In this post, we have prepared a curated top list of reading recommendations for beginners and experienced. This hand-picked list of the best Scada books and tutorials can help fill your brain this June and ensure you’re getting smarter. We have also mentioned the brief introduction of each book based on the relevant Amazon or Reddit descriptions.
- Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions (2016)
- Cybersecurity for Hospitals and Healthcare Facilities (2016)
- SCADA: Supervisory Control and Data Acquisition, 3rd Edition (2004)
- Cyber-Physical Attacks: A Growing Invisible Threat (2015)
- Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide (2016)
- Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure (2008)
- SCADA Principles for Bottle Filling (2012)
- Machine, Meet Human (2010)
- Cyber Security (2016)
- Computer Security (2018)
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions (2016)
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries.
Author(s): Clint Bodungen, Bryan Singer
Cybersecurity for Hospitals and Healthcare Facilities (2016)
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments.
Author(s): Luis Ayala
SCADA: Supervisory Control and Data Acquisition, 3rd Edition (2004)
Supervisory control and data acquisition (SCADA) technology has evolved over the past 30 years as a method of monitoring and controlling large processes. This newly revised reference book offers overviews of SCADA’s component technologies, as well as details necessary to understand the big picture. SCADA processes cover areas that may be measured in the thousands of square miles, and have dimensions that may be hundreds, occasionally thousands, of miles long.
Author(s): Stuart A. Boyer
Cyber-Physical Attacks: A Growing Invisible Threat (2015)
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means.
Author(s): George Loukas PhD Imperial College UK; MEng NTUA Greece.
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide (2016)
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time―even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack.
Author(s): Luis Ayala
Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure (2008)
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure–everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks.
Author(s): Jack Wiles, Ted Claypoole
SCADA Principles for Bottle Filling (2012)
It’s been more than a decade since 21st century and countries world over are on the brink of increasing their economy by setting up as many industries as possible and in contrast investors are eager to put as minimum amount of finances as possible due to inflation in the global market.
Author(s): Adnan Shaffi, Afaq Khan
Machine, Meet Human (2010)
“Machine, Meet Human: Designing a Useful Interface” is written to help anyone from any background get up to speed with the state of SCADA HMI graphics design and to teach the concepts of the most effective design ideas. The idea of graphic creation covered here is a holistic approach starting with the need.
Author(s): Nathaniel O’Shaughnessey
Cyber Security (2016)
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers.
Author(s): Martti Lehto, Pekka Neittaanmäki
Computer Security (2018)
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017. The CyberICPS Workshop received 32 submissions from which 10 full and 2 short papers were selected for presentation.
Author(s): Sokratis K. Katsikas, Frédéric Cuppens
You might also be interested in: WebGL, Unity, STL, Haskell, MongoDB, Hadoop, Neo4j, Vaadin, Elasticsearch, Sharepoint Books.
Best SCADA Books to Read
We highly recommend you to buy all paper or e-books in a legal way, for example, on Amazon. But sometimes it might be a need to dig deeper beyond the shiny book cover. Before making a purchase, you can visit resources like Library Genesis and download some Scada books mentioned below at your own risk. Once again, we do not host any illegal or copyrighted files, but simply give our visitors a choice and hope they will make a wise decision.
SCADAPack 575 Hardware Manual
Author(s): Schneider Electric
ID: 3505690, Publisher: , Year: June 2022, Size: 12 Mb, Format: chm
SCADAPACK 574 Hardware Manual
Author(s): Schneider Electric
ID: 3505746, Publisher: , Year: June 2022, Size: 9 Mb, Format: chm
SCADAPack 570 Hardware Manual
Author(s): Schneider Electric
ID: 3505760, Publisher: , Year: June 2022, Size: 8 Mb, Format: chm
Please note that this booklist is not absolute. Some books are absolutely hot items according to Chicago Tribune, others are composed by unknown writers. On top of that, you can always find additional tutorials and courses on Coursera, Udemy or edX, for example. Are there any other relevant links you could recommend? Leave a comment if you have any feedback on the list.