Essentials of online payment security and fraud prevention
"Essential guidance for preventing fraud in the card-not-present (CNP) space This book focuses on the prevention of fraud for the card-not-present transaction. The payment process, fraud schemes, and fraud techniques will all focus on these types of transactions ahead. Reveals the top 45 fraud...
Gardado en:
Autor Principal: | Montague, David A., 1967- |
---|---|
Autor Corporativo: | ebrary, Inc |
Formato: | Electrónico eBook |
Idioma: | inglés |
Publicado: |
Hoboken, N.J. :
Wiley,
2010.
|
Series: | Essentials series ;
54. |
Subjects: | |
Acceso en liña: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
Títulos similares
Electronic safety and soundness securing finance in a new age /
por: Glaessner, Thomas C.
Publicado: (2004)
por: Glaessner, Thomas C.
Publicado: (2004)
Protecting mobile money against financial crimes global policy challenges and solutions /
por: Chatain, Pierre-Laurent
Publicado: (2011)
por: Chatain, Pierre-Laurent
Publicado: (2011)
Implementing electronic card payment systems
por: Radu, Cristian
Publicado: (2003)
por: Radu, Cristian
Publicado: (2003)
Bitcoin and beyond : cryptocurrencies, blockchains and global governance /
Publicado: (2018)
Publicado: (2018)
The secure online business handbook a practical guide to risk management and business continuity /
Publicado: (2006)
Publicado: (2006)
Privacy online : OECD guidance on policy and practice.
Publicado: (2003)
Publicado: (2003)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
por: Woody, Aaron
Publicado: (2013)
por: Woody, Aaron
Publicado: (2013)
Control and security of E-commerce
por: Smith, Gordon E. (Gordon Edward)
Publicado: (2004)
por: Smith, Gordon E. (Gordon Edward)
Publicado: (2004)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado: (2001)
Publicado: (2001)
Integrity in mobile phone financial services measures for mitigating risks from money laundering and terrorist financing /
Publicado: (2008)
Publicado: (2008)
The Bitcoin big bang : how alternative currencies are about to change the world /
por: Kelly, Brian
Publicado: (2015)
por: Kelly, Brian
Publicado: (2015)
Web 2.0 security defending Ajax, RIA, and SOA /
por: Shah, Shreeraj
Publicado: (2008)
por: Shah, Shreeraj
Publicado: (2008)
The death of the Internet
Publicado: (2012)
Publicado: (2012)
IBM WebSphere V5 edge of network patterns
por: Ramanujam, Vinodha
Publicado: (2003)
por: Ramanujam, Vinodha
Publicado: (2003)
Electronic security systems a manager's guide to evaluating and selecting system solutions /
por: Pearson, Robert L.
Publicado: (2007)
por: Pearson, Robert L.
Publicado: (2007)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
por: Bradley, Tony
Publicado: (2006)
por: Bradley, Tony
Publicado: (2006)
Security architect : careers in information security /
por: Collins, Jon
Publicado: (2014)
por: Collins, Jon
Publicado: (2014)
Android security internals : an in-depth guide to android's security architecture /
por: Elenkov, Nikolay
Publicado: (2015)
por: Elenkov, Nikolay
Publicado: (2015)
Implementing email security and tokens current standards, tools, and practices /
por: Turner, Sean
Publicado: (2008)
por: Turner, Sean
Publicado: (2008)
Android security cookbook /
por: Makan, Keith
Publicado: (2013)
por: Makan, Keith
Publicado: (2013)
Computer security handbook /
Publicado: (2014)
Publicado: (2014)
Integrated identity management using IBM Tivoli security solutions
por: Bücker, Axel
Publicado: (2004)
por: Bücker, Axel
Publicado: (2004)
The practice of network security monitoring : understanding incident detection and response /
por: Bejtlich, Richard
Publicado: (2013)
por: Bejtlich, Richard
Publicado: (2013)
A Short course in international payments how to use letters of credit, D/P and D/A terms, prepayment, credit, and cyberpayments in international transactions /
por: Hinkelman, Edward G., 1947-
Publicado: (2002)
por: Hinkelman, Edward G., 1947-
Publicado: (2002)
A short course in international payments how to use letters of credit, D/P and D/A terms, prepayment, credit, and cyberpayments in international transactions /
por: Hinkelman, Edward G., 1947-
Publicado: (2009)
por: Hinkelman, Edward G., 1947-
Publicado: (2009)
Safeguarding critical e-documents implementing a program for securing confidential information assets /
por: Smallwood, Robert F., 1959-
Publicado: (2012)
por: Smallwood, Robert F., 1959-
Publicado: (2012)
OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy way /
por: Thangasamy, Indira
Publicado: (2011)
por: Thangasamy, Indira
Publicado: (2011)
Distributed systems security issues, processes, and solutions /
Publicado: (2009)
Publicado: (2009)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
por: Li, Qing, et al.
Publicado: (2015)
por: Li, Qing, et al.
Publicado: (2015)
Security in distributed and networking systems
Publicado: (2007)
Publicado: (2007)
Security and control in information systems a guide for business and accounting /
por: Hawker, Andrew
Publicado: (2000)
por: Hawker, Andrew
Publicado: (2000)
WordPress 3 ultimate security protect your WordPress site and its network /
por: Connelly, Olly
Publicado: (2011)
por: Connelly, Olly
Publicado: (2011)
Managing information security : a program for the electronic information age /
por: Schweitzer, James A., 1929-
Publicado: (1982)
por: Schweitzer, James A., 1929-
Publicado: (1982)
Maritime security an introduction /
por: McNicholas, Michael
Publicado: (2008)
por: McNicholas, Michael
Publicado: (2008)
Advances in cyber security : technology, operations, and experiences /
Publicado: (2013)
Publicado: (2013)
Business continuity and disaster recovery planning for IT professionals /
por: Snedaker, Susan
Publicado: (2014)
por: Snedaker, Susan
Publicado: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
por: Lacey, David
Publicado: (2009)
por: Lacey, David
Publicado: (2009)
Security manual
por: Brooksbank, David
Publicado: (2007)
por: Brooksbank, David
Publicado: (2007)
Cyber security /
Publicado: (2014)
Publicado: (2014)
The essential guide to home computer security
por: Rowlingson, Robert R.
Publicado: (2011)
por: Rowlingson, Robert R.
Publicado: (2011)
Títulos similares
-
Electronic safety and soundness securing finance in a new age /
por: Glaessner, Thomas C.
Publicado: (2004) -
Protecting mobile money against financial crimes global policy challenges and solutions /
por: Chatain, Pierre-Laurent
Publicado: (2011) -
Implementing electronic card payment systems
por: Radu, Cristian
Publicado: (2003) -
Bitcoin and beyond : cryptocurrencies, blockchains and global governance /
Publicado: (2018) -
The secure online business handbook a practical guide to risk management and business continuity /
Publicado: (2006)