|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn937997168 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
160210s2015 enk ob 000 0 eng d |
040 |
|
|
|a JSTOR
|b eng
|e rda
|e pn
|c JSTOR
|d B24X7
|d STF
|d OCLCF
|d EBLCP
|d YDXCP
|d COO
|d D6H
|d IDB
|d LIV
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d OCLCQ
|d WYU
|d LVT
|d C6I
|d CNCEN
|d ERF
|d OCLCQ
|d UHL
|d UKBTH
|d UX1
|d BRF
|d OCLCO
|d TOH
|d OCLCO
|d TAC
|d OCLCO
|d OCLCQ
|d FZL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 941700557
|a 948966313
|a 961598564
|a 1105797116
|a 1112553666
|a 1113236962
|a 1113536033
|a 1175637389
|a 1235776540
|a 1302701924
|a 1351589198
|a 1355686514
|a 1380770420
|
020 |
|
|
|a 9781849287821
|q (electronic bk.)
|
020 |
|
|
|a 1849287821
|q (electronic bk.)
|
020 |
|
|
|a 184928783X
|
020 |
|
|
|a 9781849287838
|
020 |
|
|
|z 1849287813
|
020 |
|
|
|z 9781849287814
|
020 |
|
|
|z 9781849287838
|
024 |
8 |
|
|a 9781849287838
|
029 |
1 |
|
|a AU@
|b 000062513235
|
029 |
1 |
|
|a AU@
|b 000067092919
|
029 |
1 |
|
|a CHNEW
|b 000895038
|
029 |
1 |
|
|a GBVCP
|b 104897295X
|
035 |
|
|
|a (OCoLC)937997168
|z (OCoLC)941700557
|z (OCoLC)948966313
|z (OCoLC)961598564
|z (OCoLC)1105797116
|z (OCoLC)1112553666
|z (OCoLC)1113236962
|z (OCoLC)1113536033
|z (OCoLC)1175637389
|z (OCoLC)1235776540
|z (OCoLC)1302701924
|z (OCoLC)1351589198
|z (OCoLC)1355686514
|z (OCoLC)1380770420
|
037 |
|
|
|a 22573/ctt18ddhj5
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b C35 2015eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan,
|d 1957-
|e author.
|
245 |
1 |
0 |
|a PCI DSS :
|b a pocket guide /
|c Alan Calder, Geraint Williams.
|
250 |
|
|
|a Fourth edition.
|
264 |
|
1 |
|a Ely, Cambridgeshire, United Kingdom :
|b It Governance Publishing,
|c 2015.
|
300 |
|
|
|a 1 online resource (65 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
0 |
|
|a Compliance series
|
504 |
|
|
|a Includes bibliographical references (pages 60-65).
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that protects cardholder data effectively. All organisations that accept, store, transmit or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. This book has been updated to cover PCI DSS version 3.1. Topics include: overview of Payment Card Industry Data Security Standard v3.1; PCI self-assessment questionnaire (SAQ); procedures and qualifications; compliance; consequences of a breach; PCI DSS and ISO/IEC 27001; Payment Application Data Security Standard (PA-DSS); IN Transaction Security (PTS). --
|c Edited summary from book.
|
505 |
0 |
|
|a Cover; Title; Copyright; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: What is the Payment Card Industry Data Security Standard (PCI DSS)?; Chapter 2: What is the Scope of the PCI DSS?; Chapter 3: Compliance and Compliance Programmes; Chapter 4: Consequences of a Breach; Chapter 5: How do you Comply with the Requirements of the Standard?; Chapter 6: Maintaining Compliance; Chapter 7: PCI DSS -- The Standard; Chapter 8: Aspects of PCI DSS Compliance; Chapter 9: The PCI Self-Assessment Questionnaire (SAQ); Chapter 10: Procedures and Qualifications.
|
505 |
8 |
|
|a Chapter 11: The PCI DSS and ISO/IEC 27001Chapter 12: The Payment Application Data Security Standard (PA-DSS); Chapter 13: PIN transaction Security (PTS); IT Governance Resources.
|
542 |
|
|
|f Copyright © IT Governance Publishing
|g 2015
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
653 |
|
|
|a Security
|
700 |
1 |
|
|a Williams, Geraint,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Calder, Alan.
|t Pci dss
|z 1849287813
|w (OCoLC)929123758
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt19qgf5h
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00104110
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4395806
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12691343
|
994 |
|
|
|a 92
|b IZTAP
|