This book provides detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in close-loop systems, and various cyber-security applications. We expect the book to be pavorable to those who are interested in secure theories and technologies for industrial control systems