{"id":1218,"date":"2016-06-09T07:11:07","date_gmt":"2016-06-09T06:11:07","guid":{"rendered":"http:\/\/its.informatik.htw-aalen.de\/wp\/?p=1218"},"modified":"2016-12-11T20:59:50","modified_gmt":"2016-12-11T19:59:50","slug":"analyse-von-industrie-netzwerken","status":"publish","type":"post","link":"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1218","title":{"rendered":"Aufbau und Analyse von Industrie-Netzwerken"},"content":{"rendered":"<p>Hier finden Sie Informationen zur Vorlesung Analyse von Netzwerken in der industriellen Produktion.<\/p>\n<p><!--more--><\/p>\n<p>Diese Veranstaltung ist eine Kooperation mit Prof. Dr. Axel Zimmermann.<\/p>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Allgemeine Informationen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<ul>\n<li>Vorlesungsnummer:\u00a057539<\/li>\n<li>Umfang: 2 SWS<\/li>\n<li>Aufwand: 3 CP<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Termine<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<p>Die Vorlesung findet statt am:<\/p>\n<ul>\n<li>Donnerstag, 31.3.2016, 14:00 Uhr bis 17:15 Uhr, Raum G2 1.44<\/li>\n<li>Donnerstag, 14.4.2016, 14:00 Uhr bis 17:15 Uhr, Raum G2 1.44<\/li>\n<li>Donnerstag, 28.4.2016, 14:00 Uhr bis 17:15 Uhr, Raum G2 1.44<\/li>\n<li>Donnerstag, 2.6.2016, 14:00 Uhr bis 17:15 Uhr, Raum G2 1.44<\/li>\n<li>Donnerstag, 9.6.2016, 14:00 Uhr bis 17:15 Uhr, Raum G2 1.44<\/li>\n<li>Donnerstag, 16.6.2016, 14:00 Uhr bis 17:15 Uhr, Raum G2 1.44<\/li>\n<li>Donnerstag, 23.6.2016, 14:00 Uhr bis 17:15 Uhr, Raum G2 1.44<\/li>\n<li>Donnerstag, 30.6.2016, 14:00 Uhr bis 17:15 Uhr, Raum G2 1.44<\/li>\n<\/ul>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Unterlagen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:16px;--awb-icon-alignment:left;--awb-hover-color:#f9f9f9;--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#333333;--awb-toggle-hover-accent-color:#67b7e1;--awb-title-font-family:&quot;PT Sans Caption&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:14px;--awb-title-letter-spacing:0px;--awb-title-line-height:1.54;--awb-content-font-family:&quot;PT Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-1218-1\">\n<div class=\"fusion-panel panel-default panel-7518f313064846433 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_7518f313064846433\"><a aria-expanded=\"false\" aria-controls=\"7518f313064846433\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1218-1\" data-target=\"#7518f313064846433\" href=\"#7518f313064846433\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beschreibung der Lehrveranstaltung<\/span><\/a><\/h4><\/div><div id=\"7518f313064846433\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7518f313064846433\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/MH\/lv-57539-aufbau-und-analyse-industrie-netzwerke.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<p>Stand: 30.3.2016<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-16127265255df5e12 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_16127265255df5e12\"><a aria-expanded=\"false\" aria-controls=\"16127265255df5e12\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1218-1\" data-target=\"#16127265255df5e12\" href=\"#16127265255df5e12\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">\u00dcbersicht<\/span><\/a><\/h4><\/div><div id=\"16127265255df5e12\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_16127265255df5e12\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/le00-uebersicht.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-3 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/le00-uebersicht-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<p>Stand: 30.3.2016<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-d4ea82f74faaffb15 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_d4ea82f74faaffb15\"><a aria-expanded=\"false\" aria-controls=\"d4ea82f74faaffb15\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1218-1\" data-target=\"#d4ea82f74faaffb15\" href=\"#d4ea82f74faaffb15\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Embedded Programming und Netzwerkanalyse (Prof. Dr. Axel Zimmermann)<\/span><\/a><\/h4><\/div><div id=\"d4ea82f74faaffb15\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_d4ea82f74faaffb15\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-6bcaf70381a8ce4c9 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_6bcaf70381a8ce4c9\"><a aria-expanded=\"false\" aria-controls=\"6bcaf70381a8ce4c9\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1218-1\" data-target=\"#6bcaf70381a8ce4c9\" href=\"#6bcaf70381a8ce4c9\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Arbeiten mit Wireshark<\/span><\/a><\/h4><\/div><div id=\"6bcaf70381a8ce4c9\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_6bcaf70381a8ce4c9\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-4 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/le01-wireshark.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-5 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/le01-wireshark-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-6 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/code.zip\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Code<\/span><\/a><\/div>\n<p>Stand: 13.4.2016<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-a50e2899d9ae1a6e1 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a50e2899d9ae1a6e1\"><a aria-expanded=\"false\" aria-controls=\"a50e2899d9ae1a6e1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1218-1\" data-target=\"#a50e2899d9ae1a6e1\" href=\"#a50e2899d9ae1a6e1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Aufbau und Analyse von Rechnernetzen in der industriellen Produktion (Prof. Dr. Axel Zimmermann)<\/span><\/a><\/h4><\/div><div id=\"a50e2899d9ae1a6e1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a50e2899d9ae1a6e1\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-5e822c8b7290801e1 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_5e822c8b7290801e1\"><a aria-expanded=\"false\" aria-controls=\"5e822c8b7290801e1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1218-1\" data-target=\"#5e822c8b7290801e1\" href=\"#5e822c8b7290801e1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Arbeiten mit Scapy<\/span><\/a><\/h4><\/div><div id=\"5e822c8b7290801e1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_5e822c8b7290801e1\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-7 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/le02-scapy.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-8 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/le02-scapy-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-9 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/scapy-code.zip\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Code<\/span><\/a><\/div>\n<p>Stand: 1.6.2016<\/div><\/div><\/div>\n<\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Praktikum<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:16px;--awb-icon-alignment:left;--awb-hover-color:#f9f9f9;--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#333333;--awb-toggle-hover-accent-color:#67b7e1;--awb-title-font-family:&quot;PT Sans Caption&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:14px;--awb-title-letter-spacing:0px;--awb-title-line-height:1.54;--awb-content-font-family:&quot;PT Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-1218-2\">\n<div class=\"fusion-panel panel-default panel-a9f305a36c2b89dd4 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a9f305a36c2b89dd4\"><a aria-expanded=\"false\" aria-controls=\"a9f305a36c2b89dd4\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1218-2\" data-target=\"#a9f305a36c2b89dd4\" href=\"#a9f305a36c2b89dd4\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Themenliste<\/span><\/a><\/h4><\/div><div id=\"a9f305a36c2b89dd4\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a9f305a36c2b89dd4\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-10 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AAIN\/2016ss-themenliste.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<p>&nbsp;<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Vorlesungen im aktuellen Semester<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-4\"><section class=\"fusion-columns columns fusion-columns-4 columns-4\"><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\" aria-label=\"Kryptographische Protokolle\" class=\"hover-type-none\"><img decoding=\"async\" width=\"660\" height=\"405\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg 660w, https:&#x2f;&#x2f;&#x69;&#x74;&#x73;&#x2e;&#x69;&#x6e;&#x66;&#x6f;&#x72;&#x6d;&#x61;&#x74;&#x69;&#x6b;&#x2e;&#x68;&#x74;&#x77;&#x2d;&#x61;&#97;&#108;&#101;&#110;&#46;&#100;&#101;&#47;&#119;&#112;&#47;&#119;&#112;&#45;&#99;ontent\/uploa&#x64;&#x73;&#x2f;&#x32;&#x30;&#x31;&#x33;&#x2f;&#x30;&#x33;&#x2f;&#x6b;&#x72;&#x79;&#x70;&#x74;&#x6f;&#x67;&#x72;&#x61;&#x66;&#x69;&#x65;&#45;&#54;&#54;&#48;&#120;&#52;&#48;&#53;&#64;&#50;&#120;&#46;&#106;&#112;&#103; 1320w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\">Kryptographische Protokolle<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><span>12. May  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Kryptographische Protokolle<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\" aria-label=\"Sicherheit von Webanwendungen\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg 