h1

h2

h3

h4

h5
h6
000047880 001__ 47880
000047880 005__ 20220802124630.0
000047880 0247_ $$2ISSN$$a0935-3232
000047880 0247_ $$2HSB$$aalm70020602x
000047880 037__ $$aRWTH-CONV-008266
000047880 041__ $$aEnglish
000047880 088__ $$2Other$$aAIB-2005-02
000047880 1001_ $$0P:(DE-82)052763$$aDornseif, Maximillian$$b0$$eAuthor
000047880 245__ $$aAn offensive approach to teaching information security : 'Aachen summer school applied IT security$$honline, print
000047880 260__ $$aAachen$$bRWTH$$c2005
000047880 300__ $$a28 S.
000047880 3367_ $$0PUB:(DE-HGF)29$$2PUB:(DE-HGF)$$aReport$$breport$$mreport
000047880 3367_ $$2DataCite$$aOutput Types/Report
000047880 3367_ $$2BibTeX$$aTECHREPORT
000047880 3367_ $$2ORCID$$aREPORT
000047880 3367_ $$010$$2EndNote$$aReport
000047880 3367_ $$2DRIVER$$areport
000047880 4900_ $$aAachener Informatik-Berichte : AIB ; technical report$$v2005,02
000047880 591__ $$aGermany
000047880 7001_ $$0P:(DE-82)143556$$aFreiling, Felix C.$$b1$$eAuthor
000047880 7001_ $$0P:(DE-82)052765$$aHolz, Thorsten$$b2$$eAuthor
000047880 7001_ $$0P:(DE-82)052766$$aMink, Martin$$b3$$eAuthor
000047880 8564_ $$uhttp://sunsite.informatik.rwth-aachen.de/Publications/AIB/2005/2005-02.pdf$$yFulltext
000047880 909CO $$ooai:publications.rwth-aachen.de:47880$$pVDB
000047880 9201_ $$0I:(DE-82)122220_20140620$$k122220$$lLehr- und Forschungsgebiet Informatik, Verteilte Systeme$$x0
000047880 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1
000047880 961__ $$c2014-11-12$$x2005-08-02$$z2012-02-20
000047880 970__ $$aalm70020602x
000047880 980__ $$areport
000047880 980__ $$aI:(DE-82)122220_20140620
000047880 980__ $$aI:(DE-82)120000_20140620
000047880 980__ $$aVDB
000047880 980__ $$aUNRESTRICTED
000047880 980__ $$aConvertedRecord