In Depth Security Vol. II

Proceedings of the DeepSec Conferences

Nonfiction, Computers, General Computing
Cover of the book In Depth Security Vol. II by , Magdeburger Institut für Sicherheitsforschung
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783981770032
Publisher: Magdeburger Institut für Sicherheitsforschung Publication: November 22, 2017
Imprint: Language: English
Author:
ISBN: 9783981770032
Publisher: Magdeburger Institut für Sicherheitsforschung
Publication: November 22, 2017
Imprint:
Language: English

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

More books from General Computing

Cover of the book Mastering Blockchain by
Cover of the book Approximation and Online Algorithms by
Cover of the book Big Data Analytics by
Cover of the book Managing Your Amazon Cloud Drive All You Need to Know About Easy Cloud Storage by
Cover of the book Game Testing by
Cover of the book Extending Symfony2 Web Application Framework by
Cover of the book Node.js Recipes by
Cover of the book Issues and Challenges in Artificial Intelligence by
Cover of the book Big Data by
Cover of the book La tienda de los sueños. Jeff Bezos y la era de Amazon by
Cover of the book CWTS Certified Wireless Technology Specialist Study Guide (Exam PW0-070) by
Cover of the book Computer Forensics and Digital Investigation with EnCase Forensic v7 by
Cover of the book Can an App change the world? Persuasive Affordance Design in 'Mindful Meerkats' by
Cover of the book Advances in Applied Mechanics by
Cover of the book Innovative Mobile and Internet Services in Ubiquitous Computing by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy