Hacking Point of Sale Hacking Point of Sale

Hacking Point of Sale

Payment Application Secrets, Threats, and Solutions

    • $48.99
    • $48.99

Publisher Description

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.
A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.

GENRE
Computers & Internet
RELEASED
2014
February 3
LANGUAGE
EN
English
LENGTH
312
Pages
PUBLISHER
Wiley
SELLER
John Wiley & Sons, Inc.
SIZE
15.1
MB

More Books Like This

Principles of Computer Security, Fourth Edition Principles of Computer Security, Fourth Edition
2016
CompTIA Security+: SY0-601 Certification Guide CompTIA Security+: SY0-601 Certification Guide
2020
CompTIA Security+ Certification Guide CompTIA Security+ Certification Guide
2018
PCI Compliance PCI Compliance
2012
Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)
2021
SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition
2015

More Books by Slava Gomzin

Hiding Web Traffic with SSH: How to Protect Your Internet Privacy Against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy Against Corporate Firewall or Insecure Wireless
2012
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
2012
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012