PCI compliance understand and implement effective PCI data security standard compliance. [electronic book] : - 2nd ed. / Anton A. Chuvakin, Branden R. Williams ; technical editor, Ward Spangenberg. - Burlington, MA : Syngress, c2010. - xviii, 348 p. : ill. ; 24 cm.

Includes index.

Includes bibliographical references and index.

Foreword  -- Acknowledgments -- Chapter 1: About PCI and This Book -- Chapter 2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter 11: Don't Fear the Assessor -- Chapter 12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS --.

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the current PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Completely updated to follow the PCI DSS standard 1.2.1 Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure Both authors have broad information security backgrounds, including extensive PCI DSS experience.


Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2010.
Mode of access: World Wide Web.
System requirements: Web browser.
Title from title screen (viewed on Apr. 28, 2010).
Access may be restricted to users at subscribing institutions.

1597494992 9781597494991

1057745:10314382 Elsevier Science & Technology http://www.sciencedirect.com


Data protection--Standards.
Computer networks--Security measures.
Credit cards.
Liability for credit information.


Electronic books.