Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
IoT and OT Security Handbook
IoT and OT Security Handbook

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

Arrow left icon
Profile Icon Smita Jain Profile Icon Vasantha Lakshmi
Arrow right icon
€13.99 €20.99
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.7 (6 Ratings)
eBook Mar 2023 172 pages 1st Edition
eBook
€13.99 €20.99
Paperback
€26.99
Subscription
Free Trial
Renews at €18.99p/m
Arrow left icon
Profile Icon Smita Jain Profile Icon Vasantha Lakshmi
Arrow right icon
€13.99 €20.99
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.7 (6 Ratings)
eBook Mar 2023 172 pages 1st Edition
eBook
€13.99 €20.99
Paperback
€26.99
Subscription
Free Trial
Renews at €18.99p/m
eBook
€13.99 €20.99
Paperback
€26.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Table of content icon View table of contents Preview book icon Preview Book

IoT and OT Security Handbook

Addressing Cybersecurity in the Age of Industry 4.0

We are seeing fast-paced digital transformation in all industries, including the operational technology (OT) and Internet of Things (IoT) industries.

The different eras of industry, as seen in Figure 1.1, have brought significant changes in the ways businesses work. Revolutionary changes within the way that industries operate have been brought about by manufacturing companies becoming more secure, efficient, productive, and profitable:

Figure 1.1 – The different eras of industrial revolution

Figure 1.1 – The different eras of industrial revolution

The computing technology of Industry 4.0 is powered by a connected network and has a digital twin on the internet too. This enables communication and information sharing. This networking is sometimes referred to as a cyber-physical production system. This makes organizations and industries more autonomous. First, let us look at how Industry 4.0 came to be:

  • Industry 1.0: innovations of steam power and mechanical engines in Industry 1.0 led to the faster conveyance of goods and people, resulting in enormous time savings.
  • Industry 2.0: Electrical power and electronic assembly brought down the cost of production and business became more profitable and agile to demands.
  • Industry 3.0: With computers and programming logic, businesses started automating complete assembly lines; so, parts were built faster as the assembly line system became more efficient at performing tasks. However, during this revolution, things remained human-driven and machine-executed. The fast pace amazed consumers and businesses.
  • Industry 4.0: This revolution was built on top of Industry 3.0, in which isolated devices were connected through computer networks. Meanwhile, manually driven operations were converted into fully automated and integrated systems with digital twins on the internet to simulate different tasks on devices. The entire field was positively impacted by all the insights incorporated from demand to supply. Connected devices brought more intel.

The entire journey from Industry 1.0 to 4.0 has made business more profitable, agile, and cost-effective. Automation and intelligence have also introduced visibility into the demand and supply of raw materials and enhanced the quality of finished products. Businesses are now more empowered by all the intelligence derived from the system to make the right decisions.

Microsoft presently invests over $5 billion in IoT research and is a pacesetter regarding this new technology, thus contributing to the overall Industry 4.0 revolution. Microsoft Defender for IoT (MDIoT) is accelerating this digital transformation for organizations, with comprehensive security across IoT or OT infrastructure. MDIoT provides agentless network detection and response (NDR). The technology is rapidly deployed and works with various IoT, OT, and industrial control systems (ICS). For IoT device producers, MDIoT provides a lightweight agent to enhance device-level security. It is a solution that interacts with Microsoft 365 Defender, Microsoft Sentinel, Microsoft Defender for Endpoint, devices, and external security operations center (SOC) tools. It can be deployed on-premises, in a hybrid setup, or via the cloud. MDIOT covers the IoT, OT, and the Enterprise Internet of Things (EIoT). This book focuses on securing OT.

Before we get to that, though, in this chapter, we will cover the following topics:

  • How is Industry 4.0 being leveraged?
  • Understanding cybersecurity challenges in the age of Industry 4.0
  • Enumerating the factors influencing IoT/OT security
  • How to overcome security challenges

How is Industry 4.0 being leveraged?

