PCI Compliance : (Record no. 890623)

001 - CONTROL NUMBER
control field EBL1832710
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
additional material characteristics m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr -n---------
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150619s2014||||||| s|||||||||||eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128016510
Terms of availability 125.91 (UA)
035 ## - SYSTEM CONTROL NUMBER
System control number (AU-PeEL)1832710
040 ## - CATALOGING SOURCE
Original cataloging agency AU-PeEL
Language of cataloging eng
Transcribing agency AU-PeEL
Modifying agency AU-PeEL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.A25
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Williams, Branden R.
245 10 - TITLE STATEMENT
Title PCI Compliance :
Remainder of title Understand and Implement Effective PCI Data Security Standard Compliance
250 ## - EDITION STATEMENT
Edition statement 4th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington :
Name of publisher, distributor, etc Elsevier Science,
Date of publication, distribution, etc 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (615 p.)
490 0# - SERIES STATEMENT
Series statement eBooks on Demand
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Title page; Table of Contents; Copyright; Foreword; Acknowledgments; Chapter 1: About PCI DSS and this book; Abstract; Who should read this book?; How to use the book in your daily job; What this book is not; Organization of the book; Summary; Chapter 2: Introduction to fraud, data theft, and related regulatory mandates; Abstract; Summary; Chapter 3: Why is PCI here?; Abstract; What is PCI DSS and who must comply?; PCI DSS in depth; Quick overview of PCI requirements; PCI DSS and risk; Benefits of compliance; Case study; Summary; Chapter 4: Determining and reducing the PCI scope
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note AbstractThe basics of PCI DSS scoping; The "gotchas" of PCI scope; Scope reduction tips; Planning your PCI project; Case study; Summary; Chapter 5: Building and maintaining a secure network; Abstract; Which PCI DSS requirements are in this domain?; What else can you do to be secure?; Tools and best practices; Common mistakes and pitfalls; Case study; Summary; Chapter 6: Strong access controls; Abstract; Which PCI DSS requirements are in this domain?; What else can you do to be secure?; Tools and best practices; Common mistakes and pitfalls; Case study; Summary
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 7: Protecting cardholder dataAbstract; What is data protection and why is it needed?; Requirements addressed in this chapter; PCI requirement 3: Protect stored cardholder data; Requirement 3 walk-through; What else can you do to be secure?; PCI requirement 4 walk-through; Requirement 12 walk-through; Appendix A of PCI DSS; How to become compliant and secure; Common mistakes and pitfalls; Case study; Summary; Chapter 8: Using wireless networking; Abstract; What is wireless network security?; Where is wireless network security in PCI DSS?; Why do we need wireless network security?
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Tools and best practicesCommon mistakes and pitfalls; Case study; Summary; Chapter 9: Vulnerability management; Abstract; PCI DSS requirements covered; Vulnerability management in PCI; Requirement 5 walk-through; Requirement 6 walk-through; Requirement 11 walk-through; Internal vulnerability scanning; Common PCI vulnerability management mistakes; Case study; Summary; Chapter 10: Logging events and monitoring the cardholder data environment; Abstract; PCI requirements covered; Why logging and monitoring in PCI DSS?; Logging and monitoring in depth; PCI relevance of logs
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Logging in PCI requirement 10Monitoring data and log for security issues; Logging and monitoring in PCI-all other requirements; PCI DSS logging policies and procedures; Tools for logging in PCI; Other monitoring tools; Intrusion detection and prevention; Integrity monitoring; Common mistakes and pitfalls; Case study; Summary; Chapter 11: PCI DSS and cloud computing; Abstract; Cloud basics; PCI cloud examples; So, can I use cloud resources in PCI DSS environments?; More cloud for better security and compliance?; Maintaining and assessing PCI DSS in the cloud; Cloud and PCI DSS in depth
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Summary
520 ## - SUMMARY, ETC.
Summary, etc Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi
588 ## -
-- Description based upon print version of record.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks -- Security measures.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Credit cards -- Security measures -- Handbooks, manuals, etc.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection -- Standards -- Handbooks, manuals, etc.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection -- Standards.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chuvakin, Anton.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Williams, Branden R.
Title PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance
Place, publisher, and date of publication Burlington : Elsevier Science,c2014
International Standard Book Number 9780128015797
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://uttyler.eblib.com/patron/FullRecord.aspx?p=1832710">http://uttyler.eblib.com/patron/FullRecord.aspx?p=1832710</a>
Link text Click here to view this ebook.
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
Platform EBL
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book
Source of classification or shelving scheme
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
          UT Tyler Online UT Tyler Online Online 2015-06-23 QA76.9.A25 EBL1832710 2015-06-23 http://uttyler.eblib.com/patron/FullRecord.aspx?p=1832710 2015-06-23 Electronic Book