As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and im

chapter 1|44 pages


chapter 3|44 pages

ICS Vulnerabilities

chapter 4|38 pages

Risk Assessment Techniques

chapter 5|24 pages

What Is Next in ICS Security?