The power of artificial intelligence (AI) tools has led to the evolution of Industry 4.0. Various sectors—such as manufacturing, healthcare, finance, the public sector, consumer goods, retail, and smart city planning and building—use intelligent machines to help subject matter experts (SMEs) streamline processes, thus helping to meet highly competitive industry demands. How is this leveraged by different industry verticals?

The following figure describes how Industry 4.0 is leveraged by different industry verticals:

Figure 1.2 – Industries leveraging industry 4.0

Figure 1.2 – Industries leveraging industry 4.0

The factors that are common across all verticals are the reduced cost of operations and enhanced customer experience, ultimately making companies more secure, efficient, productive, and profitable.

Now that we have seen some of the verticals leveraging and benefiting from Industry 4.0, we can go into detail regarding how these industries operate in the real world. In the real world, the convergence of information technology (IT) and OT brings about new challenges to conquer – that is, cybersecurity – and this convergence is bound to happen in pursuit of better business results, profits, data analytics, and much more.

Let us quickly learn a few basic terms:

  • OT is hardware and software that detects or causes a change through directly monitoring and/or controlling industrial equipment, assets, processes, and events.
  • The IoT is the concept of interconnected computer devices, mechanical and digital machines, objects, animals, or people, armed with unique identifiers (UIDs) and the ability to transmit data over a network, without intervention or computer interaction.
  • The EIoT refers to how digital transformation and enterprise strategies being connected enables seamless collaboration between people and technology. It also provides more insight and improves the productivity of an enterprise by reducing the amount of manual work and optimizing business outcomes.
  • The Industrial Internet of Things (IIoT) refers to the expansion and use of the IoT in industrial applications. It focuses strongly on machine-to-machine (M2M) communication, big data, and machine learning (ML). The IIoT enables industries and businesses to make their operations more efficient and reliable. It encompasses industrial applications, including robotics, medical devices, and software-defined manufacturing processes.
  • Supervisory control and data acquisition (SCADA) is a control system architecture that includes computers, networked data communications, and graphical user interfaces to monitor machinery and processes at a high level. This includes sensors and other devices, such as programmable logic controllers (PLCs), that are connected to process systems or machines.
  • A distributed control system (DCS) is an automated control system for a process or plant, usually with many control loops, in which self-contained controls are distributed throughout the system, but there is no centralized operator supervision. This is in contrast to systems with centralized controllers, discrete controllers in a central control room, or a central computer. The DCS concept increases reliability and reduces installation costs by placing control functions close to the process installation with remote monitoring.

The following figure provides more insight into the convergence of IT and OT, along with the IoT:

Figure 1.3 – Convergence of IT, OT, and the IoT

Figure 1.3 – Convergence of IT, OT, and the IoT

While OT covers control systems such as PLCs and DCS, IT covers PCs, servers, websites, and applications hosted within the organization or leveraged by an organization. The IT industry focuses on data while OT is focused on operations and the IoT focuses on M2M communication over the internet.

The IIoT industry, on the other hand, is about the use of smart sensors and actuators to enhance the outcome of industrial processes. This represents the intersection between OT and the IoT.

The legacy model of operation for organizations required IT and OT to be isolated. However, the convergence of IT and OT has brought about a successful transformation for the OT and IoT industries.

The IoT has already crossed the nascent stage and it has become mainstream. In fact, the number of IoT devices has already surpassed the number of IT devices. This proliferation of IoT devices has brought about increased attention, and adversaries and threat actors have already started targeting them for quick monetary gain by exploiting their vulnerabilities.

