gogogo
Syndetics cover image
Image from Syndetics

PCI compliance [electronic book] : understand and implement effective PCI data security standard compliance.

Contributor(s): Material type: TextTextPublication details: Burlington, MA : Syngress, c2010.Edition: 2nd ed. / Anton A. Chuvakin, Branden R. Williams ; technical editor, Ward SpangenbergDescription: xviii, 348 p. : ill. ; 24 cmISBN:
  • 1597494992
  • 9781597494991
Subject(s): Genre/Form: Additional physical formats: No titleOnline resources:
Contents:
Foreword  -- Acknowledgments -- Chapter 1: About PCI and This Book -- Chapter 2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter 11: Don't Fear the Assessor -- Chapter 12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS --.
Summary: Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the current PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Completely updated to follow the PCI DSS standard 1.2.1 Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure Both authors have broad information security backgrounds, including extensive PCI DSS experience.
No physical items for this record

Enhanced descriptions from Syndetics:

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Second Edition, discusses not only how to apply PCI in a practical and cost-effective way but more importantly why. The book explains what the Payment Card Industry Data Security Standard (PCI DSS) is and why it is here to stay; how it applies to information technology (IT) and information security professionals and their organization; how to deal with PCI assessors; and how to plan and manage PCI DSS project. It also describes the technologies referenced by PCI DSS and how PCI DSS relates to laws, frameworks, and regulations.

This book is for IT managers and company managers who need to understand how PCI DSS applies to their organizations. It is for the small- and medium-size businesses that do not have an IT department to delegate to. It is for large organizations whose PCI DSS project scope is immense. It is also for all organizations that need to grasp the concepts of PCI DSS and how to implement an effective security framework that is also compliant.

Includes index.

Includes bibliographical references and index.

Foreword  -- Acknowledgments -- Chapter 1: About PCI and This Book -- Chapter 2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter 11: Don't Fear the Assessor -- Chapter 12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS --.

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the current PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Completely updated to follow the PCI DSS standard 1.2.1 Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure Both authors have broad information security backgrounds, including extensive PCI DSS experience.

Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2010. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on Apr. 28, 2010). Access may be restricted to users at subscribing institutions.

Table of contents provided by Syndetics

  • Foreword
  • Acknowledgments
  • Chapter 1 About PCI and This Book
  • Chapter 2 Introduction to Fraud, ID Theft, and Regulatory Mandates
  • Chapter 3 Why Is PCI Here?
  • Chapter 4 Building and Maintaining a Secure Network
  • Chapter 5 Strong Access Controls
  • Chapter 6 Protecting Cardholder Data
  • Chapter 7 Using Wireless Networking
  • Chapter 8 Vulnerability Management
  • Chapter 9 Logging Events and Monitoring the Cardholder Data Environment
  • Chapter 10 Managing a PCI DSS Project to Acheive Compliance
  • Chapter 11 Don't Fear the Assessor
  • Chapter 12 The Art of Compensating Control
  • Chapter 13 You're Compliant, Now What?
  • Chapter 14 PCI and Other Laws, Mandates, and Frameworks
  • Chapter 15 Myths and Misconceptions of PCI DSS

Author notes provided by Syndetics

Dr. Anton Chuvakin is a recognized security expert in the field of log

management and PCI DSS compliance. He is an author of the books "Security Warrior" and "PCI

Compliance" and has contributed to many others, while also publishing dozens of papers on

log management, correlation, data analysis, PCI DSS, and security management. His blog

(http://www.securitywarrior.org) is one of the most popular in the industry.

Additionaly, Anton teaches classes and presents at many security conferences across the world

and he works on emerging security standards and serves on the advisory boards of

several security start-ups. Currently, Anton is developing his security consulting practice,

focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations.

Anton earned his Ph.D. from Stony Brook University.

Branden R. Williams (CISSP, CISM, CPISA, CPISM) leads an information security practice in a Global Security Consulting group at a major security firm in Flower Mound, TX and teaches in the NSA Certified Information Assurance program at the University of Dallas's Graduate School of Management. Branden has been involved in information technology since 1994, and focused on information security since 1996. He started consulting on payment security in 2004, assessing companies against the Visa CISP and Mastercard SDP programs. He has a Bachelors of Business Administration in Marketing from the University of Texas, Arlington, and a Masters of Business Administration in Supply Chain Management and Market Logistics from the University of Dallas.

Branden publishes a monthly column in the ISSA Journal entitled "Herding Cats," and authors a blog at http://www.brandenwilliams.com/.

Powered by Koha