In Depth Security Vol. III: Proceedings of the DeepSec Conferences

by: Stefan Schumacher and René Pfeiffer

  • Citation: Stefan Schumacher and René Pfeiffer (2019) In Depth Security Vol. III: Proceedings of the DeepSec Conferences, Magdeburger Institut für Sicherheitsforschung, Magdeburg

In Depth Security Vol. II: Proceedings of the DeepSec Conferences

by: Stefan Schumacher and René Pfeiffer

  • Citation: Stefan Schumacher and René Pfeiffer (2017) In Depth Security Vol. II: Proceedings of the DeepSec Conferences, Magdeburger Institut für Sicherheitsforschung, Magdeburg

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world’s most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

In Depth Security: Proceedings of the DeepSec Conferences

by: Stefan Schumacher and René Pfeiffer

  • Citation: Stefan Schumacher and René Pfeiffer (2015) In Depth Security: Proceedings of the DeepSec Conferences, Magdeburger Institut für Sicherheitsforschung, Magdeburg

http://www.bod.de/buch/stefan-schumacher/in-depth-security/9783981770001.html

This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world’s most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.

Informationstechnologie und Sicherheitspolitik: Wird der dritte Weltkrieg im Internet ausgetragen?

by: Jörg Sambleben and Stefan Schumacher

  • Citation: Jörg Sambleben and Stefan Schumacher (2012) Informationstechnologie und Sicherheitspolitik: Wird der dritte Weltkrieg im Internet ausgetragen?, BoD, Norderstedt
Informationstechnologie verändert seit mehreren Jahrzehnten nicht nur technische Handlungsfelder, sondern auch gesellschaftliche. Insbesondere in der Außen- und Sicherheitspolitik wird unter dem Stichwort _Cyberwar_ das Gefährdungspotenzial von IT und Computern diskutiert. Außerdem werden Kriegsspiele im Cyberspace durchgeführt und mögliche Angriffs- und Verteidigungsstrategien entworfen. Dieses Buch beschäftigt sich daher mit dem Verhältnis von Informationstechnologie und Sicherheitspolitik und deren wechselseitigen Einflüssen. Es stellt die zwingend notwendigen technischen Grundlagen sowie aktuelle sicherheitspolitische Diskussionen vor. Dabei wird insbesondere der Frage nachgegangen, ob es einen Cyberwar gibt und welche Konsequenzen Cyber-Aggressionen hätten.