Industry 4.0 has three important stages:

  1. Digitization: Digitized outputs that are connected to industrial assets lead to the convergence of the digital and physical worlds. Connecting digitized outputs to security information and event management (SIEM) solutions can provide visibility to all incidents and actions in real time.
  2. Sensorization: Adding sensors to industry processes helps bring about better interconnection. This enables the autodetection of issues or changes in temperature, pressure, humidity, and so on, as it helps ascertain that the continuous monitoring of inputs and any sudden changes to them is in place. This prevents mishaps, too.
  3. Optimization: With the AI and ML world we live in, data analytics is leveraged to improve business and process outcomes. Leveraging data analytics and simulations leads to optimized results, which bring about profits for the organization through the management of time and effort.

So far, we have understood the impact of and the blazing changes brought in by Industry 4.0, and how a connected world and its disruptive technology (the use of AI and ML) have changed our future trajectory in general.

Understanding cybersecurity challenges in the age of Industry 4.0

It is a known fact that cybersecurity breaches in any industry negatively affect business outcomes, and this is still a concern in the age of Industry 4.0. Cyberattacks on critical industrial equipment hamper businesses. Digitization is driven by four kinds of disruption:

  • The astronomical rise in data volumes: As everything moves toward digitization, we can imagine the wealth of data generated as a result, thus making it easy for an attacker to intercept data and steal intellectual property (IP) as the amount of data that needs to be protected against threats and malware increases.
  • Forever-increasing computational power: The job of attackers gets easier every time we see an increase in computational power. Quantum computing has increased our computational power manifold. This has empowered attackers to break or crack open more boundaries and types of authentication faster.
  • A super-connected world (connected vehicles, airbuses, heart defibrillators, etc.): The attack surface has increased to an extent that it can now affect human life as well. Thinning down network segmentation, collecting data from sensors, and sending it for further processing have contributed to an increased attack surface.
  • A data (AI and ML) world (deep insights, business intelligence, and analytics): Analytics are key for any organization to thrive today. While data brings about more business intelligence and provides opportunities for businesses to take calculated steps toward success, if infiltrated, these insights and intelligence fall directly into the hands of an attacker.

As a lot of industries adapt to Industry 4.0, they have become an appealing target for attackers. Attackers jump across IT and OT laterally on the lookout for vulnerabilities to exploit them, paving the way for industrial espionage, IP leakage, or IP theft.

The improved connectivity between and the convergence of OT and IT have increased the attack surface. This also requires that the compliance requirements of every industry be retouched to meet the ever-growing security requirements.

We are here to address this challenge and aid organizations in line with Industry 4.0 to protect their infrastructure from attacks continuously. We can do this with MDIoT. We will see more about MDIoT in upcoming chapters.

Cybersecurity challenges are ever-increasing, and the few that affect the IoT/OT world that we have mentioned are just examples to get us started on this journey to understand the challenges and how to address them better with MDIoT.

Enumerating the factors influencing IoT/OT security

Attacks on internet devices have increased manifold in recent years and are commonplace now. The reasons for this are the following:

  • Weak credentials: How often have we ignored notifications to change our default passwords? We cannot forget the Mirai botnet attack, which made use of default usernames and passwords of this kind.
  • Legacy software and hardware: We don’t always see IoT devices being updated. With the pace at which technology is growing, it becomes very easy for attackers to find weaknesses. Hence, it is of paramount importance to always update devices.
  • Proprietary protocols and the complex structure of OT devices: With so many types of devices in use, we can only imagine the many proprietary protocols and the complex structures they would bring in. Siemens, Schneider, ABB, Rockwell Automation, and so on all use closed protocols.
  • Anomalous operational events: Operations such as start, stop, and restart are all priority commands for Retentive Timers (RTOs), PLCs, actuators, and so on. Hence, it becomes a priority to clearly distinguish legitimate events from anomalous events.

These are some of the obvious factors that affect IoT/OT security. As we proceed further through the book, we will see more of these factors and how MDIoT addresses the challenges involved.

How to overcome security challenges

IoT/OT security should focus on providing visibility into the landscape of connected devices within an organization while going by the principle, “If you do not need the device at all, do not have it!” Reduce your attack surface.

However, if you do need a device, ensure that you have an accurate asset inventory. If you do not know the assets owned by your organization, you do not know what to protect—especially in a decentralized environment with multiple IoT/OT devices:

Figure 1.4 – Approach to securing an IoT/OT infrastructure

Figure 1.4 – Approach to securing an IoT/OT infrastructure

A trusted computing base (TCB) or a security baseline approach is a basic requirement and a necessity in today’s world to harden the infrastructure. We close many exploits that could be open if we plan our baseline security well.

Vulnerabilities on devices such as ICS and SCADA need to be addressed and may require working closely with vendors to always be on top of patching. Zero-day vulnerabilities can pose a huge risk and need to be identified and mitigated immediately by looking out for indicators of compromise. Since we are talking about vulnerabilities, we can already imagine having focused patching for all enterprise-wide devices. The IoT, OT, and IT are all crucial, and taking a piecemeal approach to patching is a recipe for disaster.

Continuous monitoring is key for any security-focused organization. An organization focused on monitoring its IoT/OT assets one day that then lapses the next day will not really be effective at thwarting any attacks coming its way. With so many focused and agile attackers capable of even engaging in nation-state attacks, you need to ensure that your monitoring is always turned on and that alerts are sent to the SOC team in near real time as well.

This section provided more perspective on a holistic approach that you can take to securely manage IoT/OT devices.

Summary

In conclusion, there are multiple ways you can secure your organization holistically (IT, OT, the IoT, and the IIoT). In this chapter, you have seen the evolution and adoption of Industry 4.0 and how it has affected the cybersecurity landscape of IoT/OT devices. There are multiple approaches to adopting secure practices for the IoT or OT that organizations can take, and we have discussed some of the best approaches. To top it off, you can always look at defense in depth to ensure you have a backup security mechanism and are covered in the case of any failures.

In the next chapter, we will look at the network architecture of IoT/OT devices and how this affects cybersecurity when it is not managed well.

Left arrow icon Right arrow icon

Key benefits

  • Identify and resolve cybersecurity challenges in the IoT and OT worlds
  • Familiarize yourself with common attack vectors in the IoT and OT domains
  • Dive into Defender for IoT, understand its capabilities, and put it to practice

Description

The Fourth Industrial Revolution, or Industry 4.0, is all about digital transformation, manufacturing, and production. The connected world we live in today, including industries, comes with several cybersecurity challenges that need immediate attention. This book takes you through the basics of IoT and OT architecture and helps you understand and mitigate these security challenges. The book begins with an overview of the challenges faced in managing and securing IoT and OT devices in Industry 4.0. You’ll then get to grips with the Purdue model of reference architecture, which will help you explore common cyber attacks in IoT and OT environments. As you progress, you’ll be introduced to Microsoft Defender for IoT and understand its capabilities in securing IoT and OT environments. Finally, you will discover best practices for achieving continuous monitoring and vulnerability management, as well as threat monitoring and hunting, and find out how to align your business model toward zero trust. By the end of this security book, you’ll be equipped with the knowledge and skills to efficiently secure IoT and OT environments using Microsoft Defender for IoT.

Who is this book for?

This book is for industrial security, IoT security, and IT security professionals. Security engineers, including pentesters, security architects, and ethical hackers, who want to ensure the security of their organization's data when connected with the IoT will find this book useful.

