In this post, we have prepared a curated top list of reading recommendations for beginners and experienced. This hand-picked list of the best Scada books and tutorials can help fill your brain this September and ensure you’re getting smarter. We have also mentioned the brief introduction of each book based on the relevant Amazon or Reddit descriptions.
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that…
Author(s): Clint Bodungen, Bryan Singer
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments.
Author(s): Luis Ayala
Supervisory control and data acquisition (SCADA) technology has evolved over the past 30 years as a method of monitoring and controlling large processes. This newly revised reference book offers overviews of SCADA’s component technologies, as well as details necessary to understand the big picture. SCADA processes cover areas that may be measured in the thousands of square miles, and have dimensions that may be hundreds, occasionally thousands, of miles long. Now a mature technology, SCADA includes, but is not limited to, software packages that can be…
Author(s): Stuart A. Boyer
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means.
Author(s): George Loukas PhD Imperial College UK; MEng NTUA Greece.
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time―even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack.
Author(s): Luis Ayala
6. Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure (2008)
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure–everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security…
Author(s): Jack Wiles, Ted Claypoole
7. SCADA Principles for Bottle Filling (2012)
It’s been more than a decade since 21st century and countries world over are on the brink of increasing their economy by setting up as many industries as possible and in contrast investors are eager to put as minimum amount of finances as possible due to inflation in the global market. However cutting down different financial attributes, investors and engineers both expect a favorable yield which proves sufficient not only for the growth of one’s industry but also in foreign trade. Hence this is where PLCs with SCADA kicks in by not only saving staggering amounts of finances to set up an automated industry…
Author(s): Adnan Shaffi, Afaq Khan
8. Machine, Meet Human (2010)
“Machine, Meet Human: Designing a Useful Interface” is written to help anyone from any background get up to speed with the state of SCADA HMI graphics design and to teach the concepts of the most effective design ideas. The idea of graphic creation covered here is a holistic approach starting with the need. Then it progresses to understanding the aspects of the Machine and the Human; what makes them unique and what makes them similar. Finally we see how we can design with those understandings in mind to leverage existing habits and natural tendencies to create…
Author(s): Nathaniel O’Shaughnessey
9. Cyber Security (2016)
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security…
Author(s): Martti Lehto, Pekka Neittaanmäki
10. Computer Security (2018)
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017. The CyberICPS Workshop received 32 submissions from which 10 full and 2 short papers were selected for presentation.
Author(s): Sokratis K. Katsikas, Frédéric Cuppens
Best SCADA Books to Read
We highly recommend you to buy all paper or e-books in a legal way, for example, on Amazon. But sometimes it might be a need to dig deeper beyond the shiny book cover. Before making a purchase, you can visit resources like Genesis and download some Scada books mentioned below at your own risk. Once again, we do not host any illegal or copyrighted files, but simply give our visitors a choice and hope they will make a wise decision.
Cyber-security of SCADA and Other Industrial Control Systems
Author(s): Edward J. M. Colbert, Alexander Kott (eds.)
Publisher: Springer International Publishing, Year: 2016, Size: 9 Mb, Download: pdf
Handbook of SCADA/control systems security
Author(s): Brodsky, Jacob; Radvanovsky, Robert
Publisher: CRC Press, Year: 2016, Size: 27 Mb, Download: pdf
Hacking Exposed: Industrial Control Systems: ICS and SCADA Security Secrets and Solutions
Author(s): Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
Publisher: McGraw-Hill Education, Year: 2016, Size: 7 Mb, Download: epub
Power system SCADA and smart grids
Author(s): Mini S Thomas; John D Mcdonald
Publisher: CRC Press, Year: 2015, Size: 6 Mb, Download: pdf
Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Author(s): Eric D. Knapp, Joel Thomas Langill
Publisher: Syngress, Year: 2014, Size: 19 Mb, Download: pdf
Please note that this booklist is not absolute. Some books are absolutely hot items according to Chicago Tribune, others are composed by unknown writers. On top of that, you can always find additional tutorials and courses on Coursera, Udemy or edX, for example. Are there any other relevant links you could recommend? Leave a comment if you have any feedback on the list.