1. Target
  2. Movies, Music & Books
  3. Books
  4. All Book Genres
  5. Computers & Technology Books

Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions - (Paperback)

Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions - (Paperback)
Store: Target
Last Price: 60.00 USD

Similar Products

Products of same category from the store

All

Product info

<p/><br></br><p><b> Book Synopsis </b></p></br></br><p><b>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.</b></p><p><strong><br></strong></p><p><strong>Secure your ICS and SCADA systems the battle-tested <em>Hacking Exposed</em>(TM) way</strong></p><p>This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. <em>Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions</em> shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating―and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.</p><p>Learn how to: <br>- Assess your exposure and develop an effective risk management plan<br>- Adopt the latest ICS-focused threat intelligence techniques<br>- Use threat modeling to create realistic risk scenarios<br>- Implement a customized, low-impact ICS penetration-testing strategy<br>- See how attackers exploit industrial protocols<br>- Analyze and fortify ICS and SCADA devices and applications<br>- Discover and eliminate undisclosed "zero-day" vulnerabilities<br>- Detect, block, and analyze malware of all varieties<br></p><p/><br></br><p><b> About the Author </b></p></br></br><p><strong>Clint Bodungen</strong> is an industry-recognized ICS/SCADA security researcher and penetration testing expert with more than 20 years of experience. </p><p><strong>Bryan L. Singer, </strong> CISSP, CAP is an industry-recognized industrial security expert and principal investigator with Kenexis Security Corporation.</p><p><strong>Aaron Shbeeb</strong> has worked for more than a decade in a variety of programming and security positions, including ICS/SCADA, and specializes in secure programming practices.</p><p><strong>Kyle Wilhoit</strong> is a senior threat researcher at Trend Micro. He focuses on original threat, malware, vulnerability discovery/analysis, and criminal activity on the Internet.</p><p><strong>Stephen Hilt</strong> is an Information Security and ICS Security expert and researcher who has published numerous ICS-Specific Nmap scripts that identify ICS protocols via native commands. </p>

Price History

Cheapest price in the interval: 60 on October 27, 2021

Most expensive price in the interval: 60 on December 10, 2021