In Depth Security Vol. II

Proceedings of the DeepSec Conferences

Nonfiction, Computers, General Computing
Cover of the book In Depth Security Vol. II by , Magdeburger Institut für Sicherheitsforschung
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783981770032
Publisher: Magdeburger Institut für Sicherheitsforschung Publication: November 22, 2017
Imprint: Language: English
Author:
ISBN: 9783981770032
Publisher: Magdeburger Institut für Sicherheitsforschung
Publication: November 22, 2017
Imprint:
Language: English

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

More books from General Computing

Cover of the book Fundamentals of Computation Theory by
Cover of the book Energy Efficient Data Centers by
Cover of the book CCENT Practice and Study Guide by
Cover of the book High Performance Computing for Computational Science -- VECPAR 2014 by
Cover of the book Cloud Technology by
Cover of the book Geographical Information Systems Theory, Applications and Management by
Cover of the book Spam Filter: Little Known Tips You Need to Know About Anti Spam, Email Spam and Spam Software by
Cover of the book Information Systems Transformation by
Cover of the book Enterprise Information Systems by
Cover of the book From Requirements to Java in a Snap by
Cover of the book iPad Air, mini Retina, mini & iPad 2 Pour les Nuls by
Cover of the book Big Data Analytics with Spark by
Cover of the book Computer Models for Facial Beauty Analysis by
Cover of the book Information Sciences and Systems 2013 by
Cover of the book BSD Hacks by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy