Jump to ratings and reviews
Rate this book

Handbook of SCADA/Control Systems Security

Rate this book
This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized.

Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in

Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security
The book also includes four case studies of well-known public cyber security-related incidents.

The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

442 pages, Hardcover

First published January 1, 2013

3 people are currently reading
38 people want to read

About the author

Burt G. Look

6 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
4 (33%)
3 stars
5 (41%)
2 stars
3 (25%)
1 star
0 (0%)
Displaying 1 - 2 of 2 reviews
Profile Image for Carter.
597 reviews
July 18, 2021
This book, was only marginally useful to me. It does not go too far beyond, the standard practice, of the field, as it generally applies to enterprise networks. There are some small details here, that perhaps, are a bit new to me; but, this is a bit of a me too, book, which basically does not go much beyond, common practices, covered in basic certificates, like the Security+, CSSLP, CISA, and so forth. Henceforth, it's utility is quite minimal.
Profile Image for Mohamed Eltahan.
1 review11 followers
Read
March 27, 2015
Good foundation for concerned technical guys in the ICS security arena
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.