Cargando…

Hacking point of sale: payment application secrets, threats, and solutions

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protec...

Descripción completa

Detalles Bibliográficos
Autor principal: Gomzin, Slava
Lenguaje:eng
Publicado: Wiley 2014
Materias:
Acceso en línea:http://cds.cern.ch/record/1668324
_version_ 1780935484494577664
author Gomzin, Slava
author_facet Gomzin, Slava
author_sort Gomzin, Slava
collection CERN
description Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendati
id cern-1668324
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2014
publisher Wiley
record_format invenio
spelling cern-16683242021-04-21T21:14:39Zhttp://cds.cern.ch/record/1668324engGomzin, SlavaHacking point of sale: payment application secrets, threats, and solutionsComputing and computers Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendatiWileyoai:cds.cern.ch:16683242014
spellingShingle Computing and computers
Gomzin, Slava
Hacking point of sale: payment application secrets, threats, and solutions
title Hacking point of sale: payment application secrets, threats, and solutions
title_full Hacking point of sale: payment application secrets, threats, and solutions
title_fullStr Hacking point of sale: payment application secrets, threats, and solutions
title_full_unstemmed Hacking point of sale: payment application secrets, threats, and solutions
title_short Hacking point of sale: payment application secrets, threats, and solutions
title_sort hacking point of sale: payment application secrets, threats, and solutions
topic Computing and computers
url http://cds.cern.ch/record/1668324
work_keys_str_mv AT gomzinslava hackingpointofsalepaymentapplicationsecretsthreatsandsolutions