Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions

by ; ; ; ;
Edition: 1st
Format: Paperback
Pub. Date: 2016-09-13
Publisher(s): McGraw Hill
List Price: $64.20

Buy New

Usually Ships in 5-7 Business Days
$61.14

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$82.13
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$82.13*

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Table of Contents

Part I: Industrial Control Systems Primer

Chapter 1: Industrial Control Systems and Architecture Overview

Chapter 2: Industrial Control Systems [In]Security Landscape

Part II: Penetration Testing (Hacking) Industrial Systems

Chapter 3: Industrial Hacking / Penetration Testing Strategies

Chapter 4: Hacking Industrial Protocols

Chapter 5: Hacking Industrial Devices

Chapter 6: Hacking Industrial Applications

Chapter 7: ICS Zero Day Vulnerability Research

Part III: ICS/SCADA Malware and Advanced Persistent Threats (APT)

Chapter 8: ICS Malware Primer

Chapter 9: Anatomy of Real-World (ICS/SCADA) Infections

Chapter 10: Malware and APT Countermeasures

Part IV: Securing Industrial Control Systems

Chapter 11: Threat Intelligence

Chapter 12: Cyber Security Strategies

Chapter 13: Risk Assessment

Chapter 14: Industrial Security Standards: A Brief Overview

Chapter 15: Summary of Countermeasures

Part IV: Appendices

Appendix A: ICS/SCADA Penetration Testing Methodology Template

Appendix B: ICS/SCADA Protocols and Port Numbers

Appendix C: Common ICS/SCADA Device Default Username/Passwords

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.