In Depth Security Vol. II

Proceedings of the DeepSec Conferences

Nonfiction, Computers, General Computing
Cover of the book In Depth Security Vol. II by , Magdeburger Institut für Sicherheitsforschung
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783981770032
Publisher: Magdeburger Institut für Sicherheitsforschung Publication: November 22, 2017
Imprint: Language: English
Author:
ISBN: 9783981770032
Publisher: Magdeburger Institut für Sicherheitsforschung
Publication: November 22, 2017
Imprint:
Language: English

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

More books from General Computing

Cover of the book The Beginner's iPhone Tutorial by
Cover of the book From Requirements to Java in a Snap by
Cover of the book Security-Aware Device-to-Device Communications Underlaying Cellular Networks by
Cover of the book Business Knowledge for IT in Private Wealth Management by
Cover of the book Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks by
Cover of the book Rules of Play by
Cover of the book Abgründe der Informatik by
Cover of the book Die besten 10 HDTVs von 40 bis 42 Zoll by
Cover of the book How to Land a Top-Paying Operating engineers Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More by
Cover of the book Conflict Resolution Using the Graph Model: Strategic Interactions in Competition and Cooperation by
Cover of the book Computer Vision – ECCV 2018 Workshops by
Cover of the book Practical Network Automation by
Cover of the book XML Programming: The Ultimate Guide to Fast, Easy, and Efficient Learning of XML Programming by
Cover of the book Intelligence Science and Big Data Engineering. Image and Video Data Engineering by
Cover of the book Theoretical Aspects of Computing – ICTAC 2017 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy