Description

Book Synopsis
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately.

Table of Contents

Introduction xxiii

Part I Anatomy of Payment Application Vulnerabilities 1

Chapter 1 Processing Payment Transactions 3

Chapter 2 Payment Application Architecture 25

Chapter 3 PCI 55

Part II Attacks on Point of Sale Systems 91

Chapter 4 Turning 40 Digits into Gold 93

Chapter 5 Penetrating Security Free Zones 125

Chapter 6 Breaking into PCI-protected Areas 147

Part III Defense 165

Chapter 7 Cryptography in Payment Applications 167

Chapter 8 Protecting Cardholder Data 195

Chapter 9 Securing Application Code 219

Conclusion 249

Appendix A POS Vulnerability Rank Calculator 251

Appendix B Glossary 257

Index 265

Hacking Point of Sale

Product form

£45.12

Includes FREE delivery

RRP £47.50 – you save £2.38 (5%)

Order before 4pm tomorrow for delivery by Wed 14 Jan 2026.

A Paperback / softback by Slava Gomzin

1 in stock


    View other formats and editions of Hacking Point of Sale by Slava Gomzin

    Publisher: John Wiley & Sons Inc
    Publication Date: 25/03/2014
    ISBN13: 9781118810118, 978-1118810118
    ISBN10: 1118810112

    Description

    Book Synopsis
    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately.

    Table of Contents

    Introduction xxiii

    Part I Anatomy of Payment Application Vulnerabilities 1

    Chapter 1 Processing Payment Transactions 3

    Chapter 2 Payment Application Architecture 25

    Chapter 3 PCI 55

    Part II Attacks on Point of Sale Systems 91

    Chapter 4 Turning 40 Digits into Gold 93

    Chapter 5 Penetrating Security Free Zones 125

    Chapter 6 Breaking into PCI-protected Areas 147

    Part III Defense 165

    Chapter 7 Cryptography in Payment Applications 167

    Chapter 8 Protecting Cardholder Data 195

    Chapter 9 Securing Application Code 219

    Conclusion 249

    Appendix A POS Vulnerability Rank Calculator 251

    Appendix B Glossary 257

    Index 265

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account