Hacking Point of Sale Hacking Point of Sale

Hacking Point of Sale

Payment Application Secrets, Threats, and Solutions

    • ¥7,400
    • ¥7,400

Publisher Description

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.
A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.

GENRE
Computers & Internet
RELEASED
2014
February 3
LANGUAGE
EN
English
LENGTH
312
Pages
PUBLISHER
Wiley
SELLER
John Wiley & Sons, Inc.
SIZE
15.1
MB
Official (ISC)2® Guide to the ISSAP® CBK Official (ISC)2® Guide to the ISSAP® CBK
2017
CompTIA Security+ Review Guide CompTIA Security+ Review Guide
2021
Network Security Bible Network Security Bible
2011
Official (ISC)2 Guide to the ISSAP CBK, Second Edition Official (ISC)2 Guide to the ISSAP CBK, Second Edition
2013
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
2013
The Concise Guide to SSL/TLS for DevOps The Concise Guide to SSL/TLS for DevOps
2015
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data
2012
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012