Hacking Exposed Industrial Control Systems
ICS and SCADA Security Secrets & Solutions
|Price||$34.33 - $60.00
|Authors||Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt|
|Format||Paper book / ebook (PDF)|
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating? and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.
Assess your exposure and develop an effective risk management plan; Adopt the latest ICS-focused threat intelligence techniques; Use threat modeling to create realistic risk scenarios; Implement a customized, low-impact ICS penetration-testing strategy; See how attackers exploit industrial protocols; Analyze and fortify ICS and SCADA devices and applications; Discover and eliminate undisclosed "zero-day" vulnerabilities; Detect, block, and analyze malware of all varieties.
3 5 10
by Johnny Cache, Joshua Wright, Vincent Liu
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hija...
Price: $3.99 | Publisher: McGraw-Hill | Release: 2010
by Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price
Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained.Identify and evade key th...
Price: $32.99 | Publisher: McGraw-Hill | Release: 2013
by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. D...
Price: $22.94 | Publisher: McGraw-Hill | Release: 2016
This authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused expe...
Price: $30.00 | Publisher: McGraw-Hill | Release: 2008
by Joel Scambray
Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstra...
Price: $40.42 | Publisher: McGraw-Hill | Release: 2007
by Rich Cannings, Himanshu Dwivedi, Zane Lackey
Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to...
Price: $7.39 | Publisher: McGraw-Hill | Release: 2007
by Michael Davis, Sean Bodmer, Aaron LeMasters
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in t...
Publisher: McGraw-Hill | Release: 2009
by Stuart McClure, Joel Scambray, George Kurtz
Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive a...
Price: $6.99 | Publisher: McGraw-Hill | Release: 2009