{"id":665,"date":"2014-01-23T18:13:27","date_gmt":"2014-01-23T17:13:27","guid":{"rendered":"http:\/\/its.informatik.htw-aalen.de\/wp\/?p=665"},"modified":"2016-12-11T20:59:50","modified_gmt":"2016-12-11T19:59:50","slug":"computer-forensik","status":"publish","type":"post","link":"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=665","title":{"rendered":"Computer Forensik"},"content":{"rendered":"<p>Hier finden Sie Informationen zur Vorlesung Computer Forensik.<\/p>\n<p><!--more--><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Allgemeine Informationen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<ul>\n<li>Vorlesungsnummer:\u00a057591<\/li>\n<li>Umfang: 2 SWS<\/li>\n<li>Aufwand: 3 CP<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Termine<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<p>Die Vorlesung findet statt am:<\/p>\n<ul>\n<li>Freitag, 25.10.2013, 9:45 Uhr bis 11:15 Uhr, Raum G2 1.31<\/li>\n<li>Freitag, 8.11.2013, 9:45 Uhr bis 13:00 Uhr, Raum G2 1.31<\/li>\n<li>Freitag, 15.11.2013, 9:45 Uhr bis 13:00 Uhr, Raum G2 1.31<\/li>\n<li>Freitag, 13.12.2013, 9:45 Uhr bis 15:45 Uhr, Raum G2 1.31<\/li>\n<li>Freitag, 20.12.2013, 9:45 Uhr bis 13:00 Uhr, Raum G2 1.31<\/li>\n<li>Freitag, 24.1.2014, 9:45 Uhr bis 15:45 Uhr, Raum G2 1.31<\/li>\n<li>Freitag, 31.1.2014, 9:45 Uhr bis 13:00 Uhr, Raum G2 1.31<\/li>\n<\/ul>\n<p><img decoding=\"async\" title=\"Weiterlesen \u2026\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-includes\/js\/tinymce\/plugins\/wordpress\/img\/trans.gif\" alt=\"\" \/>Die Termine zur <strong>Abgabe der Ausarbeitungen<\/strong> sind:<\/p>\n<ul>\n<li>Fall 1 (Analyse eines Netzwerkmitschnitts): 29.11.2013<\/li>\n<\/ul>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Unterlagen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:16px;--awb-icon-alignment:left;--awb-hover-color:#f9f9f9;--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#333333;--awb-toggle-hover-accent-color:#67b7e1;--awb-title-font-family:&quot;PT Sans Caption&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:14px;--awb-title-letter-spacing:0px;--awb-title-line-height:1.54;--awb-content-font-family:&quot;PT Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-665-1\">\n<div class=\"fusion-panel panel-default panel-84bb1a087bad45b75 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_84bb1a087bad45b75\"><a aria-expanded=\"false\" aria-controls=\"84bb1a087bad45b75\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-665-1\" data-target=\"#84bb1a087bad45b75\" href=\"#84bb1a087bad45b75\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beschreibung der Lehrveranstaltung<\/span><\/a><\/h4><\/div><div id=\"84bb1a087bad45b75\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_84bb1a087bad45b75\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/MH\/lv-57591-computer-forensik.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<p>Stand: 3.10.2013<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-0808ef33b588ae145 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_0808ef33b588ae145\"><a aria-expanded=\"false\" aria-controls=\"0808ef33b588ae145\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-665-1\" data-target=\"#0808ef33b588ae145\" href=\"#0808ef33b588ae145\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">\u00dcbersicht<\/span><\/a><\/h4><\/div><div id=\"0808ef33b588ae145\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_0808ef33b588ae145\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le00-uebersicht.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-3 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le00-uebersicht-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<p>Stand: 24.10.2013<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-3930ea1df033686b2 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_3930ea1df033686b2\"><a aria-expanded=\"false\" aria-controls=\"3930ea1df033686b2\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-665-1\" data-target=\"#3930ea1df033686b2\" href=\"#3930ea1df033686b2\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Einf\u00fchrung<\/span><\/a><\/h4><\/div><div id=\"3930ea1df033686b2\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_3930ea1df033686b2\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-4 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le01-einfuehrung.