This book is either ambitious, brave, or reckless approaching
a topic as rapidly evolving as industrial control system (ICS)
security. From the advent of ICS-targeted malicious software
such as Stuxnet to the advanced persistent threats posed by
organized crime and state-sponsored entities, ICS is in the
crosshairs and practices and controls considered safe today
may be obsolete tomorrow. Possibly more so than in more
traditional IT security, because of the differences inherent in
ICS.