Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Secure your ICS and SCADA systems the battle-tested Hacking Exposed™ way
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating―and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using “ICS safe” methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.
Learn how to:
· Assess your exposure and develop an effective risk management plan
· Adopt the latest ICS-focused threat intelligence techniques
· Use threat modeling to create realistic risk scenarios
· Implement a customized, low-impact ICS penetration-testing strategy
· See how attackers exploit industrial protocols
· Analyze and fortify ICS and SCADA devices and applications
· Discover and eliminate undisclosed “zero-day” vulnerabilities
· Detect, block, and analyze malware of all varieties
"synopsis" may belong to another edition of this title.
Clint Bodungen is an industry-recognized ICS/SCADA security researcher and penetration testing expert with more than 20 years of experience.
Bryan L. Singer, CISSP, CAP is an industry-recognized industrial security expert and principal investigator with Kenexis Security Corporation.
Aaron Shbeeb has worked for more than a decade in a variety of programming and security positions, including ICS/SCADA, and specializes in secure programming practices.
Kyle Wilhoit is a senior threat researcher at Trend Micro. He focuses on original threat, malware, vulnerability discovery/analysis, and criminal activity on the Internet.
Stephen Hilt is an Information Security and ICS Security expert and researcher who has published numerous ICS-Specific Nmap scripts that identify ICS protocols via native commands.
"About this title" may belong to another edition of this title.
US$ 3.75 shipping within U.S.A.
Destination, rates & speedsSeller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_412773393
Quantity: 1 available
Seller: Seattle Goodwill, Seattle, WA, U.S.A.
paperback. Condition: Good. May have some shelf-wear due to normal use. Your purchase funds free job training and education in the greater Seattle area. Thank you for supporting Goodwill's nonprofit mission! Seller Inventory # 0KVOGF00D8OW_ns
Quantity: 1 available
Seller: Redux Books, Grand Rapids, MI, U.S.A.
Paperback. Condition: Very Good. Very good paperback. The text is unmarked. Covers show minor shelf wear with minor rubbing, scuffing and a slight corner crease.; 100% Satisfaction Guaranteed! Ships same or next business day! Seller Inventory # 112502270002
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 25090650-n
Quantity: 2 available
Seller: Textbooks_Source, Columbia, MO, U.S.A.
paperback. Condition: New. 1st Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). Seller Inventory # 002048391N
Quantity: 3 available
Seller: WeBuyBooks, Rossendale, LANCS, United Kingdom
Condition: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # wbs6898889359
Quantity: 1 available
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions 1.3. Book. Seller Inventory # BBS-9781259589713
Quantity: 5 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 25090650
Quantity: 2 available
Seller: medimops, Berlin, Germany
Condition: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Seller Inventory # M01259589714-G
Quantity: 1 available
Seller: medimops, Berlin, Germany
Condition: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Seller Inventory # M01259589714-V
Quantity: 1 available