,

Hacking Point of Sale – Payment Application Secrets, Threats, and Solutions

Payment Application Secrets, Threats, and Solutions

Paperback Engels 2014 9781118810118
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Must–have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head–on. Exploring all aspects of the problem in detail – from how attacks are structured to the structure of magnetic strips to point–to–point encryption, and more it′s packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.

A unique book on credit and debit card security, with an emphasis on point–to–point encryption of payment transactions (P2PE) from standards to design to application
Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO
Explains how protected areas are hacked and how hackers spot vulnerabilities
Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.

Specificaties

ISBN13:9781118810118
Taal:Engels
Bindwijze:paperback
Aantal pagina's:312

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Introduction xxiii</p>
<p>Part I Anatomy of Payment Application Vulnerabilities 1</p>
<p>Chapter 1 Processing Payment Transactions 3</p>
<p>Chapter 2 Payment Application Architecture 25</p>
<p>Chapter 3 PCI 55</p>
<p>Part II Attacks on Point of Sale Systems 91</p>
<p>Chapter 4 Turning 40 Digits into Gold 93</p>
<p>Chapter 5 Penetrating Security Free Zones 125</p>
<p>Chapter 6 Breaking into PCI–protected Areas 147</p>
<p>Part III Defense 165</p>
<p>Chapter 7 Cryptography in Payment Applications 167</p>
<p>Chapter 8 Protecting Cardholder Data 195</p>
<p>Chapter 9 Securing Application Code 219</p>
<p>Conclusion 249</p>
<p>Appendix A POS Vulnerability Rank Calculator 251</p>
<p>Appendix B Glossary 257</p>
<p>Index 265</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Hacking Point of Sale – Payment Application Secrets, Threats, and Solutions