Paperback: 270 pages
Publisher: Butterworth-Heinemann; 1 edition (June 18, 2015)
Product Dimensions: 7.5 x 0.6 x 9.2 inches
Shipping Weight: 1.2 pounds (View shipping rates and policies)
Average Customer Review: 4.5 out of 5 stars See all reviews (4 customer reviews)
Best Sellers Rank: #731,828 in Books (See Top 100 in Books) #81 in Books > Computers & Technology > Hardware & DIY > Microprocessors & System Design > Embedded Systems #650 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #911 in Books > Textbooks > Computer Science > Networking
Great book that finally address the subject of Operational Technology cyber security. This is a space of rapid convergence and Mr. Loukas does a great job at keeping the information useful. I have recommended to dozens of colleges in this space.
Introduction on the various methods for cyber-physical attacks. I would not recommend this book for professionals in the field because it doesn't offer much more than an overview and as such is quickly dated like the examples in the book. But it is a comprehensive treatment of the field and as such a useful book for education including questions and exercises per chapter.
Excellent coverage of the topic
Extremely well written and uniquely insightful; I would list as one of my top three books to have if dealing with the security of critical infrastructure.
Cyber-Physical Attacks: A Growing Invisible Threat Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense (Advances in Information Security) Danger Ready: Prepare to Survive Any Threat and Live to Tell the Tale: (Terrorist Attacks, Mass-Shootings, Earthquakes, Civil Unrest - Be Ready to Protect Your Family Whatever the Danger) Performance Anxiety Cure: How To Overcome Performance Anxiety And Stage Fright In All Aspects Of Life Forever (anxiety recovery, panic attacks, anxiety management, anxiety attacks) The Invisible Library (The Invisible Library Novel) Communications for Control in Cyber Physical Systems: Theory, Design and Applications in Smart Grids Principles of Cyber-Physical Systems (MIT Press) Cyber-Physical Systems: A Computational Perspective You Can't Say That!: The Growing Threat to Civil Liberties from Antidiscrimination Laws Growing Marijuana: Beginner's Guide for Big Buds - step by step (How to Grow Weed, Growing Marijuana Outdoors, Growing Marijuana Indoors, Marijuana Bible) Marijuana: Growing Marijuana, Beginner's Guide for Big Buds - Step by Step (How to Grow Weed, Growing Marijuana Outdoors, Growing Marijuana Indoors, Marijuana Bible) Cannabis:The Beginners Guide on How to Start Growing Marijuana Plants at Home (Cannabis, Cannabis Growing, Marijuana, Marijuana Growing, Marijuana Horticulture) Cannabis Success: The Easiest Guide on Growing Large Marijuana Plants at Home (Cannabis, Cannabis Growing, Marijuana, Marijuana Growing, Medical Marijuana, Medical Cannabis, Hydroponics) Invisible Woman: Growing Up Black in Germany (New Directions in German-American Studies) Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) Business Requirements Deposition Guide: The Competitive Edge For Every IP, Cyber & Tech Lawyer! Business Requirements: What Every IP, Cyber & Tech Lawyer Should Know! Cyber Law: Software and Computer Networks (Litigator Series)