Hacking point of sale payment application secrets, threats, and solutions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem he...

Full description

Saved in:
Bibliographic Details
Main Author: Gomzin, Slava
Format: Book
Language:English
Published: Indianapolis, IN Wiley 2014
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 100755
003 MY-KLNDU
005 20241220025550.0
008 141013s2014 inua bi 000 0 eng d
020 |a 9781118810118 (pbk) 
020 |a 1118810112 (pbk) 
020 |a 9781118810101 (ebk) 
020 |a 9781118810071 (ebk) 
039 9 |a 201503092209  |b zul  |c 201501120847  |d azraai  |c 201411191135  |d shahrim  |y 201410131515  |z hasniza 
040 |a UPNM 
090 |a HD 30.38  |b .G66 2014 
100 1 |a Gomzin, Slava 
245 1 0 |a Hacking point of sale  |b payment application secrets, threats, and solutions  |c Slava Gomzin 
260 |a Indianapolis, IN  |b Wiley  |c 2014 
300 |a xxx, 282 p.  |b ill.  |c 24 cm 
504 |a Includes bibliographical references and index 
505 0 |a Part I. Anatomy of payment application vulnerability -- Part II. Attacks on point-of-sale systems -- Part III. Defense -- Conclusion -- Appendix A. POS vulnerability risk calculator -- Appendix B. Glossary of terms and abbreviations -- Index. 
520 |a As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail--from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more--it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code. Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem. 
592 |a 00013727  |b 04/11/2014  |c RM239.80  |h PVK 
650 0 |a Business enterprises  |x Computer networks  |x Security measures 
650 0 |a Data encryption (Computer science) 
650 0 |a Electronic funds transfers  |x Security measures 
650 0 |a Point-of-sale systems 
999 |a vtls000052916  |c 100755  |d 100755