Hacking Exposed Industrial Control Systems

ICS and SCADA Security Secrets & Solutions



Bookstore > Books > Hacking Exposed Industrial Control Systems

Hacking Exposed Industrial Control Systems
Buy
Preview
Price$34.33 - $60.00
Rating
AuthorsClint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
PublisherMcGraw-Hill
Published2016
Pages416
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101259589714
ISBN-139781259589713
EBook Hardcover Paperback

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating? and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.

Assess your exposure and develop an effective risk management plan; Adopt the latest ICS-focused threat intelligence techniques; Use threat modeling to create realistic risk scenarios; Implement a customized, low-impact ICS penetration-testing strategy; See how attackers exploit industrial protocols; Analyze and fortify ICS and SCADA devices and applications; Discover and eliminate undisclosed "zero-day" vulnerabilities; Detect, block, and analyze malware of all varieties.




3 5 8

Similar Books


Hacking Exposed Wireless, 2nd Edition

Hacking Exposed Wireless, 2nd Edition

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hija...
Hacking Exposed Mobile

Hacking Exposed Mobile

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained.Identify and evade key th...
Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. D...
Hacking Exposed Linux, 3rd Edition

Hacking Exposed Linux, 3rd Edition

This authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused expe...
Hacking Exposed Windows, 3rd Edition

Hacking Exposed Windows, 3rd Edition

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstra...
Hacking Exposed Web 2.0

Hacking Exposed Web 2.0

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to...