Hacking point of sale payment application secrets, threats, and solutions
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem he...
Saved in:
| Main Author: | Gomzin, Slava |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptographic solutions for secure online banking and commerce
Published: (2016)
Published: (2016)
Blockchain blueprint for a new economy
by: Swan, Melanie
Published: (2015)
by: Swan, Melanie
Published: (2015)
Hacking exposed web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011)
by: Scambray, Joel
Published: (2011)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Hacking exposed unified communications & VoIP security secrets & solutions
by: Collier, Mark D., et al.
Published: (2014)
by: Collier, Mark D., et al.
Published: (2014)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
Citizen-centric privacy requirements engineering framework
by: Nor Asiakin Hasbullah
Published: (2017)
by: Nor Asiakin Hasbullah
Published: (2017)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practices
by: Stallings
Published: (2003)
by: Stallings
Published: (2003)
Cryptography and network security principles and practice
by: Stallings
Published: (1998)
by: Stallings
Published: (1998)
Microsoft Office PowerPoint 2003 sales presentations, student manual
Published: (2004)
Published: (2004)
Cybersecurity education for awareness and compliance
Published: (2019)
Published: (2019)
Hacking web apps detecting and preventing web application security problems
by: Shema, Mike
Published: (2012)
by: Shema, Mike
Published: (2012)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Secrets and lies digital security in a networked world
by: Schneier, Bruce 1963-
Published: (2000)
by: Schneier, Bruce 1963-
Published: (2000)
Hands-on ethical hacking and network defense
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
Hacking with kali practical penetration testing techniques
by: Broad, James
Published: (2014)
by: Broad, James
Published: (2014)
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Insider threats
by: Arduin, Pierre-Emmanuel
Published: (2018)
by: Arduin, Pierre-Emmanuel
Published: (2018)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Learn ethical hacking from scratch your stepping stone to penetration testing
by: Sabih, Zaid
Published: (2018)
by: Sabih, Zaid
Published: (2018)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Hacking exposed wireless wireless security secrets & solutions /
by: Cache, Johnny
Published: (2007)
by: Cache, Johnny
Published: (2007)
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny
Published: (2010)
by: Cache, Johnny
Published: (2010)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Similar Items
-
Cryptographic solutions for secure online banking and commerce
Published: (2016) -
Blockchain blueprint for a new economy
by: Swan, Melanie
Published: (2015) -
Hacking exposed web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011) -
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999) -
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)


