Hacking Point of Sale describes the payment application security as a journey from the failure of the security through obscurity approach to the power of real cryptographic solutions. All aspects of card-payment processing, from the structure of magnetic stripes to the architecture and deployment models of payment applications, are reviewed from the viewpoint of security. Although there is an entire chapter about PCI, as well as multiple references to the standards (an essential part of the payment industry), the book is not a trivial guide to PCI compliance butlooks beyond PCI and provides practical recommendations on how to implement real application security controls. The book covers:Anatomy of Electronic Payments: Processing Payment Transactions; Architecture of Payment Applications; Security Standards; Attacks on Point-of-Sale SystemsTurning 40 Digits into Gold: Hacking Protected Areas;Penetrating the Security-Free Zone; Exploiting Other VulnerabilitiesDefense: Cryptography in Payment Applications; Protecting Cardholder Data; Securing Application CodeAn Appendix provides a Payment Application Security Evaluation Checklist, a handy tool for merchants, software vendors, and security assessors. The checklist will assist in security risk assessment by evaluating the quality of payment application security controls.
Additional ISBNs: 9781118810118, 1118810112, 9781118810101, 1118810104


A Wellness Way of Life
A Guide to Online Course Design: Strategies for Student Success
A History of Western Society, Concise Edition, Volume Two
Abnormal Psychology: Clinical and Scientific Perspectives
A Radiant Life
A Lasting Promise: The Christian Guide to Fighting for Your Marriage, New and Revised Edition
A History of World Societies, Concise, Volume 1
A History of World Societies, Value Edition, Volume 2
A Framework for Understanding Poverty
A Practical Companion to Ethics 
Review Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
There are no reviews yet.