PCI Compliance

Understand and Implement Effective PCI Data Security Standard Compliance


  • Branden Williams, (CISSP, CISM, CPISA, CPISM)
  • Anton Chuvakin, Ph.D., Stony Brook University, Stony Brook, NY., is a recognized security expert in the field of log management and PCI DSS compliance.

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of customers and costing companies millions of dollars in fines and reparations. That doesn’t include the effects such security breaches have on the reputation of the companies that suffer attacks. PCI Compliance, 3e, helps readers avoid costly breaches and inefficient compliance initiatives to keep their infrastructure secure.
View full description


IT Security Professionals (Security Auditors, Security Engineers, Compliance Specialists, etc.), IT Professionals (Network Administrators, IT Managers, Security Managers, Security Analysts, Directors of Security,etc.)


Book information

  • Published: August 2012
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-948-4


"Williams and Chuvakin provide background on Version 2.0 of the Payment Card Industry Data Security Standard (PCI DSS), the minimum standard with which vendors must comply to ensure data security. They also provide instruction on how to implement security that is in compliance with industry guidelines and successfully ensures the safety of sensitive and personally identifiable information."--Reference and Research Book News, August 2013

Table of Contents

CHAPTER 1. About PCI and This BookCHAPTER 2. Introduction to Fraud, Data Theft, and Related Regulatory MandatesCHAPTER 3. Why Is PCI Here?CHAPTER 4. Determining and Reducing the PCI ScopeCHAPTER 5. Building and Maintaining a Secure NetworkCHAPTER 6. Strong Access ControlsCHAPTER 7. Protecting Cardholder DataCHAPTER 8. Using Wireless NetworkingCHAPTER 9. Vulnerability ManagementCHAPTER 10. Logging Events and Monitoring the Cardholder Data EnvironmentCHAPTER 11. PCI for the Small BusinessCHAPTER 12. Managing a PCI DSS Project to Achieve ComplianceCHAPTER 13. Don’t Fear the AssessorCHAPTER 14. The Art of Compensating ControlCHAPTER 15. You’re Compliant, Now What?CHAPTER 16. Emerging Technology and Alternative Payment SchemesCHAPTER 17. Myths and Misconceptions of PCI DSS