PCI compliance : (Record no. 70895)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02521cam a2200337Ii 4500 |
001 - CONTROL NUMBER | |
control field | 9780429086304 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180331t20142014flua obf 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780429086304 |
-- | (e-book : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781498759991 |
-- | (e-book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | (hardback) |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 332.1780681 |
-- | B575 |
100 1# - AUTHOR NAME | |
Author | Bhargav, Abhay, |
245 10 - TITLE STATEMENT | |
Title | PCI compliance : |
Sub Title | the definitive guide / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | chapter 1. Payment-card industry : an evolution -- chapter 2. Card anatomy : the essentials -- chapter 3. Security and the payment-card industry -- chapter 4. Payment Card Industry Data Security Standard (PCI-DSS) -- chapter 5. The Payment Application Data Security Standard (PA-DSS) -- chapter 6. Enterprise approach to PCI compliance -- chapter 7. Scoping for PCI compliance -- chapter 8. Requirement 1 : build and maintain a secure network -- chapter 9. Requirement 2 : vendor-supplied defaults, system passwords, and security parameters -- chapter 10. Requirement 3 : protect stored cardholder data -- chapter 11. Requirement 4 : securing cardholder information in transit -- chapter 12. Requirement 5 : use and regularly update antivirus software -- chapter 13. Requirement 6 : develop and maintain secure systems -- chapter 14. Requirement 7 : restrict access to cardholder data by business need to know -- chapter 15. Requirement 8 : access-control requirements for PCI environments -- chapter 16. Requirement 9 : restrict physical access to cardholder data -- chapter 17. Requirement 10 : logging and monitoring for the PCI standards -- chapter 18. Requirement 11 : security testing for the PCI environment -- chapter 19. Requirement 12 : information security policies and practices for PCI compliance -- chapter 20. Beyond PCI compliance. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Standards |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.taylorfrancis.com/books/9781439887417 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Boca Raton : |
-- | CRC Press, |
-- | [2014] |
264 #4 - | |
-- | ©2014 |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Credit cards |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection |
No items available.