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-5 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le01-einfuehrung-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<p>Stand: 24.10.2013<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-b9bbf9c12a24023b8 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b9bbf9c12a24023b8\"><a aria-expanded=\"false\" aria-controls=\"b9bbf9c12a24023b8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-665-1\" data-target=\"#b9bbf9c12a24023b8\" href=\"#b9bbf9c12a24023b8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Fall 1: Analyse des Mitschnitts einer Netzwerkkommunikation<\/span><\/a><\/h4><\/div><div id=\"b9bbf9c12a24023b8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b9bbf9c12a24023b8\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-6 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le02-fall-1-pcap-analyse.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-7 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le02-fall-1-pcap-analyse-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<p>Stand: 7.11.2013<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-fb2d7b0d45efcd9e4 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_fb2d7b0d45efcd9e4\"><a aria-expanded=\"false\" aria-controls=\"fb2d7b0d45efcd9e4\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-665-1\" data-target=\"#fb2d7b0d45efcd9e4\" href=\"#fb2d7b0d45efcd9e4\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Fall 2: Ein kompromittierter Server<\/span><\/a><\/h4><\/div><div id=\"fb2d7b0d45efcd9e4\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_fb2d7b0d45efcd9e4\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-8 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le03-fall-2-kompromittierter-server.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-9 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le03-fall-2-kompromittierter-server-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<p>Stand: 10.12.2013<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-23d4ba38e2206eae3 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_23d4ba38e2206eae3\"><a aria-expanded=\"false\" aria-controls=\"23d4ba38e2206eae3\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-665-1\" data-target=\"#23d4ba38e2206eae3\" href=\"#23d4ba38e2206eae3\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Fall 3: Android Malware<\/span><\/a><\/h4><\/div><div id=\"23d4ba38e2206eae3\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_23d4ba38e2206eae3\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-10 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le04-fall-3-android-malware.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Folien<\/span><\/a><\/div>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-11 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/CF\/le04-fall-3-android-malware-handouts.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Handouts<\/span><\/a><\/div>\n<p>Stand: 22.1.2014<\/div><\/div><\/div>\n<\/div><\/div>\n<p>&nbsp;<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Vorlesungen im aktuellen Semester<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-4\"><section class=\"fusion-columns columns fusion-columns-4 columns-4\"><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\" aria-label=\"Kryptographische Protokolle\" class=\"hover-type-none\"><img decoding=\"async\" width=\"660\" height=\"405\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg 