Build Your Cybersecurity Framework with ISA's Cybersecurity Collection

Industrial Cybersecurity Case Studies and Best Practices
Steve Mustard

Industrial Automation and Control System Security Principles: Protecting the Critical Infrastructure, Second Edition
Ronald L. Krutz
The use of cyber warfare as a prelude or substitute for conventional attacks has gone from conjecture to reality. The obvious targets of such assaults are a nation’s defense establishment, critical infrastructure, corporate intellectual property, government databases, and production capabilities.

Industrial Data Communications, Fifth Edition
Lawrence (Larry) M. Thompson and Tim Shaw
This edition will help you gain a solid understanding of legacy and advanced communications systems in automation and control environments as well as the advances in communication technology. You will learn about cybersecurity methods and standards—including ANSI/ISA/IEC 62443—and how to implement communications systems in a safe and secure manner.

Industrial Ethernet: How to Plan, Install, and Maintain TCP/IP Ethernet Networks, Third Edition
John S. Rinaldi and Perry S. Marshall
This is the go-to guidebook for people who need to fully understand factory floor Ethernet and for those who need to have a basic understanding of Ethernet and TCP/IP terminology, Ethernet hardware, Ethernet software, Ethernet security, and the Internet of Things (IoT).

Industrial Network Security, Second Edition
David J. Teumim
These days one only needs to read the newspaper headlines to appreciate the importance of industrial network security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyber war. Whether we talk about process control systems that run chemical plants and refineries, supervisory control and data acquisition (SCADA) systems for utilities, or factory automation systems for discrete manufacturing, the backbone of our nation’s critical infrastructure consists of these industrial networks and is dependent on their continued operation.

Security PHA Review for Consequence-Based Cybersecurity
Edward M. Marszal and Jim McGlone
Over the past few decades, the process industry has replaced mechanical safeguards with networked microprocessor-based devices that can be configured remotely. The new systems have more functionality their analog counterparts; however, they have also created greater risk from cyber attack. By focusing on hazard and operability studies (HAZOPs) designated scenarios, it is possible to identify hackable scenarios, rank them appropriately, and design non-hackable safeguards—such as relief valves and current overload relays—that are not vulnerable to the cybersecurity threat vector.

Mission Critical Operations Primer
Steve Mustard
The term "mission critical" applies to any activity, system, or equipment whose failure could result in serious consequences, such as loss of life, harm to the environment, or significant financial loss through production impact or plant damage. Written by Steve Mustard, a globally recognized expert in critical infrastructure operations, this book is an excellent reference and learning tool for students in entry-level programs and those beginning their careers in mission critical operations.

Automation Network Selection: A Reference Manual, Third Edition
Dick Caro
Automation networks have changed since this book was first published in 2003. In 13 years, some promised network standards have become reality, wireless networks have proliferated, and two international standards have emerged: WirelessHART and ISA-100 Wireless. Ethernet has become dominant at the base network layers as well as with several application/user layers, and wireless now carries traffic previously assigned only to the wired Ethernet network.