Hacking Exposed Industrial Control Systems

ICS and SCADA Security Secrets & Solutions



Bookstore > Books > Hacking Exposed Industrial Control Systems

Price$35.87 - $49.67
Rating
AuthorsClint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
PublisherMcGraw-Hill
Published2016
Pages416
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101259589714
ISBN-139781259589713
EBook Hardcover Paperback

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating? and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.

Assess your exposure and develop an effective risk management plan; Adopt the latest ICS-focused threat intelligence techniques; Use threat modeling to create realistic risk scenarios; Implement a customized, low-impact ICS penetration-testing strategy; See how attackers exploit industrial protocols; Analyze and fortify ICS and SCADA devices and applications; Discover and eliminate undisclosed "zero-day" vulnerabilities; Detect, block, and analyze malware of all varieties.




4 5 43

Similar Books


Hacking Exposed Wireless, 2nd Edition

Hacking Exposed Wireless, 2nd Edition

by Johnny Cache, Joshua Wright, Vincent Liu

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and...

Price:  $3.99  |  Publisher:  McGraw-Hill  |  Release:  2010

Hacking Exposed Mobile

Hacking Exposed Mobile

by Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained.Identify and evade key th...

Price:  $32.99  |  Publisher:  McGraw-Hill  |  Release:  2013

Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy counterm...

Price:  $6.00  |  Publisher:  McGraw-Hill  |  Release:  2016

Hacking Exposed Linux, 3rd Edition

Hacking Exposed Linux, 3rd Edition

by ISECOM

This authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused expe...

Price:  $30.00  |  Publisher:  McGraw-Hill  |  Release:  2008

Hacking Exposed Windows, 3rd Edition

Hacking Exposed Windows, 3rd Edition

by Joel Scambray

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstra...

Price:  $40.42  |  Publisher:  McGraw-Hill  |  Release:  2007

Hacking Exposed Web 2.0

Hacking Exposed Web 2.0

by Rich Cannings, Himanshu Dwivedi, Zane Lackey

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn h...

Price:  $7.39  |  Publisher:  McGraw-Hill  |  Release:  2007

Hacking Exposed Malware and Rootkits

Hacking Exposed Malware and Rootkits

by Michael Davis, Sean Bodmer, Aaron LeMasters

Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in t...

Publisher:  McGraw-Hill  |  Release:  2009

Hacking Exposed, 6th Edition

Hacking Exposed, 6th Edition

by Stuart McClure, Joel Scambray, George Kurtz

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's e...

Price:  $6.99  |  Publisher:  McGraw-Hill  |  Release:  2009