Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 15 of 15 results

CRC - KE22715 - INFORMATION SECURITY POLICY DEVELOPMENT FOR COMPLIANCE : ISO/IEC 27001, NIST SP 800-53, HIPAA STANDARD, PCI DSS V2.0, AND AUP V5.0 Organization: CRC
Date: 2016-04-19
Description: Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control.
ITG - PCI DSS - PCI DSS - A POCKET GUIDE; FIFTH EDITION Organization: ITG
Date: 2016-07-28
Description: An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data.
CRC - KE14449 - PCI COMPLIANCE : THE DEFINITIVE GUIDE Organization: CRC
Date: 2014-05-05
Description: PCI Compliance: The Definitive Guide explains the ins and outs of the payment card industry (PCI) security standards in a manner that is easy to understand.
ETSI - PRETS 300 325 - INTEGRATED SERVICES DIGITAL NETWORK (ISDN); HARMONIZED PROGRAMMABLE COMMUNICATION INTERFACE (PCI); FOR ISDN - SECOND EDITION Organization: ETSI
Date: 1996-01-01
Description: - Profile B describes an alternative interface access that is bit compatible to COMMON-ISDN-API (CAPI 2.0 - May 1995). The PCI described in this ETS accesses and administers the following services: - bearer services as defined in ETS 300 102-1 [2]; - supplementary services as defined in ETS 300 196 [7]; - Virtual Circuit (VC) or Permanent Virtual Circuit (PVC) Bearer Services on the B- and D-channels.
CRC - KE10464 - ASSET PROTECTION THROUGH SECURITY AWARENESS Organization: CRC
Date: 2016-04-19
Description: It includes tools and checklists to help you address: Visual, digital, and auditory data security Credit card compliance (PCI), password management, and social engineering User authentication methods Computer and network forensics Physical security and continuity planning Privacy concerns and privacy-related regulation This concise security management primer facilitates the up-to-date understanding required to protect your digital and physical assets, including customer data, networking equipment, and employee information.
ARINC 852 - GUIDANCE FOR SECURITY EVENT LOGGING IN AN IP ENVIRONMENT Organization: ARINC
Date: 2017-06-21
Description: For example, systems performing credit card payment processing must also meet related Payment Card Industry (PCI) requirements. Security logging and monitoring are important enablers for retaining the required level of security of IPbased aircraft systems.
CRC - INFORMATION SECURITY POLI - INFORMATION SECURITY POLICIES, PROCEDURES, AND STANDARDS: A PRACTITIONER'S REFERENCE Organization: CRC
Date: 2016-05-05
Description: It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.
DIN SPEC 27099 - INFORMATION TECHNOLOGY - SAFETY PROCEDURES - HIGH-SECURITY NETWORK ARCHITECTURE FOR STORAGE OF HIGHLY VULNERABLE DATA Organization: DIN
Date: 2016-07-01
Description: Die Anwendung dieser Spezifikation erleichtert die Erlangung einer PCI-Zertifizierung.
CRC - KE10673 - THE 7 QUALITIES OF HIGHLY SECURE SOFTWARE Organization: CRC
Date: 2012-05-29
Description: Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.—Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.
CRC - KE11093 - SECURE JAVA : FOR WEB APPLICATION DEVELOPMENT Organization: CRC
Date: 2010-09-14
Description: Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.
ITG - CYBER RISKS FOR BUSINESS - CYBER RISKS FOR BUSINESS PROFESSIONALS - A MANAGEMENT GUIDE Organization: ITG
Date: 2010-01-08
Description: It explores the security complications that have arisen as a result of the use of laptop computers and memory sticks for remote working and other topics covered include PCI DSS (payment card industry data security standard), Cloud Computing and employee use of social networking sites.
NG UKBP/TP 137 - UK BUSINESS PROCEDURE/TRANSMISSION PROCEDURES - THE IMPLEMENTATION OF CONSTRUCTION (DESIGN & MANAGEMENT) REGULATIONS (CDM) 2015 FOR THE TRANSMISSION ELECTRICITY CAPITAL PROGRAMME - ISSUE 16 Organization: NG
Date: 2016-03-01
Description: NB: Whereas this procedure as a whole is tasked with addressing the 2015 CDM Regulations, the 'Pre-Construction Information (PCI)' and 'Construction Phase Plan (CPP)' also incorporate environmental legislation, security and sustainability requirements.
CRC - KE12620 - PRACTICAL RISK MANAGEMENT FOR THE CIO Organization: CRC
Date: 2016-04-19
Description: Explains why every CIO should be managing his or her information differently Provides time-tested risk ranking strategies Considers information security strategy standards such as NIST, FISMA, PCI, SP 800, & ISO 17799 Supplies steps for managing: information flow, classification, controlled vocabularies, life cycle, and data leakage Describes how to put it all together into a complete information risk management framework Information is one of your most valuable assets.
ANSI INCITS 495 VOLUME 2 - INFORMATION TECHNOLOGY – PLATFORM MANAGEMENT, VOLUME 2 Organization: ANSI
Date: 2012-12-19
Description: • configuration of service processors and their components and services • media redirection and KVM • access to security information, such as accounts, groups, and security modules • network interface monitoring and control, including wired and wireless • IO interconnect technologies such as PCI, SMBus, Bluetooth, USB, and other interconnects
ANSI INCITS 495 VOLUME 1 - INFORMATION TECHNOLOGY – PLATFORM MANAGEMENT, VOLUME 1 Organization: ANSI
Date: 2012-12-19
Description: • configuration of service processors and their components and services • media redirection and KVM • access to security information, such as accounts, groups, and security modules • network interface monitoring and control, including wired and wireless • IO interconnect technologies such as PCI, SMBus, Bluetooth, USB, and other interconnects

1 - 15 of 15 results