Book Excerpt: Hacking Point of Sale
Get this must-have guide to protect your payment card processing systems.
Hacking POS devices is one of the most common techniques for breaching payment systems and extracting sensitive card holder data. The more you know about the underlying payment application architecture, the better you can protect your systems.
This excerpt from the book "Hacking Point of Sale: Payment Application Secrets, Threats & Solutions" by industry expert Slava Gomzin, provides this information. The document covers the most common payment systems architectures. It explains the different components of payment systems, terms and protocols necessary to protect your customers’ card data. Common vulnerabilities and threats in retail payment systems are highlighted. The book has been well received by both business managers and technical audiences.
Complete the form to the right to gain critical insight on your POS environment and learn the best approaches to protecting the confidential data therein.