Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions

by ; ; ; ;
  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: Paperback
  • Copyright: 2016-09-13
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00 Save up to $9.00
  • Rent Book $54.00
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Table of Contents

Part I: Industrial Control Systems Primer

Chapter 1: Industrial Control Systems and Architecture Overview

Chapter 2: Industrial Control Systems [In]Security Landscape

Part II: Penetration Testing (Hacking) Industrial Systems

Chapter 3: Industrial Hacking / Penetration Testing Strategies

Chapter 4: Hacking Industrial Protocols

Chapter 5: Hacking Industrial Devices

Chapter 6: Hacking Industrial Applications

Chapter 7: ICS Zero Day Vulnerability Research

Part III: ICS/SCADA Malware and Advanced Persistent Threats (APT)

Chapter 8: ICS Malware Primer

Chapter 9: Anatomy of Real-World (ICS/SCADA) Infections

Chapter 10: Malware and APT Countermeasures

Part IV: Securing Industrial Control Systems

Chapter 11: Threat Intelligence

Chapter 12: Cyber Security Strategies

Chapter 13: Risk Assessment

Chapter 14: Industrial Security Standards: A Brief Overview

Chapter 15: Summary of Countermeasures

Part IV: Appendices

Appendix A: ICS/SCADA Penetration Testing Methodology Template

Appendix B: ICS/SCADA Protocols and Port Numbers

Appendix C: Common ICS/SCADA Device Default Username/Passwords

Rewards Program

Write a Review