700w, https:\/\/&#105;&#116;&#115;&#x2e;&#x69;&#x6e;&#x66;or&#109;&#97;&#116;&#x69;&#x6b;&#x2e;&#x68;tw&#45;&#97;&#97;&#x6c;&#x65;&#x6e;&#x2e;de&#47;&#119;&#112;&#x2f;&#x77;&#x70;&#x2d;co&#110;&#116;&#101;&#x6e;&#x74;&#x2f;&#x75;pl&#111;&#97;&#100;&#x73;&#x2f;&#x32;&#x30;18&#47;&#49;&#48;&#x2f;&#x73;&#x69;&#x63;he&#114;&#101;&#45;&#x77;&#x65;&#x62;&#x61;nw&#101;&#110;&#100;&#x75;&#x6e;&#x67;&#x65;n-3&#50;&#48;&#x78;&#x32;&#x30;&#x32;&#64;2x&#46;&#106;&#x70;&#x67; 640w, https:\/&#47;&#x69;&#x74;s&#46;&#x69;&#x6e;f&#111;&#x72;&#x6d;a&#116;&#x69;&#x6b;&#46;&#104;&#x74;&#x77;-&#97;&#97;&#x6c;&#x65;n&#46;&#x64;&#x65;\/&#119;&#x70;&#x2f;w&#112;&#x2d;&#x63;o&#110;&#x74;&#x65;n&#116;&#x2f;&#x75;p&#108;&#111;&#x61;&#x64;s&#47;&#x32;&#x30;1&#56;&#x2f;&#x31;0&#47;&#x73;&#x69;c&#104;&#x65;&#x72;e&#45;&#x77;&#x65;b&#97;&#110;&#x77;&#x65;n&#100;&#x75;&#x6e;g&#101;&#x6e;&#x2d;7&#48;&#x30;&#x78;4&#52;&#x31;&#x40;2&#120;&#x2e;&#x6a;p&#103; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\">Sicherheit von Webanwendungen<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><span>30. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sicherheit von Webanwendungen<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\" aria-label=\"Wahrscheinlichkeitstheorie und Statistik\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg 700w, https:&#47;&#x2f;&#x69;t&#115;&#x2e;i&#110;&#x66;&#x6f;r&#109;&#x61;t&#105;&#x6b;&#x2e;h&#116;&#x77;-&#97;&#x61;&#x6c;&#101;&#110;&#x2e;d&#101;&#x2f;&#x77;&#112;&#x2f;&#x77;p&#45;&#x63;o&#110;&#x74;&#x65;n&#116;&#x2f;u&#112;&#x6c;&#x6f;a&#100;&#x73;\/&#50;&#x30;&#x31;6&#47;&#x30;4&#47;&#x77;&#x61;&#104;&#x72;&#x73;c&#104;&#x65;i&#110;&#x6c;&#x69;c&#104;&#x6b;e&#105;&#x74;&#x2d;3&#50;&#x30;x&#50;&#x30;&#x32;&#64;&#50;&#x78;&#46;&#106;&#x70;&#x67; 640w, https:&#x2f;&#47;i&#x74;&#115;&#46;&#x69;&#x6e;&#102;o&#x72;&#109;a&#x74;&#x69;&#107;&#46;&#x68;&#116;w&#x2d;&#x61;&#97;l&#x65;&#110;&#46;&#x64;&#x65;&#47;w&#x70;&#47;w&#x70;&#x2d;&#99;&#x6f;&#x6e;&#116;e&#x6e;&#116;\/&#x75;&#x70;&#108;o&#x61;&#100;s&#x2f;&#x32;&#48;1&#x36;&#47;0&#x34;&#x2f;&#119;a&#x68;&#114;s&#x63;&#x68;&#101;&#x69;&#x6e;&#108;i&#x63;&#104;&#107;&#x65;&#x69;&#116;-&#x37;&#48;0&#x78;&#x34;&#52;1&#x40;&#50;x&#x2e;&#x6a;&#112;g 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\">Wahrscheinlichkeitstheorie und Statistik<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><span>22. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Wahrscheinlichkeitstheorie und Statistik<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\" aria-label=\"Sichere Programmierung\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg 700w, https:\/\/it&#115;&#46;&#105;&#110;&#102;&#111;&#114;&#x6d;&#x61;&#x74;&#x69;&#x6b;&#x2e;&#x68;&#x74;&#x77;-aal&#101;&#110;&#46;&#100;&#101;&#47;&#119;&#x70;&#x2f;&#x77;&#x70;&#x2d;&#x63;&#x6f;&#x6e;&#x74;ent\/&#117;&#112;&#108;&#111;&#97;&#100;&#115;&#x2f;&#x32;&#x30;&#x31;&#x36;&#x2f;&#x31;&#x30;&#x2f;sich&#101;&#114;&#101;&#45;&#112;&#114;&#111;&#x67;&#x72;&#x61;&#x6d;&#x6d;&#x69;&#x65;&#x72;&#x75;ng-3&#50;&#48;&#120;&#50;&#48;&#50;&#64;&#x32;&#x78;&#x2e;&#x6a;&#x70;&#x67; 640w, https:&#47;&#x2f;i&#116;&#x73;&#46;&#x69;n&#102;&#x6f;r&#x6d;&#x61;&#116;&#x69;k&#46;&#x68;t&#x77;&#x2d;&#97;&#x61;l&#101;&#x6e;&#46;&#x64;e&#47;&#x77;p&#47;&#x77;&#112;&#x2d;c&#111;&#x6e;t&#x65;&#x6e;&#116;&#x2f;u&#112;&#x6c;o&#x61;&#x64;&#115;&#x2f;2&#48;&#x31;&#54;&#x2f;1&#48;&#x2f;s&#x69;&#x63;&#104;&#x65;r&#101;&#x2d;p&#x72;&#x6f;&#103;&#x72;a&#109;&#x6d;&#105;&#x65;r&#117;&#x6e;g&#45;&#x37;&#48;&#x30;x&#52;&#x34;1&#x40;&#x32;&#120;&#x2e;j&#112;&#x67; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\">Sichere Programmierung<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><span>20. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sichere Programmierung<\/span><\/span><\/span><\/p><\/div><\/article><\/section><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hier finden Sie Informationen zur Vorlesung Analyse von Netzwerken in der industriellen Produktion.<\/p>\n","protected":false},"author":2,"featured_media":1224,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,4],"tags":[9,15],"class_list":["post-1218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vorlesung_archiv","category-vorlesung","tag-it-sicherheit","tag-vorlesung"],"_links":{"self":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1218"}],"version-history":[{"count":19,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1218\/revisions"}],"predecessor-version":[{"id":1411,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/1218\/revisions\/1411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/media\/1224"}],"wp:attachment":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}