• Complain

Chuvakin Anton - PCI Compliance

Here you can read online Chuvakin Anton - PCI Compliance full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2012, publisher: Elsevier Science;Syngress, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

PCI Compliance: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "PCI Compliance" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of customers and costing companies millions of dollars in fines and reparations. That doesnt include the effects such security breaches have on the reputation of the companies that suffer attacks. PCI Compliance, 3e, helps readers avoid costly breaches and inefficient compliance initiatives to keep their infrastructure secure. Provides a clear explanation of PCI Provides practical case studies, fraud studies, and analysis of PCI The first book to address version 2.0 updates to the PCI DSS, security strategy to keep your infrastructure PCI compliant.

Chuvakin Anton: author's other books


Who wrote PCI Compliance? Find out the surname, the name of the author of the book and a list of all author's works by series.

PCI Compliance — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "PCI Compliance" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
PCI Compliance Understand and Implement Effective PCI Data Security Standard - photo 1
PCI Compliance

Understand and Implement Effective PCI Data Security Standard Compliance

Third Edition

Branden R. Williams

Anton A. Chuvakin

Technical Editor

Derek Milroy

Table of Contents Copyright Acquiring Editor Chris Katsaropolous - photo 2

Table of Contents
Copyright

Acquiring Editor:Chris Katsaropolous

Development Editor:Heather Scherer

Project Manager:Jessica Vaughan

Designer:Russell Purdy

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

2012 ELSEVIER, Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Application submitted

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

ISBN: 978-1-59749-948-4

Printed in the United States of America

12 13 14 15 16 10 9 8 7 6 5 4 3 2 1

For information on all Syngress publications visit our website at - photo 3

For information on all Syngress publications visit our website at www.syngress.com

Acknowledgements

This revision has been a long time coming, and weve made adjustments that you readers have asked for. My sincere thanks to all of you out there for continuing to fight the good fight while using this book as a guide!

This book is dedicated to my wife Christine, my children Garrett and Payton, and my extended family for supporting the effort to make this work the central tome for the industry. Still looking forward to that day where our biggest decision is the bench on which we will enjoy lunch!

We need to give a HUGE thanks to Derek Milroy for stepping up and providing great content around Windows, vulnerability management, and being the sole technical editor for this book. You will find his influence in every chapter of this edition. Without him, we never would have been able to release this book when we did.

And finally, to you, the reader. Whether you are in internal audit, a QSA, or simply someone responsible for some portion of PCI DSS, you live in the trenches implementing solutions every day. Keep at it, and dont lose sight of the end game: to securely grow your business!

Branden R. Williams

First and foremost, the most important part: Id like to thank my wife Olga for being my eternal inspiration for all my writing, for providing invaluable economic advice, and for tolerating (well, almost always) my work on the book during those evening hours that we could have spent together.

Next, Id like to specially thank Derek Milroy for his exclusive material used in Chapter 9, Vulnerability Management, and also for reviewing the book contents.

Also, Id like to personally thank the following people for their contributions to the book:

Walt Conway from 403 Labs for his insightful example used in Chapter 3, Why Is PCI Here?

John Kindervag from Forrester Research for inventing the concept of customer data security as part of corporate social responsibility (mentioned in Chapter 17, Myths and Misconceptions of PCI DSS).

Dr. Anton A. Chuvakin

About the Authors

Branden R. Williams (CISSP, CISM) is a CTO at RSA, the security division of EMC and represents RSA on the PCI Board of Advisors. He has been involved in information technology since 1994 and has focused on information security since 1996. He started consulting on payment security in 2004, assessing companies against the Visa CISP and MasterCard SDP programs. He has a Bachelors of Business Administration in Marketing from the University of Texas, Arlington, and a Masters of Business Administration in Supply Chain Management and Market Logistics from the University of Dallas.

Branden spent several years as an Adjunct Professor at the University of Dallas, Graduate School of Management, and is an ISSA Fellow. He publishes a monthly column in the ISSA Journal entitled Herding Cats and authors a blog at www.brandenwilliams.com/.

Dr. Anton A. Chuvakin is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. Anton is the co-author of Security Warrior (ISBN: 978-0-596-00545-0) and a contributing author to Know Your Enemy: Learning About Security Threats, Second Edition (ISBN: 978-0-321-16646-3); Information Security Management Handbook, Sixth Edition (ISBN: 978-0-8493-7495-1); Hackers Challenge 3: 20 Brand-New Forensic Scenarios & Solutions (ISBN: 978-0-072-26304-6); OSSEC Host-Based Intrusion Detection Guide (Syngress , ISBN: 978-1-59749- 240-9); and others.

Anton has published dozens of papers on log management, correlation, data analysis, PCI DSS, security management, and other security subjects. His blog, www.securitywarrior.org, was one of the most popular in the industry. In addition, Anton taught classes and presented at many security conferences across the world; He recently addressed audiences in the United States, United Kingdom, Singapore, Spain, Russia, and other countries. He worked on emerging security standards and served on the advisory boards of several security start-ups. Until recently, Anton ran his own consulting firm, Security Warrior. Prior to that, he was formerly a Director of PCI Compliance Solutions at Qualys and as Chief Logging Evangelist at LogLogic, tasked with educating the world about the importance of logging for security, compliance, and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.

Technical Editor

Derek Milroy(CISSP, CISA) Derek Milroy is a corporate security professional that has been implementing security in corporate environments, as both an internal employee and as a consultant, for the past ten plus years. His main areas of focus include implementing: Windows Hardening (also Forest/Domain/GPO architectures), Vulnerability Management, Patch Management, Log Management/SIM/SEIM, and Intrusion Prevention technologies. He is a former QSA and has also performed ISO 72001/27002 and NIST 800-53A assessments.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «PCI Compliance»

Look at similar books to PCI Compliance. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «PCI Compliance»

Discussion, reviews of the book PCI Compliance and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.