PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy |
Autore | Williams Branden R. |
Edizione | [Fourth edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (386 p.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection - Standards
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-801651-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk""
""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract"" ""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure"" ""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through"" ""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools"" ""Intrusion detection and prevention"" |
Record Nr. | UNINA-9910460068403321 |
Williams Branden R. | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy |
Autore | Williams Branden R. |
Edizione | [Fourth edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (386 p.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection - Standards
Computer networks - Security measures |
ISBN | 0-12-801651-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk""
""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract"" ""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure"" ""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through"" ""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools"" ""Intrusion detection and prevention"" |
Record Nr. | UNINA-9910787127403321 |
Williams Branden R. | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
PCI compliance : understand and implement effective PCI data security standard compliance / / Branden R. Williams, Anton A. Chuvakin ; technical editor, Derek Milroy |
Autore | Williams Branden R. |
Edizione | [Fourth edition.] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (386 p.) |
Disciplina | 005.8 |
Soggetto topico |
Data protection - Standards
Computer networks - Security measures |
ISBN | 0-12-801651-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk""
""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract"" ""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure"" ""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through"" ""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools"" ""Intrusion detection and prevention"" |
Record Nr. | UNINA-9910807147403321 |
Williams Branden R. | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
PCI DSS 3.1 : the standard that killed SSL / / Branden R. Williams ; James K. Adamson, technical editor |
Autore | Williams Branden R. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Syngress, , 2016 |
Descrizione fisica | 1 online resource (46 p.) |
Disciplina | 332.1788028558 |
Soggetto topico |
Credit cards - Security measures
Credit cards - Security measures - Standards Data protection |
ISBN |
0-12-804649-X
0-12-804627-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; PCI DSS 3.1; Copyright Page; Contents; Foreword; Acknowledgments; 1 Introduction; 2 The Death of SSL; Requirement 2.2.3; Requirement 2.3; Requirement 4.1; Interpretation Confusion; Longer Timelines; Summary of SSL Changes; Notes; 3 Third Parties; Requirement 12.9; Call the Ball; 4 Technical Testing; Requirement 11.3; Requirement 6.6; 5 Other Miscellaneous Changes; Requirement 3.2.1-3.2.3; Testing Procedure 3.4.e; Requirement 4.2; Requirement 8.1.4 and 8.2.4; Requirement 9.2; Testing Procedure 9.9.1.b; Requirement 10.6.1; Requirement 11.5; Requirement 12.2; Summary; Note
6 Final ThoughtsBack Cover |
Record Nr. | UNINA-9910797650603321 |
Williams Branden R. | ||
Amsterdam, [Netherlands] : , : Syngress, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
PCI DSS 3.1 : the standard that killed SSL / / Branden R. Williams ; James K. Adamson, technical editor |
Autore | Williams Branden R. |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam, [Netherlands] : , : Syngress, , 2016 |
Descrizione fisica | 1 online resource (46 p.) |
Disciplina | 332.1788028558 |
Soggetto topico |
Credit cards - Security measures
Credit cards - Security measures - Standards Data protection |
ISBN |
0-12-804649-X
0-12-804627-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; PCI DSS 3.1; Copyright Page; Contents; Foreword; Acknowledgments; 1 Introduction; 2 The Death of SSL; Requirement 2.2.3; Requirement 2.3; Requirement 4.1; Interpretation Confusion; Longer Timelines; Summary of SSL Changes; Notes; 3 Third Parties; Requirement 12.9; Call the Ball; 4 Technical Testing; Requirement 11.3; Requirement 6.6; 5 Other Miscellaneous Changes; Requirement 3.2.1-3.2.3; Testing Procedure 3.4.e; Requirement 4.2; Requirement 8.1.4 and 8.2.4; Requirement 9.2; Testing Procedure 9.9.1.b; Requirement 10.6.1; Requirement 11.5; Requirement 12.2; Summary; Note
6 Final ThoughtsBack Cover |
Record Nr. | UNINA-9910814395103321 |
Williams Branden R. | ||
Amsterdam, [Netherlands] : , : Syngress, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|