Handbook on Securing Cyber-Physical Critical Infrastructure by