Skip to content

Build Your Cybersecurity Framework with ISA's Cybersecurity Collection

ISA Publications meets the needs of automation and control professionals worldwide by offering print and online technical resources including print books, digital books, magazines, journals, newsletters, software, technical papers, proceedings, and standards.

 

Ind-Cyber-Case-Stud-Best-Prac-3D-WEB-250x385
Industrial Cybersecurity Case Studies and Best Practices

Steve Mustard

This book provides a practical overview of industrial control systems cybersecurity from governance through design and implementation to operational support. It is for anyone involved in industrial control systems cybersecurity, including asset owners, vendors, system integrators, and consultants, regardless of their level of technical expertise. 
Industrial-Automation_2nd_Krutz
Industrial Automation and Control System Security Principles: Protecting the Critical Infrastructure, Second Edition

Ronald L. Krutz

The use of cyber warfare as a prelude or substitute for conventional attacks has gone from conjecture to reality. The obvious targets of such assaults are a nation’s defense establishment, critical infrastructure, corporate intellectual property, government databases, and production capabilities. 

Industrial-Data-Comm_5thEd_Thompson
Industrial Data Communications, Fifth Edition

Lawrence (Larry) M. Thompson and Tim Shaw

This edition will help you gain a solid understanding of legacy and advanced communications systems in automation and control environments as well as the advances in communication technology. You will learn about cybersecurity methods and standards—including ANSI/ISA/IEC 62443—and how to implement communications systems in a safe and secure manner.

Industrial-Ethernet-3rdEd_Marshall_3D_LP-1
Industrial Ethernet: How to Plan, Install, and Maintain TCP/IP Ethernet Networks, Third Edition

John S. Rinaldi and Perry S. Marshall

This is the go-to guidebook for people who need to fully understand factory floor Ethernet and for those who need to have a basic understanding of Ethernet and TCP/IP terminology, Ethernet hardware, Ethernet software, Ethernet security, and the Internet of Things (IoT).

Industrial-Network-Security_2ndEd_Teu
Industrial Network Security, Second Edition

David J. Teumim

These days one only needs to read the newspaper headlines to appreciate the importance of industrial network security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyber war. Whether we talk about process control systems that run chemical plants and refineries, supervisory control and data acquisition (SCADA) systems for utilities, or factory automation systems for discrete manufacturing, the backbone of our nation’s critical infrastructure consists of these industrial networks and is dependent on their continued operation.

Security-PHA-Review_3D-for-LP
Security PHA Review for Consequence-Based Cybersecurity

Edward M. Marszal and Jim McGlone

Over the past few decades, the process industry has replaced mechanical safeguards with networked microprocessor-based devices that can be configured remotely. The new systems have more functionality their analog counterparts; however, they have also created greater risk from cyber attack. By focusing on hazard and operability studies (HAZOPs) designated scenarios, it is possible to identify hackable scenarios, rank them appropriately, and design non-hackable safeguards—such as relief valves and current overload relays—that are not vulnerable to the cybersecurity threat vector.

Mustard-Mission-3D-leadpg
Mission Critical Operations Primer

Steve Mustard

The term "mission critical" applies to any activity, system, or equipment whose failure could result in serious consequences, such as loss of life, harm to the environment, or significant financial loss through production impact or plant damage. Written by Steve Mustard, a globally recognized expert in critical infrastructure operations, this book is an excellent reference and learning tool for students in entry-level programs and those beginning their careers in mission critical operations.

Automation-Network-Selection_3rdEd_Caro_3D_LP
Automation Network Selection: A Reference Manual, Third Edition

Dick Caro

Automation networks have changed since this book was first published in 2003. In 13 years, some promised network standards have become reality, wireless networks have proliferated, and two international standards have emerged: WirelessHART and ISA-100 Wireless. Ethernet has become dominant at the base network layers as well as with several application/user layers, and wireless now carries traffic previously assigned only to the wired Ethernet network.

 

Cyber-library-pack-graphic-web-1

Interested in the Full Collection?