Geschenkgutscheine - sofort verfügbar
62,99 € mit 19 Prozent Einsparungen
UVP: 78,11 €
Preisangaben inkl. USt. Abhängig von der Lieferadresse kann die USt. an der Kasse variieren. Weitere Informationen.
KOSTENFREIE Retouren
GRATIS Lieferung Donnerstag, 2. Oktober
Oder schnellste Lieferung Mittwoch, 1. Oktober. Bestellung innerhalb 10 Stdn. 7 Min.
Auf Lager
62,99 € () Enthält ausgewählte Optionen. Inklusive erster monatlicher Zahlung und ausgewählter Optionen. Details
Preis
Zwischensumme
62,99 €
Zwischensumme
Aufschlüsselung der anfänglichen Zahlung
Versandkosten, Lieferdatum und Gesamtbetrag der Bestellung (einschließlich Steuern) wie bei der Bezahlung angezeigt.
Versand
Amazon
Amazon
Versand
Amazon
Verkäufer
Amazon
Amazon
Verkäufer
Amazon
Rückgaben
Retournierbar, wenn diese innerhalb von 14 Tagen nach dem Erhalt angefordert wird
Retournierbar, wenn diese innerhalb von 14 Tagen nach dem Erhalt angefordert wird
Der Gegenstand kann gegen Erstattung des Kaufpreises retourniert werden, wenn dies innerhalb von 14 Tagen nach dem Erhalt der Ware angefordert wird.
Zahlung
Sichere Transaktion
Deine Transaktion ist sicher
Der sorgfältige Umgang mit Ihren persönlichen Informationen ist uns sehr wichtig. Unser Zahlungssicherheitssystem verschlüsselt Ihre Daten während der Übertragung. Wir geben Ihre Zahlungsdaten nicht an Dritte weiter und verkaufen Ihre Daten nicht an Dritte. Weitere Informationen
Bild des Kindle App-Logos

Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.

Mit Kindle für Web kannst du sofort in deinem Browser lesen.

Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.

QR-Code zum Herunterladen der Kindle App

Den Autoren folgen

Alle anzeigen
Ein Fehler ist aufgetreten. Wiederhole die Anfrage später noch einmal.

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions Taschenbuch – Illustriert, 23. August 2016

4,6 von 5 Sternen 96 Sternebewertungen

{"desktop_buybox_group_1":[{"displayPrice":"62,99 €","priceAmount":62.99,"currencySymbol":"€","integerValue":"62","decimalSeparator":",","fractionalValue":"99","symbolPosition":"right","hasSpace":true,"showFractionalPartIfEmpty":true,"offerListingId":"sBr3I44PFbh5zj2VppPhN5eTGh%2FktI%2F3n%2BZnPhfoc7yVWLY%2BfYNlgqDSAFwO9BU4No3gukMg1BMKyf6%2Fz1Km%2FKCAPSfMPptoOyUXIIYm19rSeZxyEVKzLZUu5k5QsjyZuf8mQmxLj6E%3D","locale":"de-DE","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}]}

Kaufoptionen und Plus-Produkte

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Secure your ICS and SCADA systems the battle-tested Hacking Exposed(TM) way This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating-and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures. Learn how to: ¿ Assess your exposure and develop an effective risk management plan ¿ Adopt the latest ICS-focused threat intelligence techniques ¿ Use threat modeling to create realistic risk scenarios ¿ Implement a customized, low-impact ICS penetration-testing strategy ¿ See how attackers exploit industrial protocols ¿ Analyze and fortify ICS and SCADA devices and applications ¿ Discover and eliminate undisclosed "zero-day" vulnerabilities ¿ Detect, block, and analyze malware of all varieties

Wird oft zusammen gekauft

Dieser Artikel: Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
62,99€
Erhalte es bis Donnerstag, 2. Oktober
Auf Lager
Versandt und verkauft von Amazon.
+
41,99€
Erhalte es bis Donnerstag, 2. Oktober
Auf Lager
Versandt und verkauft von Amazon.
+
46,99€
Erhalte es bis Donnerstag, 2. Oktober
Auf Lager
Versandt und verkauft von Amazon.
Gesamtpreis: $00
Um unseren Preis zu sehen, füge diese Artikel deinem Einkaufswagen hinzu.
Details
Zum Einkaufswagen hinzugefügt
Wähle Artikel zum gemeinsam kaufen.

