Search  for anything...

Industrial Network Security

  • Based on 80 reviews
Condition: New
Checking for product changes
$68.62 Why this price?
Save $21.33 was $89.95

Buy Now, Pay Later


As low as $11.44 / mo
  • – 6-month term
  • – No impact on credit
  • – Instant approval decision
  • – Secure and straightforward checkout

Ready to go? Add this product to your cart and select a plan during checkout.

Payment plans are offered through our trusted finance partners Klarna, PayTomorrow, Affirm, Afterpay, Apple Pay, and PayPal. No-credit-needed leasing options through Acima may also be available at checkout.

Learn more about financing & leasing here.

Free shipping on this product

30-day refund/replacement

To qualify for a full refund, items must be returned in their original, unused condition. If an item is returned in a used, damaged, or materially different state, you may be granted a partial refund.

To initiate a return, please visit our Returns Center.

View our full returns policy here.


Availability: In Stock.
Fulfilled by Amazon

Arrives Tuesday, Jun 17
Order within 19 hours and 23 minutes
Available payment plans shown during checkout

Description

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems―energy production, water, gas, and other vital systems―becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.All-new real-world examples of attacks against control systems, and more diagrams of systemsExpanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering Read more

Publisher ‏ : ‎ Syngress; 2nd edition (December 29, 2014)


Language ‏ : ‎ English


Paperback ‏ : ‎ 460 pages


ISBN-10 ‏ : ‎ 0124201148


ISBN-13 ‏ : ‎ 49


Item Weight ‏ : ‎ 2.1 pounds


Dimensions ‏ : ‎ 7.5 x 1.04 x 9.25 inches


Best Sellers Rank: #788,959 in Books (See Top 100 in Books) #19 in Computer Hardware Control Systems #238 in Business Intelligence Tools #618 in Computer Network Security


#19 in Computer Hardware Control Systems:


#238 in Business Intelligence Tools:


Frequently asked questions

If you place your order now, the estimated arrival date for this product is: Tuesday, Jun 17

Yes, absolutely! You may return this product for a full refund within 30 days of receiving it.

To initiate a return, please visit our Returns Center.

View our full returns policy here.

  • Klarna Financing
  • Affirm Pay in 4
  • Affirm Financing
  • Afterpay Financing
  • PayTomorrow Financing
  • Financing through Apple Pay
Leasing options through Acima may also be available during checkout.

Learn more about financing & leasing here.

Top Amazon Reviews


  • Required Reading
If you work in the field of Industrial Cybersecurity, get this book. Good for both beginners and experts alike, it brings together all the relevant topics and materials in a meaningful and practical way. I wade through a lot of books, articles, best-practice whitepapers and industry standards, and this book is still the best overall compilation of what you need to know about and think about for ICS security. I require a copy for each person on my staff. It’s especially helpful to IT folks who are entering the world of OT security. Now, if I can only get the Engineers to read it … Seriously, it’s excellent. Highly recommend. ... show more
Reviewed in the United States on April 19, 2016 by Polypeptide

  • Bridging the gap between Cybersecurity professionals and Control System Engineers
Excellent read for both the Cybersecurity professional trying to dive into the control systems context and for the controls engineer who needs to learn the Cybersecurity discipline in the control systems contect. It was very easy to read and digest. The flow and order or the chapters was also very helpful. This book definitely gave me as a cyber professional what I needed to help me study for the GICSP. Thank you again Eric, Joe and everyone else who made the second edition changes come alive. Bravo. ... show more
Reviewed in the United States on December 29, 2015 by Isiah Jones aka Izzy

  • Dry but Comprehensive overview
A great resource for both engineers trying to understand what all this newfangled IT security stuff being forced on them is and security professionals that may not understand the special considerations ICS networks need. Valuable as a quick reference for a variety of cyber-physical system security topics even after reading. ... show more
Reviewed in the United States on June 9, 2019 by JR

