cta quote button US

Best SCADA Books to Read

In this post, we have prepared a curated top list of reading recommendations for beginners and experienced. This hand-picked list of the best Scada books and tutorials can help fill your brain this April and ensure you’re getting smarter. We have also mentioned the brief introduction of each book based on the relevant Amazon or Reddit descriptions.

1. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions (2016)

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that…

Author(s): Clint Bodungen, Bryan Singer

2. Cybersecurity for Hospitals and Healthcare Facilities (2016)

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments.

Author(s): Luis Ayala

3. SCADA: Supervisory Control and Data Acquisition, 3rd Edition (2004)

Supervisory control and data acquisition (SCADA) technology has evolved over the past 30 years as a method of monitoring and controlling large processes. This newly revised reference book offers overviews of SCADA’s component technologies, as well as details necessary to understand the big picture. SCADA processes cover areas that may be measured in the thousands of square miles, and have dimensions that may be hundreds, occasionally thousands, of miles long. Now a mature technology, SCADA includes, but is not limited to, software packages that can be…

Author(s): Stuart A. Boyer

4. Cyber-Physical Attacks: A Growing Invisible Threat (2015)

Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means.

Author(s): George Loukas PhD Imperial College UK; MEng NTUA Greece.

5. Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide (2016)

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time―even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack.

Author(s): Luis Ayala

6. Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure (2008)

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure–everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security…

Author(s): Jack Wiles, Ted Claypoole

7. SCADA Principles for Bottle Filling (2012)

It’s been more than a decade since 21st century and countries world over are on the brink of increasing their economy by setting up as many industries as possible and in contrast investors are eager to put as minimum amount of finances as possible due to inflation in the global market. However cutting down different financial attributes, investors and engineers both expect a favorable yield which proves sufficient not only for the growth of one’s industry but also in foreign trade. Hence this is where PLCs with SCADA kicks in by not only saving staggering amounts of finances to set up an automated industry…

Author(s): Adnan Shaffi, Afaq Khan

8. Machine, Meet Human (2010)

“Machine, Meet Human: Designing a Useful Interface” is written to help anyone from any background get up to speed with the state of SCADA HMI graphics design and to teach the concepts of the most effective design ideas. The idea of graphic creation covered here is a holistic approach starting with the need. Then it progresses to understanding the aspects of the Machine and the Human; what makes them unique and what makes them similar. Finally we see how we can design with those understandings in mind to leverage existing habits and natural tendencies to create…

Author(s): Nathaniel O’Shaughnessey

9. Cyber Security (2016)

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security…

Author(s): Martti Lehto, Pekka Neittaanmäki

10. Computer Security (2018)

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2017, and the First International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium on Research in Computer Security, ESORICS 2017. The CyberICPS Workshop received 32 submissions from which 10 full and 2 short papers were selected for presentation.

Author(s): Sokratis K. Katsikas, Frédéric Cuppens

You might also be interested in: WebGL, Unity, STL, Haskell, MongoDB, Hadoop, Neo4j, Vaadin, Elasticsearch, Sharepoint Books.

We highly recommend you to buy all paper or e-books in a legal way, for example, on Amazon. But sometimes it might be a need to dig deeper beyond the shiny book cover. Before making a purchase, you can visit resources like Genesis and download some Scada books mentioned below at your own risk. Once again, we do not host any illegal or copyrighted files, but simply give our visitors a choice and hope they will make a wise decision.

Проектирование АСУТП с использованием SCADA-систем

Author(s): Герасимов А.В., Титовцев А.С.
Publisher: Казанский национальный исследовательский технологический университет, Year: 2017, Size: 41 Mb, Ext: pdf
ID: 2167569

Cyber-security of SCADA and Other Industrial Control Systems

Author(s): Edward J. M. Colbert, Alexander Kott (eds.)
Publisher: Springer International Publishing, Year: 2016, Size: 9 Mb, Ext: pdf
ID: 1580265

Handbook of SCADA/control systems security

Author(s): Brodsky, Jacob; Radvanovsky, Robert
Publisher: CRC Press, Year: 2016, Size: 27 Mb, Ext: pdf
ID: 1592997

Hacking Exposed: Industrial Control Systems: ICS and SCADA Security Secrets and Solutions

Author(s): Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
Publisher: McGraw-Hill Education, Year: 2016, Size: 7 Mb, Ext: epub
ID: 2174985

Power system SCADA and smart grids

Author(s): Mini S Thomas; John D Mcdonald
Publisher: CRC Press, Year: 2015, Size: 6 Mb, Ext: pdf
ID: 1336994

Автоматизированные информационно-управляющие системы с применением SCADA-системы TRACE MODE

Author(s): Пьявченко Т.А.
Publisher: Издательство "Лань", Year: 2015, Size: 5 Mb, Ext: pdf
ID: 1664533

Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Author(s): Eric D. Knapp, Joel Thomas Langill
Publisher: Syngress, Year: 2014, Size: 19 Mb, Ext: pdf
ID: 1375056

Segurança de automação industrial e SCADA

Author(s): Branquinho, Marcelo Ayres
Publisher: Elsevier, Year: 2014, Size: 21 Mb, Ext: pdf
ID: 1378939

Инструментарий системы реального времени «СИРИУС-SCADA»

Author(s): Музипов Х.Н., Кузяков О.Н., Хохрин С.А.
Publisher: Тюменский государственный нефтегазовый университет, Year: 2014, Size: 4 Mb, Ext: pdf
ID: 1662270

Система реального времени «СИРИУС-SCADA»

Author(s): Музипов Х.Н., Кузяков О.Н., Хохрин С.А.
Publisher: Тюменский государственный нефтегазовый университет, Year: 2014, Size: 2 Mb, Ext: pdf
ID: 1662284

Affiliate Disclaimer: We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

We have compiled a list of Best Reference Books on Power System SCADA Subject. These books are used by students of top universities, institutes and colleges. and one should look for free pdf copies from these Authors only if they have explicitly made it free to download and read them. Reading a little deeper into this simple story, it is obvious that this book is not necessarily directed at just young readers. It is a powerful critique of the state of SCADA/ICS security, and a resounding call to action for policy makers. SCADA: Supervisory Control and Data Acquisition by Stuart A. Boyer (Author) 2. Handbook of SCADA/Control Systems Security by Jacob Brodsky, Robert Radvanovsky 3. Scada and Me: A Boo… Quora. Ask New Question. Sign In. Supervisory Control and Data Acquisition. Book Recommendations. Which is the best book for SCADA? Update Cancel. ad by Wikibuy Books Advanced Search New Releases Amazon Charts Best Sellers & More The New York Times® Best Sellers Children’s Books Textbooks Textbook Rentals Sell Us Your Books Best Books of the Month Kindle eBooks Then you can start reading Kindle books on your smartphone, tablet, or computer – no Kindle device required. Apple. Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, To date this is clearly the best book on ICS Security by far. The two best things about this book are: 1) They got the facts right about both ICS and IT security.