourth edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (386 p.)
Disciplina 005.8
Soggetto topico Data protection - Standards
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 0-12-801651-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk""
""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract""
""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure""
""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through""
""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools""
""Intrusion detection and prevention""
Record Nr. UNINA-9910460068403321
Williams Branden R.  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy
PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy
Autore Williams Branden R.
Edizione [Fourth edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (386 p.)
Disciplina 005.8
Soggetto topico Data protection - Standards
Computer networks - Security measures
ISBN 0-12-801651-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk""
""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract""
""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure""
""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through""
""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools""
""Intrusion detection and prevention""
Record Nr. UNINA-9910787127403321
Williams Branden R.  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy
PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy
Autore Williams Branden R.
Edizione [Fourth edition.]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (386 p.)
Disciplina 005.8
Soggetto topico Data protection - Standards
Computer networks - Security measures
ISBN 0-12-801651-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk""
""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract""
""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure""
""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through""
""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools""
""Intrusion detection and prevention""
Record Nr. UNINA-9910807147403321
Williams Branden R.  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
PCI DSS 3.1 : the standard that killed SSL / / Branden R. Williams ; James K. Adamson, technical editor
PCI DSS 3.1 : the standard that killed SSL / / Branden R. Williams ; James K. Adamson, technical editor
Autore Williams Branden R.
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, [Netherlands] : , : Syngress, , 2016
Descrizione fisica 1 online resource (46 p.)
Disciplina 332.1788028558
Soggetto topico Credit cards - Security measures
Credit cards - Security measures - Standards
Data protection
ISBN 0-12-804649-X
0-12-804627-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; PCI DSS 3.1; Copyright Page; Contents; Foreword; Acknowledgments; 1 Introduction; 2 The Death of SSL; Requirement 2.2.3; Requirement 2.3; Requirement 4.1; Interpretation Confusion; Longer Timelines; Summary of SSL Changes; Notes; 3 Third Parties; Requirement 12.9; Call the Ball; 4 Technical Testing; Requirement 11.3; Requirement 6.6; 5 Other Miscellaneous Changes; Requirement 3.2.1-3.2.3; Testing Procedure 3.4.e; Requirement 4.2; Requirement 8.1.4 and 8.2.4; Requirement 9.2; Testing Procedure 9.9.1.b; Requirement 10.6.1; Requirement 11.5; Requirement 12.2; Summary; Note
6 Final ThoughtsBack Cover
Record Nr. UNINA-9910797650603321
Williams Branden R.  
Amsterdam, [Netherlands] : , : Syngress, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
PCI DSS 3.1 : the standard that killed SSL / / Branden R. Williams ; James K. Adamson, technical editor
PCI DSS 3.1 : the standard that killed SSL / / Branden R. Williams ; James K. Adamson, technical editor
Autore Williams Branden R.
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, [Netherlands] : , : Syngress, , 2016
Descrizione fisica 1 online resource (46 p.)
Disciplina 332.1788028558
Soggetto topico Credit cards - Security measures
Credit cards - Security measures - Standards
Data protection
ISBN 0-12-804649-X
0-12-804627-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; PCI DSS 3.1; Copyright Page; Contents; Foreword; Acknowledgments; 1 Introduction; 2 The Death of SSL; Requirement 2.2.3; Requirement 2.3; Requirement 4.1; Interpretation Confusion; Longer Timelines; Summary of SSL Changes; Notes; 3 Third Parties; Requirement 12.9; Call the Ball; 4 Technical Testing; Requirement 11.3; Requirement 6.6; 5 Other Miscellaneous Changes; Requirement 3.2.1-3.2.3; Testing Procedure 3.4.e; Requirement 4.2; Requirement 8.1.4 and 8.2.4; Requirement 9.2; Testing Procedure 9.9.1.b; Requirement 10.6.1; Requirement 11.5; Requirement 12.2; Summary; Note
6 Final ThoughtsBack Cover
Record Nr. UNINA-9910814395103321
Williams Branden R.  
Amsterdam, [Netherlands] : , : Syngress, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui