Cargando…
Hacking point of sale: payment application secrets, threats, and solutions
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protec...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Wiley
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1668324 |
_version_ | 1780935484494577664 |
---|---|
author | Gomzin, Slava |
author_facet | Gomzin, Slava |
author_sort | Gomzin, Slava |
collection | CERN |
description | Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendati |
id | cern-1668324 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Wiley |
record_format | invenio |
spelling | cern-16683242021-04-21T21:14:39Zhttp://cds.cern.ch/record/1668324engGomzin, SlavaHacking point of sale: payment application secrets, threats, and solutionsComputing and computers Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendatiWileyoai:cds.cern.ch:16683242014 |
spellingShingle | Computing and computers Gomzin, Slava Hacking point of sale: payment application secrets, threats, and solutions |
title | Hacking point of sale: payment application secrets, threats, and solutions |
title_full | Hacking point of sale: payment application secrets, threats, and solutions |
title_fullStr | Hacking point of sale: payment application secrets, threats, and solutions |
title_full_unstemmed | Hacking point of sale: payment application secrets, threats, and solutions |
title_short | Hacking point of sale: payment application secrets, threats, and solutions |
title_sort | hacking point of sale: payment application secrets, threats, and solutions |
topic | Computing and computers |
url | http://cds.cern.ch/record/1668324 |
work_keys_str_mv | AT gomzinslava hackingpointofsalepaymentapplicationsecretsthreatsandsolutions |