Produktbeschreibungen

Über den Autor und weitere Mitwirkende

Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 25+ years of experience, and author of Hacking Exposed: Industrial Control Systems. He is a U.S. Air Force veteran, has worked for notable cybersecurity firms Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is a co-founder of ThreatGEN, a cybersecurity gamification and training firm. Clint has been at the forefront of integrating gamification and AI into cybersecurity with his flagship product, ThreatGEN® Red vs. Blue, the world's first online multiplayer computer game designed to teach real-world cybersecurity. Clint continues his pursuit to help revolutionize the cybersecurity industry using gamification and generative AI.

Produktinformation

  • Herausgeber ‏ : ‎ McGraw Hill
  • Erscheinungstermin ‏ : ‎ 23. August 2016
  • Auflage ‏ : ‎ Illustrated
  • Sprache ‏ : ‎ Englisch
  • Seitenzahl der Print-Ausgabe ‏ : ‎ 416 Seiten
  • ISBN-10 ‏ : ‎ 1259589714
  • ISBN-13 ‏ : ‎ 978-1259589713
  • Abmessungen ‏ : ‎ 18.73 x 2.39 x 23.18 cm
  • Teil der Serie ‏ : ‎ Hacking Exposed
  • Amazon Bestseller-Rang: Nr. 1.125.520 in Bücher (Siehe Top 100 in Bücher)
  • Kundenrezensionen:
    4,6 von 5 Sternen 96 Sternebewertungen

Über die Autoren

Folge Autoren, um Neuigkeiten zu Veröffentlichungen und verbesserte Empfehlungen zu erhalten.

Kundenrezensionen

4,6 von 5 Sternen
96 weltweite Bewertungen

Spitzenrezensionen aus Deutschland

Es liegen 0 Rezensionen und 5 Bewertungen aus Deutschland vor

Spitzenrezensionen aus anderen Ländern

Alle Rezensionen ins Deutsche übersetzen
  • Mr Stuart Codack
    5,0 von 5 Sternen Great study guide
    Bewertet in Großbritannien am 24. April 2025
    Formatieren: TaschenbuchVerifizierter Kauf
    Read a lot of books and this is up there in terms of content and pitch. Although expensive, it is insightful and well written. Top marks
    Melden
  • Giulio
    2,0 von 5 Sternen Pretty disappointing
    Bewertet in Italien am 25. November 2023
    Formatieren: TaschenbuchVerifizierter Kauf
    Hacking Exposed books tend to be quite alright and cover a lot of attacks and techniques, but this may be the worst of the series. For reasons unknown to me a ton of pages are used to paste the full source code of scripts that can very easily be found online, they aren't even commented or changed in any way, just taken from their repo and simply pasted into a hard book. Why?? Plus most of the book consists of theoretical guidelines on risk assessment and general penetration testing, giving long explanations on buffer overflows, format strings, XSS, SQL injection, reverse engineering... basically a lot of things that COULD be useful in researching ICS vulnerabilities, but are far from being ICS-specific and are much better explained in other books and guides. When it comes down to it, the number of pages that talk about ACTUAL ICS attacks and vulnerabilities is pretty small, the rest being all general pentesting and guidelines. Not what I was hoping to find in a Hacking Exposed book.
  • Matthew Anderson
    5,0 von 5 Sternen This book is a great resource for ICS Security professionals and Penetration Testers
    Bewertet in den USA am25. September 2016
    Formatieren: TaschenbuchVerifizierter Kauf
    I was very excited to see this book announced, although I wasn’t sure what to expect because for me personally, the “Hacking Exposed” book series has been hit or miss over the years. Some have been really good, while others weren’t really for me. I’ve finally finished reading this one and here are my thoughts:

    First, and contrary to a negative review that I saw posted. This book successfully delivers what it claims. In the introduction, the authors state very clearly what the book is intended for and what it isn’t. They don’t claim to release “0days” or anything that isn’t already publically available. In fact, none of the "Hacking Exposed" books have ever really about that. They also don’t claim to be a complete step-by-step penetration testing guide. They do however provide excellent references and resources for everything that they do not cover in detail. For me, the success and usefulness of the book is the way that the authors have taken all of this ICS security relevant information that is scattered about all over the place, and put it together in one book, organized in a cohesive and strategic manner that is specifically applicable to ICS. The authors clearly understand asset owners and operators as well as their systems and operations.

