Full description not available
M**N
Excellent primer on ICS/OT security
Loved this book and finished it in two days. Very helpful for me to better understand how industrial control systems are set up, what is typically done for asset inventory and risk assessment, how to harden an ICS environment, how to run incident response for ICS and how to build an OT lab. Highly recommend.
M**O
Excellent
In fact the most health OT/IT book on earth,the book gives constructive and practical steps in implementing great IACS system
W**E
Great coverage of IACS Cybersecurity
I haven’t completed reading of the book, but from my review of the Table of contents, I see important and relevant IACS/OT Cybersecurity subjects covered. After I do a deep dive into the contents, I will come back and update my review if I notice anything worth being highlighted to potential buyers.
T**2
Apparently you also need the first edition.
When you create a 2nd edition of something, you do two things: 1) remove first edition content that no longer applies and 2) add new information and improvements to the book. If you keep saying, "See Chapter 5 of the First Edition to see what great stuff you didn't get with your full-price purchase of a new book" then it's not an edition. This book may be worth a million bucks, but a few dozen pages into it several times I've been referred to the old edition.
R**D
Excellent ICS Resource
An excellent update ICS resource. Builds upon Volume 1. Great Lab instructions and ICS/OT recommendations for pentests and Red Teaming exercises. Great for ICS /OT professionals an cybersecurity learners who are ICS/OT curious. The book covers activities, tools,procedures, and concepts around the monitoring, tracking, and trendingof ICS cybersecurity risks, as well as learning about the overall security programand posture/hygiene.My favorite area was threat hunting principles, tools,techniques, and methodology and h incident response and incident recovery tools, techniques, activities, and procedures as they relate to the ICS environment.
E**V
Practical resource for IT and OT security professionals and control engineers
This book has so much valuable, practical information on industrial cybersecurity with real world examples and how-to steps. It also provides a good overview of cybersecurity concepts, ICS architecture and challenges. A security professional with some experience would find it most valuable, but even a beginner can definitely use it to get started, especially since most of the tools are open-source and free. There is also a great guide how to setup your own lab.This is basically a new book compared to the first edition. Section 2 on monitoring was particularly useful for me, found several tools or techniques to use or learn, with step-by-step guidance. To give few examples, setting up and configuring pfSense firewall, Security Onion, Zeek, Nmap scripts to parse data from industrial protocols. I also like that the text is written clearly, up to the point, and you can see it is based on practical experience.Whether you are in charge of ICS security in your workplace, or just interested in the topic, this book is a must have and well worth the money!
K**P
This is actually Second VOLUME NOT a Second Edition
Deceptive labeling - On page 5 it tells your straight up that you should start by reading the First Edition because it covers zero to hero implementation. This means that if you want to actually have a comprehensive understanding you need to buy the First AND Second Edition. I would have been fine with that if they said Volume I and Volume II but I a subsequent Edition is by definition stand alone. This is deceptive and misleading and at this price point very unprofessional.
N**A
Latest updates in ICS
Very good and professional. Well written about the industrial facts.