What you will learn

  • Discover security challenges faced in IoT and OT environments
  • Understand the security issues in Industry 4.0
  • Explore Microsoft Defender for IoT and learn how it aids in securing the IoT/OT industry
  • Find out how to deploy Microsoft Defender for IoT along with its prerequisites
  • Understand the importance of continuous monitoring
  • Get familiarized with vulnerability management in the IoT and OT worlds
  • Dive into risk assessment as well as threat monitoring and hunting
  • Achieve zero trust for IoT devices

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Mar 30, 2023
Length: 172 pages
Edition : 1st
Language : English
ISBN-13 : 9781804614099
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning

Product Details

Publication date : Mar 30, 2023
Length: 172 pages
Edition : 1st
Language : English
ISBN-13 : 9781804614099
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 100.97
Industrial IoT for Architects and Engineers
€35.99
IoT and OT Security Handbook
€26.99
Practical Cybersecurity Architecture
€37.99
Total 100.97 Stars icon

Table of Contents

15 Chapters
Part 1: Understand the Challenges in IoT/OT Security and Common Attacks Chevron down icon Chevron up icon
Chapter 1: Addressing Cybersecurity in the Age of Industry 4.0 Chevron down icon Chevron up icon
Chapter 2: Delving into Network Segmentation-Based Reference Architecture – the Purdue Model Chevron down icon Chevron up icon
Chapter 3: Common Attacks on IoT/OT Environments Chevron down icon Chevron up icon
Part 2: How Microsoft Defender for IoT Can Address the Open Challenges in the Connected World We Live in Today Chevron down icon Chevron up icon
Chapter 4: What Is Microsoft Defender for IoT? Chevron down icon Chevron up icon
Chapter 5: How Does Microsoft Defender for IoT Fit into Your OT/IoT Environment/Architecture? Chevron down icon Chevron up icon
Chapter 6: How Do the Microsoft Defender for IoT Features Help in Addressing Open Challenges? Chevron down icon Chevron up icon
Part 3: Best Practices to Achieve Continuous Monitoring, Vulnerability Management, Threat Monitoring and Hunting, and to Align the Business Model Toward Zero Trust Chevron down icon Chevron up icon
Chapter 7: Asset Inventory Chevron down icon Chevron up icon
Chapter 8: Continuous Monitoring Chevron down icon Chevron up icon
Chapter 9: Vulnerability Management and Threat Monitoring Chevron down icon Chevron up icon
Chapter 10: Zero Trust Architecture and the NIST Cybersecurity Framework Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.7
(6 Ratings)
5 star 66.7%
4 star 0%
3 star 0%
2 star 0%
1 star 33.3%
Filter icon Filter
Top Reviews

Filter reviews by




Brandon Lachterman Jun 16, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is a great guide to really addressing real life security controls and concerns, and the book doesn't spend half of its chapters without adding value. Descriptions of best practices, and some real life guides to improving DevSec and awareness immediately.Great guide, highly recommend.
Amazon Verified review Amazon
Dwayne Natwick May 23, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I recently had the opportunity to read the IoT and OT Security Handbook by Smita J. and Vasantha Lakshmi, CISSP. With the constant expansion of edge technology within IoT and OT, there are many questions on how to secure these devices, monitor access, and govern data. This book provides a guide to follow to accomplish address these challenges leveraging Microsoft Defender for IoT and other tools. If you are in security and need to secure these devices, this book provides you with what you need.
Amazon Verified review Amazon
Placeholder May 17, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Best😊
Amazon Verified review Amazon
Michael Crane May 25, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The author hit this book out of the park. It was broken down from level 100-400, across the Purdue model and the Microsoft offerings. I’ve already handed this book to my iot teammates. There is a lot of not good information to learn from on Microsoft sites. Fortunately for us, this nails it! The only thing, I’d knit pick on. I wish the author dove a little more into how MDE can be leveraged as a iot discovery.
Amazon Verified review Amazon
Joseph F. Slowik May 24, 2023
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
A friend passed along several sections of this book, deeply confused, asking for me to try and explain what the authors were attempting to communicate. In short, given over a decade's worth of experience analyzing and documenting industrial security incidents, the provided sections indicate the authors have no understanding whatsoever of industrial security and the provided case descriptions.This book appears to be an abject failure, and those wishing to learn more about OT/ICS security are advised to look elsewhere in the strongest possible terms.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.