  • Good book for broad audience
First off a touch of background on the reviewer. I've been an automation professional for about 15 years working in industries ranging from big chemical to pharmaceuticals all the way from DCS's to tiny systems with 20 I/O and two screen HMI. I've worked for both operating companies and integrators. I was excited when I saw the title of the book because I expected a balanced look at real world solutions for very real problems. There is a serious issue right now in our industry with a number of people spreading FUD about how we are all doomed because our protocols are insecure and vendors don't practice proper SDL. While the facts they speak of are true, I think a more balanced approach of highlighting the deficiencies and then immediately providing actionable information an end user can take away is more appropriate. This happens to be almost the exact flow of this book. You can see the table of contents for yourself but the authors do an excellent job of giving the reader some basis for understanding the material through a history lesson and also an introduction to basic concepts in ICS network design. Next they raise the stakes by describing the insecure protocols with a culmination discussing how you might hack these protocols. The information revealed is certainly not earth shattering and is probably Hacking 102 or 103 for someone once they learn the protocols. Where this text truly succeeds, however, is taking you from a fearful place in chapter 7 and walking you through real world tasks you can execute to safeguard your systems. Again, I won't repeat what you can see in the TOC but the authors do a magnificent job of taking you through the logical steps of assessing risk, compartmentalizing the risk, and then monitoring for undesirable activity on your network. It is essentially a step by step, with what I think is an appropriate level of detail for a broad ranging book such as this, on how to methodically reduce your overall risk profile. No fool will ever claim to be 100% secure. But there are a long list of things you can do to make the adversary's task infinitely more difficult. No review should be taken seriously if it doesn't include honest criticisms. Living outside of the US I was forced to download and read the book via Kindle. The text layout and formatting was acceptable but many of the tables were very poorly formatted and not very readable. It appeared that instead of taking the time to format these tables for optimum viewing on the Kindle they were just copied as black and white images and included in line. So now what you have is just pictures with poor resolution that made reading most of the information all but impossible. Some of the longer tables were presented as multiple images in series making it very difficult to follow. Another small point that I picked up on was a constant return to the data diode as a solution to many potential issues in the plant. Yes a data diode is an excellent solution for limited use cases when communicating to outside (outside the ICS) networks but it seemed like the authors revisited it as a solution at almost every turn. Maybe it's related to the author's own experiences and biases? Instead I would have preferred to keep the focus on securing the internal networks with flexible and relevant solutions like firewalls and IPS/IDS. A well crafted attack has the potential to do serious damage even if cut off from the C2 infrastructure. This is our unique risk in the ICS space, attackers can do serious harm without the need ot exfiltrate a single byte of data. Finally a heads up for those who already work in the space. This book is not a deep dive on any particular topic related to ICS security. If you want a detailed discussion of the insecure protocols and the numerous ways they can be attacked and then by extension suggestions for altering the protocols for security, this is not your book. Also if you are an experienced ICS professional the first parts of the book aren't terribly useful as they are just introducing the readers to some of the basic concepts we live with day in and day out. Finally, if you fancy yourself a security expert and think that reading this book will give you all the tools you need to walk into a refinery and demonstrate your superior knowledge of their unique systems you are in for a serious wake up call. Honestly I think this book is aimed more at a few different groups. First, the ICS engineer who knows how to make the systems work, but doesn't really know how the systems work. Simple example. You can get a Modbus TCP connection up and running between your server and a client but you don't understand how a Modbus TCP packet actually works and by proxy don't understand how it can be attacked. Once you understand this issue better after reading the text then you are ready to start thinking about the most effective way to secure your installation. Second I think this book is excellent for the security professional who would like to begin to understand ICS networks and the unique challenges they pose. I felt like it does a good job describing the fundamental concepts associated with ICS networking and how they are so different from traditional IT systems. With a firm foundation and also requisite level of respect for what we do in ICS I think an IT security professional can start to work towards helping make our systems closer to on par with our IT brethren. My overall impression is that this is a good book for a broad range of potential readers but you should also be prepared to continue your studies down whichever chosen rabbit-hole you wish to pursue. ... show more
Reviewed in the United States on January 10, 2015 by Andrew P Robinson

  • Your First ICS Book
Fantastic introduction to the world of ICS. Joel and Eric do a great job highlighting the differences between standard IT security and applying it to the OT environment. The book includes a great rundown of the various fieldbus protocols (Modbus, DNP3 et al.) You also get an excellent introduction into the architecture of the Smart Grid. I highly recommend this as a first ICS book for anybody. ... show more
Reviewed in the United States on March 19, 2016 by Brian E. malby

  • Excellent high level book on ICS Cybersecurity
Excellent high level book on ICS Cybersecurity. It might be a bit hard to follow for a non-OT person but it definitely provides a wealth of information, history, and tips on securing industrial control systems and monitoring / analyzing them. The hard part is implementing it all.
Reviewed in the United States on March 22, 2018 by Meech33

  • Best ICS Security Book I've Found
I love this book. I've read it twice.
Reviewed in the United States on November 13, 2021 by Spy Studios

  • So far I like what I see in that it reflects my experiences ...
I do this for a living and was interested in rounding out things I had not experienced. So far I like what I see in that it reflects my experiences and preferences in securing ICS Networks.
Reviewed in the United States on November 23, 2015 by TheAnt

Can't find a product?

Find it on Amazon first, then paste the link below.