Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
by Slava Gomzin
This title has not yet been published (see below for estimated publication date). If you choose to preorder, your credit card will not be charged until then. You'll receive an email confirmation when we ship your order. You may cancel your order anytime by emailing email@example.com
- Anatomy of Electronic Payments: Processing Payment Transactions; Architecture of Payment Applications; Security Standards; Attacks on Point-of-Sale Systems
- Attacks on Point of Sale Systems: Turning 40 Digits into Gold; Hacking Protected Areas; Penetrating the Security-Free Zone; Exploiting Other Vulnerabilities
- Defense: Cryptography in Payment Applications; Protecting Cardholder Data; Securing Application Code
- An Appendix provides a Payment Application Security Evaluation Checklist, a handy tool for merchants, software vendors, and security assessors. The checklist will assist in security risk assessment by evaluating the quality of payment application security controls.
Unless otherwise noted above, most orders ship within 1 to 2 days. We will promptly notify you if there is a stock problem with any items on your order and provide you with an estimated delivery date. If you have a firm need by date, please provide such information in the comment section at checkout.
Page Count (est.): 384
Pub Date: 2/17/2014