Normal view MARC view ISBD view

PCI Compliance : The Definitive Guide

By: Bhargav, Abhay.
Material type: TextTextSeries: eBooks on Demand.Publisher: Hoboken : Taylor and Francis, 2014Description: 1 online resource (344 p.).ISBN: 9781439887417.Subject(s): Credit cards -- Security measures -- Handbooks, manuals, etc | Data protection -- Standards -- Handbooks, manuals, etcGenre/Form: Electronic books.Additional physical formats: Print version:: PCI Compliance : The Definitive GuideDDC classification: 332.1/780681 | 332.1780681 LOC classification: HG3755.7 .B43 2014Online resources: Click here to view this ebook.
Contents:
Front Cover; Contents; Preface; About the Author; Chapter 1: Payment-Card Industry: An Evolution; Chapter 2: Card Anatomy: The Essentials; Chapter 3: Security and the Payment-Card Industry; Chapter 4: Payment Card Industry Data Security Standard (PCI-DSS); Chapter 5: The Payment Application Data Security Standard (PA-DSS); Chapter 6: Enterprise Approach to PCI Compliance; Chapter 7: Scoping for PCI Compliance; Chapter 8: Requirement 1: Build and Maintain a Secure Network; Chapter 9: Requirement 2: Vendor-Supplied Defaults, System Passwords, and Security Parameters
Chapter 10: Requirement 3: Protect Stored Cardholder DataChapter 11: Requirement 4: Securing Cardholder Information in Transit; Chapter 12: Requirement 5: Use and Regularly Update Antivirus Software; Chapter 13: Requirement 6: Develop and Maintain Secure Systems; Chapter 14: Requirement 7: Restrict Access to Cardholder Data by Business Need to Know; Chapter 15: Requirement 8: Access-Control Requirements for PCI Environments; Chapter 16: Requirement 9: Restrict Physical Access to Cardholder Data; Chapter 17: Requirement 10: Logging and Monitoring for the PCI Standards
Chapter 18: Requirement 11: Security Testing for the PCI EnvironmentChapter 19: Requirement 12: Information Security Policies and Practices for PCI Compliance; Chapter 20: Beyond PCI Compliance; Addendum; Back Cover
Summary: Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explains the ins and outs of the payment card industry (PCI) security standards in a manner that is easy to understand. This step-by-step guidebook delves into PCI standards from an implementation standpoint. It begins with a basic introduction to PCI compliance, including its history and evolution. It th
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
HG3755.7 .B43 2014 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=1407572 Available EBL1407572

Front Cover; Contents; Preface; About the Author; Chapter 1: Payment-Card Industry: An Evolution; Chapter 2: Card Anatomy: The Essentials; Chapter 3: Security and the Payment-Card Industry; Chapter 4: Payment Card Industry Data Security Standard (PCI-DSS); Chapter 5: The Payment Application Data Security Standard (PA-DSS); Chapter 6: Enterprise Approach to PCI Compliance; Chapter 7: Scoping for PCI Compliance; Chapter 8: Requirement 1: Build and Maintain a Secure Network; Chapter 9: Requirement 2: Vendor-Supplied Defaults, System Passwords, and Security Parameters

Chapter 10: Requirement 3: Protect Stored Cardholder DataChapter 11: Requirement 4: Securing Cardholder Information in Transit; Chapter 12: Requirement 5: Use and Regularly Update Antivirus Software; Chapter 13: Requirement 6: Develop and Maintain Secure Systems; Chapter 14: Requirement 7: Restrict Access to Cardholder Data by Business Need to Know; Chapter 15: Requirement 8: Access-Control Requirements for PCI Environments; Chapter 16: Requirement 9: Restrict Physical Access to Cardholder Data; Chapter 17: Requirement 10: Logging and Monitoring for the PCI Standards

Chapter 18: Requirement 11: Security Testing for the PCI EnvironmentChapter 19: Requirement 12: Information Security Policies and Practices for PCI Compliance; Chapter 20: Beyond PCI Compliance; Addendum; Back Cover

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explains the ins and outs of the payment card industry (PCI) security standards in a manner that is easy to understand. This step-by-step guidebook delves into PCI standards from an implementation standpoint. It begins with a basic introduction to PCI compliance, including its history and evolution. It th

Description based upon print version of record.

Author notes provided by Syndetics

<p>Abhay Bhargav is the founder and chief technical officer of the we45 Group, a Bangalore based information security solutions company. He has extensive experience with information security and compliance, having performed security assessments for many enterprises in various domains, such as banking, software development, retail, telecom, and legal. He is a qualified security assessor (QSA) for the payment-card industry and has led several security assessments for payment-card industry compliance. He is also the coauthor of Secure Java for Web Application Development, published by CRC Press.<br> <br> Abhay is a specialist in Web-application security with broad experience in vulnerability assessment and penetration testing, and he has served as a consultant for a wide array of enterprises and governmental/quasi-governmental entities. He was recently awarded the prestigious SANS Certified GIAC Web Application Penetration Tester certification. He has been interviewed by leading media outlets for his expertise on information security, particularly application security. Links to the interviews are available here and here.<br> <br> Abhay is a regular speaker at industry events. He was a featured speaker at the JavaOne Conference in September 2010 at the Moscone Center in San Francisco. He also regularly speaks at OWASP (Open Web Application Security Project) conferences around the world, notably in New York at the world's largest application security conference, the OWASP AppSec Conference, in September 2008. He has also spoken at various other conferences and seminars, such as the PCI summit in Mumbai in December 2008. He is a regular speaker at industry events such as the Business Technology Summit and events organized by the Confederation of Indian Industry (CII). He has also delivered several talks to government entities and their stakeholders on information security and application security. He is also a trainer in information security and has</p>

There are no comments for this item.

Log in to your account to post a comment.