Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.
Mit Kindle für Web kannst du sofort in deinem Browser lesen.
Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.
Bild nicht verfügbar
Farbe:
-
-
-
- Herunterladen, um dieses Videos wiederzugeben Flash Player
Den Autoren folgen
Alle anzeigenOK
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions Taschenbuch – Illustriert, 23. August 2016
Kaufoptionen und Plus-Produkte
- Seitenzahl der Print-Ausgabe416 Seiten
- SpracheEnglisch
- HerausgeberMcGraw Hill
- Erscheinungstermin23. August 2016
- Abmessungen18.73 x 2.39 x 23.18 cm
- ISBN-101259589714
- ISBN-13978-1259589713
Wird oft zusammen gekauft

Was kaufen Kunden, nachdem sie diesen Artikel gesehen haben?
Produktbeschreibungen
Über den Autor und weitere Mitwirkende
Produktinformation
- Herausgeber : McGraw Hill
- Erscheinungstermin : 23. August 2016
- Auflage : Illustrated
- Sprache : Englisch
- Seitenzahl der Print-Ausgabe : 416 Seiten
- ISBN-10 : 1259589714
- ISBN-13 : 978-1259589713
- Abmessungen : 18.73 x 2.39 x 23.18 cm
- Teil der Serie : Hacking Exposed
- Amazon Bestseller-Rang: Nr. 1.125.520 in Bücher (Siehe Top 100 in Bücher)
- Nr. 325 in Hacking
- Nr. 381 in Internet-Kryptografie
- Nr. 1.259 in Netzwerke
- Kundenrezensionen:
Über die Autoren

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.
Kundenrezensionen
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern5 Sterne77%13%7%2%1%77%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern4 Sterne77%13%7%2%1%13%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern3 Sterne77%13%7%2%1%7%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern2 Sterne77%13%7%2%1%2%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern1 Stern77%13%7%2%1%1%
Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für sie ist.
Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen analysiert, um die Vertrauenswürdigkeit zu überprüfen.
Erfahren Sie mehr darüber, wie Kundenbewertungen bei Amazon funktionieren.Spitzenrezensionen aus Deutschland
Spitzenrezensionen aus anderen Ländern
-
Mr Stuart CodackBewertet in Großbritannien am 24. April 20255,0 von 5 Sternen Great study guide
Formatieren: TaschenbuchVerifizierter KaufRead a lot of books and this is up there in terms of content and pitch. Although expensive, it is insightful and well written. Top marks
-
GiulioBewertet in Italien am 25. November 20232,0 von 5 Sternen Pretty disappointing
Formatieren: TaschenbuchVerifizierter KaufHacking Exposed books tend to be quite alright and cover a lot of attacks and techniques, but this may be the worst of the series. For reasons unknown to me a ton of pages are used to paste the full source code of scripts that can very easily be found online, they aren't even commented or changed in any way, just taken from their repo and simply pasted into a hard book. Why?? Plus most of the book consists of theoretical guidelines on risk assessment and general penetration testing, giving long explanations on buffer overflows, format strings, XSS, SQL injection, reverse engineering... basically a lot of things that COULD be useful in researching ICS vulnerabilities, but are far from being ICS-specific and are much better explained in other books and guides. When it comes down to it, the number of pages that talk about ACTUAL ICS attacks and vulnerabilities is pretty small, the rest being all general pentesting and guidelines. Not what I was hoping to find in a Hacking Exposed book.
-
Matthew AndersonBewertet in den USA am25. September 20165,0 von 5 Sternen This book is a great resource for ICS Security professionals and Penetration Testers
Formatieren: TaschenbuchVerifizierter KaufI was very excited to see this book announced, although I wasn’t sure what to expect because for me personally, the “Hacking Exposed” book series has been hit or miss over the years. Some have been really good, while others weren’t really for me. I’ve finally finished reading this one and here are my thoughts:
First, and contrary to a negative review that I saw posted. This book successfully delivers what it claims. In the introduction, the authors state very clearly what the book is intended for and what it isn’t. They don’t claim to release “0days” or anything that isn’t already publically available. In fact, none of the "Hacking Exposed" books have ever really about that. They also don’t claim to be a complete step-by-step penetration testing guide. They do however provide excellent references and resources for everything that they do not cover in detail. For me, the success and usefulness of the book is the way that the authors have taken all of this ICS security relevant information that is scattered about all over the place, and put it together in one book, organized in a cohesive and strategic manner that is specifically applicable to ICS. The authors clearly understand asset owners and operators as well as their systems and operations.
