جزییات کتاب
Content: Technical Editor, Page vAcknowledgements, Page viContributors, Pages vii-ixChapter 1 - About PCI and This Book, Pages 1-5Chapter 2 - Introduction to Fraud, ID Theft and Regulatory Mandates, Pages 7-10Chapter 3 - Why PCI Is Important, Pages 11-31Chapter 4 - Building Maintaining a Secure Network, Pages 33-66Chapter 5 - Protect Cardholder Data, Pages 67-92Chapter 6 - Logging Access Events Chapter, Pages 93-123Chapter 7 - Strong Access Control, Pages 125-163Chapter 8 - Vulnerability Management, Pages 165-184Chapter 9 - Monitoring and Testing, Pages 185-204Chapter 10 - How to Plan a Project to Meet Compliance, Pages 205-231Chapter 11 - Responsibilities, Pages 233-253Chapter 12 - Planning to Fail Your First Audit, Pages 255-269Chapter 13 - You're Compliant, Now What, Pages 271-316Index, Pages 317-329