
Hacking Point of Sale - Payment Application Secrets, Threats, and Solutions
Free delivery worldwide
Available. Expected delivery to the United States in 7-12 business days.
Not ordering to the United States? Click here.
Description
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.
* A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application * Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO * Explains how protected areas are hacked and how hackers spot vulnerabilities * Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.
show more
* A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application * Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO * Explains how protected areas are hacked and how hackers spot vulnerabilities * Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.
show more
Product details
- Paperback | 312 pages
- 189 x 234 x 15mm | 544g
- 25 Mar 2014
- John Wiley & Sons Inc
- New York, United States
- English
- black & white illustrations, black & white tables, figures
- 1118810112
- 9781118810118
- 867,655
Back cover copy
Implement bulletproof point of sale security for your payment transactions
Hacking Point of Sale takes a unique look at point of sale security from the viewpoint of your business, not a credit card company. The book provides proven techniques that are designed to help brick-and-mortar merchants properly protect their entire in-store payment infrastructure. The book also includes a POS vulnerability rank calculator to help you perform a risk assessment and security control evaluation as you implement recommendations to improve your existing infrastructure. Eliminate breaches in security related to design flaws and physical vulnerabilities Use point-to-point encryption to protect your front-end and back-end payment systems Close gaps in protection provided by PCI security standards Understand the anatomy of a credit card and how payment cards can be compromised Explore the most relevant standards for payment application security, including PCI, FIPS, ANSI, EMV, and ISO Get practical recommendations on powerful payment application security controls designed to protect against a wide array of common breach attempts
show more
Hacking Point of Sale takes a unique look at point of sale security from the viewpoint of your business, not a credit card company. The book provides proven techniques that are designed to help brick-and-mortar merchants properly protect their entire in-store payment infrastructure. The book also includes a POS vulnerability rank calculator to help you perform a risk assessment and security control evaluation as you implement recommendations to improve your existing infrastructure. Eliminate breaches in security related to design flaws and physical vulnerabilities Use point-to-point encryption to protect your front-end and back-end payment systems Close gaps in protection provided by PCI security standards Understand the anatomy of a credit card and how payment cards can be compromised Explore the most relevant standards for payment application security, including PCI, FIPS, ANSI, EMV, and ISO Get practical recommendations on powerful payment application security controls designed to protect against a wide array of common breach attempts
show more
Table of contents
Introduction xxiii Part I Anatomy of Payment Application Vulnerabilities 1 Chapter 1 Processing Payment Transactions 3 Chapter 2 Payment Application Architecture 25 Chapter 3 PCI 55 Part II Attacks on Point of Sale Systems 91 Chapter 4 Turning 40 Digits into Gold 93 Chapter 5 Penetrating Security Free Zones 125 Chapter 6 Breaking into PCI-protected Areas 147 Part III Defense 165 Chapter 7 Cryptography in Payment Applications 167 Chapter 8 Protecting Cardholder Data 195 Chapter 9 Securing Application Code 219 Conclusion 249 Appendix A POS Vulnerability Rank Calculator 251 Appendix B Glossary 257 Index 265
show more
show more
About S Gomzin
Slava Gomzin, CISSP, PCIP, ECSP, Security+ is the Security and Payments Technologist at Hewlett-Packard. Prior to joining HP, Slava was a security architect and PCI ISA, corporate product security officer, and R&D and application security manager at Retalix, a Division of NCR Retail.
show more
show more