If you are an experienced “hardware hacker” guru then no, this book probably isn’t going to dazzle you with new cutting edge techniques. But I don’t think that is the intended purpose of the book and the authors don’t claim as much. I think experienced penetration testers can probably benefit from the ICS specific strategies that the authors lay out, and maybe even some of the techniques in later chapters. I agree that there could be more hands on labs and step-by-step instruction on the examples provided, but I appreciate the fact that they are not exactly providing a step-by-step playbook for just any “script kiddie” that might want to attack a plant, refinery, substation, etc. I feel like this book adequately provides what you need, to those that need it, and references to further reading for those that want/need more.
I find that this book is a good “follow-on” companion to other ICS security books on my shelf such as “Industrial Network Security” by Joel Langill (SCADAHacker himself) and Eric Knapp and “Cyber Security for Industrial Control Systems” by Bryan Singer et all (who is also a co-author for this book). It completes the overall picture by providing some detail on the more offensive perspective. The case studies were very interesting and entertaining for me, and helped me get my head around the big picture. Chapter 1 did seem a little light if you are looking for more details about ICS/SCADA in general, but I think it was adequate enough to comprehend what is covered in this book. Chapters 2 and 3 were also very interesting to me because I’ve never seen anyone explain risk assessment and threat modeling from an ICS perspective like that before. Very well done and I think this is where asset owners and operators will get the most benefit. Chapters 4-8 are the more technical chapters with the classic “Hacking Exposed” feel to it. Yes there are some cross-referenced methods and tools but I certainly wasn’t aware of them.
In the end, is this book the end all be all? No. But it doesn’t claim to be. It is a much needed reference from a different perspective for the ICS security community.
-
anon9668Bewertet in Kanada am 28. Juli 20245,0 von 5 Sternen This book is still the best OT cyber book you will find.
Formatieren: TaschenbuchVerifizierter KaufFor those that are complaining that this book doesn't have enough OT specific exploit techniques, or enough technical detail, you need to take a step back and first understand OT. It is not IT, but it uses alot of the same tech. You also don't run off and pen test OT - if you value your career. The complaint being made is typical of highly technical IT cyber folks who think that their highly technical approach can be ported to OT. But let's be serious, that approach doesn't work great in IT either. It works even worse in OT.
Individual OT systems are all pretty much sitting ducks. Precise information on how to exploit OT systems is about as useful as a firearms course for shooting fish in a barrel. OT cyber is about protecting the environment, and less so about protecting individual systems. This book will show you how to practically protect OT environments.
-
Hurdan0GamesBewertet in Spanien am 17. Juli 20174,0 von 5 Sternen Recomendado
Formatieren: TaschenbuchVerifizierter KaufSí estás buscando un libro sobre sistemas SCADA, este es tu libro desde luego. No es que sea muy práctico, se centra más en la teoría de dispositivos, etc pero es muy didáctico y desde luego te será de ayuda. Sí estás buscando algo para "hackear" sistemas SCADA, viendo vulnerabilidades y como explotarlas... No es para tí.
Hay que diferenciar entre la gente que quiere ver como explotar cosas para hacerse el hacker, y la gente que quiere aprender como funciona todo, para luego poder aplicar ese conocimiento a realizar o ver las cosas de otro modo. Eso para mí sí es hacking, un defacement, un DdoS, etc... aunque requiera de conocimientos para realizarlos, hablando mal, yo lo considero una verdadera mierda. El objetivo es aplicar lo que sabes a otros campos, etc.
Volviendo al tema del libro, que aún no lo he terminado, es muy didáctico. Recomiendo su compra, tanto para todo tipo de gente. Porque no sepas nada sobre ello no quiere decir que no sea para tí, lo que no sepas, investígalo, en eso consiste el hacking, en investigar y aprender!!



