All
All

PCI Compliance: The Definitive Guide

270 KB | 3 files |  PDF

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise.

IT Download image

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explains the ins and outs of the payment card industry (PCI) security standards in a manner that is easy to understand.

This step-by-step guidebook delves into PCI standards from an implementation standpoint. It begins with a basic introduction to PCI compliance, including its history and evolution. It then thoroughly and methodically examines the specific requirements of PCI compliance. PCI requirements are presented along with notes and assessment techniques for auditors and assessors.

The text outlines application development and implementation strategies for Payment Application Data Security Standard (PA-DSS) implementation and validation. Explaining the PCI standards from an implementation standpoint, it clarifies the intent of the standards on key issues and challenges that entities must overcome in their quest to meet compliance requirements.

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compli­ance and achieve optimum information security for the enterprise.

Excerpted with permission from the publisher, Auerbach Publications, from "PCI Compliance: The Definitive Guide" by Abhay Bhargav. Copyright © 2014.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • BeyondPCICompliance.pdf

IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

Security10 Job Description: Cybersecurity Program Manager

The cybersecurity program manager will support the execution of product cybersecurity elements across global programs and services. ...  More >>

Time4 The Time Bandit Solution: Recovering Stolen Time You Never Knew You Had

This excerpt from chapters 1:00 and 1:30 focuses on the causes and manifestations of time lost as a result of unwanted, unnecessary and wasteful interruptions, and provides a calculator to measure how much of your time is wasted by interruption time-loss factors. ...  More >>

Misc6 Powered by Purpose

This excerpt from chapter 2 focuses on identifying your values and how they affect the decisions you make in your personal and professional life every day. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data


Thanks for your registration, follow us on our social networks to keep up-to-date