語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
到查詢結果
[ subject:"Security." ]
切換:
標籤
|
MARC模式
|
ISBD
PCI DSS = an integrated data securit...
~
Seaman, Jim.
FindBook
Google Book
Amazon
博客來
PCI DSS = an integrated data security standard guide /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
PCI DSS/ by Jim Seaman.
其他題名:
an integrated data security standard guide /
作者:
Seaman, Jim.
出版者:
Berkeley, CA :Apress : : 2020.,
面頁冊數:
xxvii, 531 p. :ill., digital ;24 cm.
內容註:
Chapter 1: An Evolving Regulatory Perspective -- Chapter 2: The Evolution of PCI DSS -- Chapter 3: Data Life Support System -- Chapter 4: An integrated Cyber and InfoSec Strategy -- Chapter 5: The Importance of Risk Management -- Chapter 6: Risk Management Versus Compliance - The Differentiator -- Chapter 7: PCI DSS Applicability -- Chapter 8: De-Scoping The Scoping Risk -- Chapter 9: An intro to PCI DSS -- Chapter 10: Payment Channel Attack Vectors -- Chapter 11: Compliance - A Team Effort -- Chapter 12: PIE FARM -- Chapter 13: Proactive Defense -- Chapter 14: People, People, People -- Chapter 15: The Ripple Effect -- Chapter 16: Commeth The Year-Month-Day-Hour -- Chapter 17: Quick Fire Round. Reading List.
Contained By:
Springer eBooks
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-1-4842-5808-8
ISBN:
9781484258088
PCI DSS = an integrated data security standard guide /
Seaman, Jim.
PCI DSS
an integrated data security standard guide /[electronic resource] :by Jim Seaman. - Berkeley, CA :Apress :2020. - xxvii, 531 p. :ill., digital ;24 cm.
Chapter 1: An Evolving Regulatory Perspective -- Chapter 2: The Evolution of PCI DSS -- Chapter 3: Data Life Support System -- Chapter 4: An integrated Cyber and InfoSec Strategy -- Chapter 5: The Importance of Risk Management -- Chapter 6: Risk Management Versus Compliance - The Differentiator -- Chapter 7: PCI DSS Applicability -- Chapter 8: De-Scoping The Scoping Risk -- Chapter 9: An intro to PCI DSS -- Chapter 10: Payment Channel Attack Vectors -- Chapter 11: Compliance - A Team Effort -- Chapter 12: PIE FARM -- Chapter 13: Proactive Defense -- Chapter 14: People, People, People -- Chapter 15: The Ripple Effect -- Chapter 16: Commeth The Year-Month-Day-Hour -- Chapter 17: Quick Fire Round. Reading List.
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets. Businesses are seeing an increased volume of data breaches, where an opportunist attacker from outside the business or a disaffected employee successfully exploits poor company practices. Rather than being a regurgitation of the PCI DSS controls, this book aims to help you balance the needs of running your business with the value of implementing PCI DSS for the protection of consumer payment card data. Applying lessons learned from history, military experiences (including multiple deployments into hostile areas), numerous PCI QSA assignments, and corporate cybersecurity and InfoSec roles, author Jim Seaman helps you understand the complexities of the payment card industry data security standard as you protect cardholder data. You will learn how to align the standard with your business IT systems or operations that store, process, and/or transmit sensitive data. This book will help you develop a business cybersecurity and InfoSec strategy through the correct interpretation, implementation, and maintenance of PCI DSS. You will: Be aware of recent data privacy regulatory changes and the release of PCI DSS v4.0 Improve the defense of consumer payment card data to safeguard the reputation of your business and make it more difficult for criminals to breach security Be familiar with the goals and requirements related to the structure and interdependencies of PCI DSS Know the potential avenues of attack associated with business payment operations Make PCI DSS an integral component of your business operations Understand the benefits of enhancing your security culture See how the implementation of PCI DSS causes a positive ripple effect across your business.
ISBN: 9781484258088
Standard No.: 10.1007/978-1-4842-5808-8doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / S436 2020
Dewey Class. No.: 005.8
PCI DSS = an integrated data security standard guide /
LDR
:03787nmm a2200325 a 4500
001
2218035
003
DE-He213
005
20200503125612.0
006
m d
007
cr nn 008maaau
008
201120s2020 cau s 0 eng d
020
$a
9781484258088
$q
(electronic bk.)
020
$a
9781484258071
$q
(paper)
024
7
$a
10.1007/978-1-4842-5808-8
$2
doi
035
$a
978-1-4842-5808-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
S436 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S438 2020
100
1
$a
Seaman, Jim.
$3
3451731
245
1 0
$a
PCI DSS
$h
[electronic resource] :
$b
an integrated data security standard guide /
$c
by Jim Seaman.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xxvii, 531 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: An Evolving Regulatory Perspective -- Chapter 2: The Evolution of PCI DSS -- Chapter 3: Data Life Support System -- Chapter 4: An integrated Cyber and InfoSec Strategy -- Chapter 5: The Importance of Risk Management -- Chapter 6: Risk Management Versus Compliance - The Differentiator -- Chapter 7: PCI DSS Applicability -- Chapter 8: De-Scoping The Scoping Risk -- Chapter 9: An intro to PCI DSS -- Chapter 10: Payment Channel Attack Vectors -- Chapter 11: Compliance - A Team Effort -- Chapter 12: PIE FARM -- Chapter 13: Proactive Defense -- Chapter 14: People, People, People -- Chapter 15: The Ripple Effect -- Chapter 16: Commeth The Year-Month-Day-Hour -- Chapter 17: Quick Fire Round. Reading List.
520
$a
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets. Businesses are seeing an increased volume of data breaches, where an opportunist attacker from outside the business or a disaffected employee successfully exploits poor company practices. Rather than being a regurgitation of the PCI DSS controls, this book aims to help you balance the needs of running your business with the value of implementing PCI DSS for the protection of consumer payment card data. Applying lessons learned from history, military experiences (including multiple deployments into hostile areas), numerous PCI QSA assignments, and corporate cybersecurity and InfoSec roles, author Jim Seaman helps you understand the complexities of the payment card industry data security standard as you protect cardholder data. You will learn how to align the standard with your business IT systems or operations that store, process, and/or transmit sensitive data. This book will help you develop a business cybersecurity and InfoSec strategy through the correct interpretation, implementation, and maintenance of PCI DSS. You will: Be aware of recent data privacy regulatory changes and the release of PCI DSS v4.0 Improve the defense of consumer payment card data to safeguard the reputation of your business and make it more difficult for criminals to breach security Be familiar with the goals and requirements related to the structure and interdependencies of PCI DSS Know the potential avenues of attack associated with business payment operations Make PCI DSS an integral component of your business operations Understand the benefits of enhancing your security culture See how the implementation of PCI DSS causes a positive ripple effect across your business.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
e-Commerce/e-business.
$3
1005486
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5808-8
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9392939
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 S436 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入