In Depth Security Vol. II

Proceedings of the DeepSec Conferences

Nonfiction, Computers, General Computing
Cover of the book In Depth Security Vol. II by , Magdeburger Institut für Sicherheitsforschung
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783981770032
Publisher: Magdeburger Institut für Sicherheitsforschung Publication: November 22, 2017
Imprint: Language: English
Author:
ISBN: 9783981770032
Publisher: Magdeburger Institut für Sicherheitsforschung
Publication: November 22, 2017
Imprint:
Language: English

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

More books from General Computing

Cover of the book Neural Networks for Electronics Hobbyists by
Cover of the book Multicore Systems On-Chip: Practical Software/Hardware Design by
Cover of the book Risk Assessment and Risk-Driven Testing by
Cover of the book Machine Learning and Systems Engineering by
Cover of the book Infrastructure Software Modules for Enterprises by
Cover of the book Information Security Auditor by
Cover of the book How to Land a Top-Paying Flower arrangers Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More by
Cover of the book Python Programming Fundamentals by
Cover of the book Smart Cities by
Cover of the book Aspect-Oriented, Model-Driven Software Product Lines by
Cover of the book How To Podcast on Wordpress.com by
Cover of the book Create iPhone Apps That Rock by
Cover of the book Formal Aspects of Component Software by
Cover of the book Handbook of Research on Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms by
Cover of the book How to Land a Top-Paying Dishwashers Job: Your Complete Guide to Opportunities, Resumes and Cover Letters, Interviews, Salaries, Promotions, What to Expect From Recruiters and More by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy