Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200613 a 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr un|---aucuu 
008    200509s2020    cau     ob    001 0 eng d 
019    1155882974|a1156779311|a1157252713|a1157691299|a1158325544
020    9781484258088|q(electronic bk.) 
020    1484258088|q(electronic bk.) 
024 7  10.1007/978-1-4842-5808-8|2doi 
024 8  10.1007/978-1-4842-5 
029 1  AU@|b000068658702 
035    (OCoLC)1153844850|z(OCoLC)1155882974|z(OCoLC)1156779311
       |z(OCoLC)1157252713|z(OCoLC)1157691299|z(OCoLC)1158325544 
037    0406E1FE-2B0A-45E2-ABA0-E8EB7E9B0BF7|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    EBLCP|beng|epn|cEBLCP|dGW5XE|dEBLCP|dLQU|dUPM|dOCLCF
       |dTEFOD|dUKAHL|dAUD|dOCLCO|dOCLCQ|dCOM|dOCLCQ|dOCLCO
       |dOCLCQ 
049    INap 
082 04 005.8 
082 04 005.8|223 
099    eBook O'Reilly for Public Libraries 
100 1  Seaman, Jim. 
245 10 PCI DSS :|ban integrated data security standard guide /
       |cJim Seaman.|h[O'Reilly electronic resources] 
260    Berkeley, CA :|bApress,|c2020. 
300    1 online resource (549 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file 
347    |bPDF 
500    Accessing Applicability 
504    Includes bibliographical references and index. 
505 0  Intro -- Table of Contents -- About the Author -- About 
       the Technical Reviewer -- Introduction -- A Tribute To -- 
       Chapter 1: An Evolving Regulatory Perspective -- 
       Introduction -- Revolution or Evolution? -- Europe -- 
       Canada -- United States -- Australia -- China -- Japan -- 
       Argentina -- Malaysia -- Brazil -- India -- Financial 
       Services -- Data Privacy Hierarchy -- PCI DSS Validation 
       Requirements -- Recommendations -- Behaviors -- Leadership
       -- Consent or Legitimate Use -- Conclusion -- Key 
       Takeaways -- Risks -- Chapter 2: The Evolution of PCI DSS 
505 8  Associated Costs (Non-compliance/Data Breach) -- 
       Introduction -- PCI DSS Controls Framework Architecture --
       Primary (Core) Ring -- Secondary Ring -- Tertiary Ring -- 
       Quaternary Ring -- Quinary Ring -- Senary (Outer) Ring -- 
       Historic References -- Build and Maintain a Secure Network
       -- Protect Cardholder Data -- Maintain a Vulnerability 
       Management Program -- Implement Strong Access Control 
       Measures -- Regularly Monitor and Test Networks -- 
       Maintain an Information Security Policy -- Reality Bites -
       - Recommendations -- Conclusion -- Key Takeaways -- Risks 
       -- Chapter 3: Data Life Support System 
505 8  Introduction -- Concept -- Lessons Learned -- Layered 
       Defenses -- 24/7 Monitoring -- Physical Security -- 
       Incident Response -- Blood Life-Cycle Management -- 
       Recommendations -- Conclusion -- Key Takeaways -- Risks --
       Chapter 4: An Integrated Cyber/InfoSec Strategy -- 
       Introduction -- Components of an Effective Strategy -- 
       Data Privacy -- Cyber Security -- External Attack Surface 
       Reconnaissance -- Information Gathering -- PCI DSS 
       Applicable Controls -- External Technologies -- 
       Information Security -- Physical Security -- Resilience --
       What Is Resilience? -- Recommendations -- Conclusion 
505 8  Key Takeaways -- Risks -- Chapter 5: The Importance of 
       Risk Management -- Introduction -- What Is a Risk 
       Assessment? -- Background -- Scenario Development -- Think
       Like an Attacker -- Risk Scenarios -- Risk Assessment 
       Process -- Reality Bites -- Recommendations -- Conclusion 
       -- Key Takeaways -- Risks -- Chapter 6: Risk Management 
       vs. Compliance -- The Differentiator -- Introduction -- 
       PCI DSS Is Not a Legal Requirement ... -- ... But Should 
       Be a Business Requirement? -- Concept -- How Is This 
       Achieved? -- Qualitative vs. Quantitative Risk Assessment 
       -- Qualitative Risk Assessments 
505 8  Quantitative Risk Assessments -- Risk Appetite/Tolerance -
       - Case Studies -- Case Study 1: Telephone-Based Payments 
       Risk Balance Case -- Case Study 2: Enhanced PCI DSS 
       Program Through Integration into Enterprise Risk 
       Management (ERM) -- Reality Bites -- Recommendations -- 
       Conclusion -- Key Takeaways -- Risks -- Chapter 7: PCI DSS
       Applicability -- PCI DSS Overview -- Introduction -- The 
       Precious Cargo -- Structure of a Payment Card -- Precious 
       Cargo Categories -- Front of Payment Card Breakdown -- 
       Rear of Payment Card Breakdown -- Personal Identification 
       Number (PIN)/PIN Blocks -- CHD Storage 
520    Gain a broad understanding of how PCI DSS is structured 
       and obtain a high-level view of the contents and context 
       of each of the 12 top-level requirements. The guidance 
       provided in this book will help you effectively apply PCI 
       DSS in your business environments, enhance your payment 
       card defensive posture, and reduce the opportunities for 
       criminals to compromise your network or steal sensitive 
       data assets. Businesses are seeing an increased volume of 
       data breaches, where an opportunist attacker from outside 
       the business or a disaffected employee successfully 
       exploits poor company practices. Rather than being a 
       regurgitation of the PCI DSS controls, this book aims to 
       help you balance the needs of running your business with 
       the value of implementing PCI DSS for the protection of 
       consumer payment card data. Applying lessons learned from 
       history, military experiences (including multiple 
       deployments into hostile areas), numerous PCI QSA 
       assignments, and corporate cybersecurity and InfoSec roles,
       author Jim Seaman helps you understand the complexities of
       the payment card industry data security standard as you 
       protect cardholder data. You will learn how to align the 
       standard with your business IT systems or operations that 
       store, process, and/or transmit sensitive data. This book 
       will help you develop a business cybersecurity and InfoSec
       strategy through the correct interpretation, 
       implementation, and maintenance of PCI DSS. You will: Be 
       aware of recent data privacy regulatory changes and the 
       release of PCI DSS v4.0 Improve the defense of consumer 
       payment card data to safeguard the reputation of your 
       business and make it more difficult for criminals to 
       breach security Be familiar with the goals and 
       requirements related to the structure and 
       interdependencies of PCI DSS Know the potential avenues of
       attack associated with business payment operations Make 
       PCI DSS an integral component of your business operations 
       Understand the benefits of enhancing your security culture
       See how the implementation of PCI DSS causes a positive 
       ripple effect across your business. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer security. 
650  2 Computer Security 
650  6 Sécurité informatique. 
650  7 Computer security|2fast 
776 08 |iPrint version:|aSeaman, Jim.|tPci Dss : An Integrated 
       Data Security Standard Guide.|dBerkeley, CA : Apress L.P.,
       ©2020|z9781484258071 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781484258088/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH37506402 
938    ProQuest Ebook Central|bEBLB|nEBL6190200 
994    92|bJFN