|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn957128409 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
160820s2016 xx ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d JSTOR
|d OCLCF
|d YDX
|d TEFOD
|d COO
|d OCLCQ
|d OCLCO
|d IDB
|d MERUC
|d OCLCQ
|d VT2
|d IOG
|d OCLCA
|d UOK
|d OCLCQ
|d WYU
|d UAB
|d LVT
|d K6U
|d B@L
|d OCLCQ
|d N$T
|d D6H
|d UKBTH
|d OCLCO
|d OCLCQ
|d BRF
|d LIV
|d OCLCO
|
019 |
|
|
|a 957021539
|a 1050293725
|a 1055865897
|a 1084337261
|a 1159657169
|a 1179732758
|
020 |
|
|
|a 9781849288446
|q (electronic bk.)
|
020 |
|
|
|a 1849288445
|q (electronic bk.)
|
020 |
|
|
|a 9781849288460
|q (electronic bk.)
|
020 |
|
|
|a 1849288461
|q (electronic bk.)
|
020 |
|
|
|z 9781849288439
|
020 |
|
|
|z 1849288437
|
024 |
8 |
|
|a 9781849288446
|
029 |
1 |
|
|a AU@
|b 000060764400
|
029 |
1 |
|
|a AU@
|b 000067092918
|
029 |
1 |
|
|a CHNEW
|b 000912845
|
035 |
|
|
|a (OCoLC)957128409
|z (OCoLC)957021539
|z (OCoLC)1050293725
|z (OCoLC)1055865897
|z (OCoLC)1084337261
|z (OCoLC)1159657169
|z (OCoLC)1179732758
|
037 |
|
|
|a 22573/ctt1dwb2sx
|b JSTOR
|
037 |
|
|
|a B0B7ADFB-5773-4840-8E8A-1D459FC39689
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b C35 2016eb
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan.
|
245 |
1 |
0 |
|a PCI DSS :
|b a pocket guide /
|c Alan Calder, Geraint Williams.
|
250 |
|
|
|a 5th ed.
|
260 |
|
|
|a Ely :
|b IT Governance Publishing,
|c 2016.
|
300 |
|
|
|a 1 online resource (66 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title; Copyright; Contents; Chapter 1: What is the Payment Card Industry Data Security Standard (PCI DSS)?; Chapter 2: What is the Scope of the PCI DSS?; Chapter 3: Compliance and Compliance Programmes; Chapter 4: Consequences of a Breach; Chapter 5: How do you Comply with the Requirements of the Standard?; Chapter 6: Maintaining Compliance; Chapter 7: PCI DSS -- The Standard; Chapter 8: Aspects of PCI DSS Compliance; Chapter 9: The PCI Self-Assessment Questionnaire (SAQ); Chapter 10: Procedures and Qualifications; Chapter 11: The PCI DSS and ISO/IEC 27001.
|
505 |
8 |
|
|a Chapter 12: The Payment Application Data Security Standard (PA-DSS)Chapter 13: PIN transaction Security (PTS); IT Governance Resources.
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a An ideal introduction and a quick reference to PCI DSS version 3.2, this book provides all the information you need to consider as you approach the PCI DSS, and is also a practical training resource for anyone in your organization involved with payment card processing. --
|c Edited summary from book.
|
542 |
|
|
|f Copyright © Alan Calder and Geraint Williams
|g 2016
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
700 |
1 |
|
|a Williams, Geraint.
|
776 |
0 |
8 |
|i Print version:
|a Calder, Alan.
|t PCI DSS : A Pocket Guide.
|d Ely : IT Governance Publishing, ©2016
|z 9781849288439
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1dwst4j
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4647639
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1357148
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13124846
|
994 |
|
|
|a 92
|b IZTAP
|