    If you are an experienced “hardware hacker” guru then no, this book probably isn’t going to dazzle you with new cutting edge techniques. But I don’t think that is the intended purpose of the book and the authors don’t claim as much. I think experienced penetration testers can probably benefit from the ICS specific strategies that the authors lay out, and maybe even some of the techniques in later chapters. I agree that there could be more hands on labs and step-by-step instruction on the examples provided, but I appreciate the fact that they are not exactly providing a step-by-step playbook for just any “script kiddie” that might want to attack a plant, refinery, substation, etc. I feel like this book adequately provides what you need, to those that need it, and references to further reading for those that want/need more.

    I find that this book is a good “follow-on” companion to other ICS security books on my shelf such as “Industrial Network Security” by Joel Langill (SCADAHacker himself) and Eric Knapp and “Cyber Security for Industrial Control Systems” by Bryan Singer et all (who is also a co-author for this book). It completes the overall picture by providing some detail on the more offensive perspective. The case studies were very interesting and entertaining for me, and helped me get my head around the big picture. Chapter 1 did seem a little light if you are looking for more details about ICS/SCADA in general, but I think it was adequate enough to comprehend what is covered in this book. Chapters 2 and 3 were also very interesting to me because I’ve never seen anyone explain risk assessment and threat modeling from an ICS perspective like that before. Very well done and I think this is where asset owners and operators will get the most benefit. Chapters 4-8 are the more technical chapters with the classic “Hacking Exposed” feel to it. Yes there are some cross-referenced methods and tools but I certainly wasn’t aware of them.

    In the end, is this book the end all be all? No. But it doesn’t claim to be. It is a much needed reference from a different perspective for the ICS security community.
  • anon9668
    5,0 von 5 Sternen This book is still the best OT cyber book you will find.
    Bewertet in Kanada am 28. Juli 2024
    Formatieren: TaschenbuchVerifizierter Kauf
    For those that are complaining that this book doesn't have enough OT specific exploit techniques, or enough technical detail, you need to take a step back and first understand OT. It is not IT, but it uses alot of the same tech. You also don't run off and pen test OT - if you value your career. The complaint being made is typical of highly technical IT cyber folks who think that their highly technical approach can be ported to OT. But let's be serious, that approach doesn't work great in IT either. It works even worse in OT.

    Individual OT systems are all pretty much sitting ducks. Precise information on how to exploit OT systems is about as useful as a firearms course for shooting fish in a barrel. OT cyber is about protecting the environment, and less so about protecting individual systems. This book will show you how to practically protect OT environments.
  • Hurdan0Games
    4,0 von 5 Sternen Recomendado
    Bewertet in Spanien am 17. Juli 2017
    Formatieren: TaschenbuchVerifizierter Kauf
    Sí estás buscando un libro sobre sistemas SCADA, este es tu libro desde luego. No es que sea muy práctico, se centra más en la teoría de dispositivos, etc pero es muy didáctico y desde luego te será de ayuda. Sí estás buscando algo para "hackear" sistemas SCADA, viendo vulnerabilidades y como explotarlas... No es para tí.

    Hay que diferenciar entre la gente que quiere ver como explotar cosas para hacerse el hacker, y la gente que quiere aprender como funciona todo, para luego poder aplicar ese conocimiento a realizar o ver las cosas de otro modo. Eso para mí sí es hacking, un defacement, un DdoS, etc... aunque requiera de conocimientos para realizarlos, hablando mal, yo lo considero una verdadera mierda. El objetivo es aplicar lo que sabes a otros campos, etc.

    Volviendo al tema del libro, que aún no lo he terminado, es muy didáctico. Recomiendo su compra, tanto para todo tipo de gente. Porque no sepas nada sobre ello no quiere decir que no sea para tí, lo que no sepas, investígalo, en eso consiste el hacking, en investigar y aprender!!