660w, https:&#x2f;\/&#x69;&#116;&#x73;&#x2e;i&#x6e;&#102;&#x6f;&#x72;m&#x61;&#116;&#x69;&#x6b;&#46;&#x68;&#116;&#x77;&#x2d;a&#x61;&#108;&#x65;&#x6e;&#46;&#x64;&#101;&#x2f;&#x77;p&#x2f;&#119;&#x70;&#x2d;c&#x6f;&#110;&#x74;&#x65;n&#x74;&#47;&#x75;&#x70;l&#x6f;&#97;&#x64;&#x73;\/&#x32;&#48;&#x31;&#x33;\/&#x30;&#51;&#x2f;&#x6b;r&#x79;&#112;&#x74;&#x6f;g&#x72;&#97;&#x66;&#x69;e&#x2d;&#54;&#x36;&#x30;x&#x34;&#48;&#x35;&#x40;2&#x78;&#46;&#x6a;&#x70;g 1320w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\">Kryptographische Protokolle<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><span>12. May  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Kryptographische Protokolle<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\" aria-label=\"Sicherheit von Webanwendungen\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg 700w, https:\/\/&#105;&#116;&#115;&#x2e;&#x69;&#x6e;&#x66;&#x6f;rm&#97;&#116;&#105;&#x6b;&#x2e;&#x68;&#x74;&#x77;-a&#97;&#108;&#101;&#x6e;&#x2e;&#x64;&#x65;&#x2f;wp&#47;&#119;&#112;&#x2d;&#x63;&#x6f;&#x6e;&#x74;en&#116;&#47;&#117;&#x70;&#x6c;&#x6f;&#x61;&#x64;s\/&#50;&#48;&#49;&#x38;&#x2f;&#x31;&#x30;&#x2f;si&#99;&#104;&#101;&#x72;&#x65;&#x2d;&#x77;&#x65;ba&#110;&#119;&#101;&#x6e;&#x64;&#x75;&#x6e;&#x67;en&#45;&#51;&#50;&#x30;&#x78;&#x32;&#x30;&#x32;&#64;2&#120;&#46;&#106;&#x70;&#x67; 640w, https:&#47;&#x2f;&#x69;&#116;&#x73;&#x2e;i&#x6e;&#x66;o&#114;&#x6d;a&#116;&#x69;k&#46;&#x68;t&#119;&#x2d;a&#97;&#x6c;&#x65;&#110;&#x2e;&#x64;&#101;&#x2f;&#x77;p&#x2f;&#x77;p&#45;&#x63;o&#110;&#x74;e&#110;&#x74;\/&#117;&#x70;l&#111;&#x61;&#x64;&#115;&#x2f;&#x32;&#48;&#x31;&#x38;\/&#x31;&#x30;\/&#115;&#x69;c&#104;&#x65;r&#101;&#x2d;w&#101;&#x62;a&#110;&#x77;&#x65;&#110;&#x64;&#x75;&#110;&#x67;&#x65;n&#x2d;&#x37;0&#48;&#x78;4&#52;&#x31;&#64;&#50;&#x78;&#46;&#106;&#x70;g 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\">Sicherheit von Webanwendungen<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><span>30. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sicherheit von Webanwendungen<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\" aria-label=\"Wahrscheinlichkeitstheorie und Statistik\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg 700w, https:\/\/its&#46;&#105;&#110;&#102;&#111;&#114;&#109;&#97;&#x74;&#x69;&#x6b;&#x2e;&#x68;&#x74;&#x77;&#x2d;&#x61;&#x61;&#x6c;&#x65;n&#46;de\/w&#112;&#47;&#119;&#112;&#45;&#99;&#111;&#x6e;&#x74;&#x65;&#x6e;&#x74;&#x2f;&#x75;&#x70;&#x6c;&#x6f;&#x61;&#x64;s\/2016&#47;&#48;&#52;&#47;&#119;&#97;&#104;&#x72;&#x73;&#x63;&#x68;&#x65;&#x69;&#x6e;&#x6c;&#x69;&#x63;&#x68;&#x6b;eit-32&#48;&#120;&#50;&#48;&#50;&#64;&#50;&#x78;&#x2e;&#x6a;&#x70;&#x67; 640w, https:&#x2f;&#x2f;&#x69;&#x74;&#x73;&#x2e;&#x69;&#x6e;&#x66;&#x6f;&#x72;&#x6d;&#x61;&#x74;&#x69;&#x6b;&#x2e;&#x68;&#x74;&#x77;&#x2d;&#x61;&#x61;&#x6c;&#x65;&#x6e;&#x2e;&#x64;&#x65;&#x2f;&#x77;&#x70;&#x2f;&#x77;&#x70;&#x2d;&#x63;&#x6f;&#x6e;&#x74;&#x65;&#x6e;&#x74;&#x2f;&#117;&#112;&#108;&#111;&#97;&#100;&#115;&#47;&#50;&#48;&#49;&#54;&#47;&#48;&#52;&#47;&#119;&#97;&#104;&#114;&#115;&#99;&#104;&#101;&#105;&#110;&#108;&#105;&#99;&#104;&#107;eit-700x441&#64;2x&#46;jpg 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\">Wahrscheinlichkeitstheorie und Statistik<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><span>22. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Wahrscheinlichkeitstheorie und Statistik<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\" aria-label=\"Sichere Programmierung\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg 700w, https:\/\/&#105;&#116;&#115;&#x2e;&#x69;&#x6e;&#x66;&#x6f;rm&#97;&#116;&#105;&#x6b;&#x2e;&#x68;&#x74;&#x77;-a&#97;&#108;&#101;&#x6e;&#x2e;&#x64;&#x65;&#x2f;wp&#47;&#119;&#112;&#x2d;&#x63;&#x6f;&#x6e;&#x74;en&#116;&#47;&#117;&#x70;&#x6c;&#x6f;&#x61;&#x64;s\/&#50;&#48;&#49;&#x36;&#x2f;&#x31;&#x30;&#x2f;si&#99;&#104;&#101;&#x72;&#x65;&#x2d;&#x70;&#x72;og&#114;&#97;&#109;&#x6d;&#x69;&#x65;&#x72;&#x75;ng&#45;&#51;&#50;&#x30;&#x78;&#x32;&#x30;&#x32;&#64;2&#120;&#46;&#106;&#x70;&#x67; 640w, https:&#x2f;\/&#x69;&#116;&#x73;&#x2e;i&#x6e;&#102;&#x6f;&#x72;m&#x61;&#116;&#x69;&#x6b;&#46;&#x68;&#116;&#x77;&#x2d;a&#x61;&#108;&#x65;&#x6e;&#46;&#x64;&#101;&#x2f;&#x77;p&#x2f;&#119;&#x70;&#x2d;c&#x6f;&#110;&#x74;&#x65;n&#x74;&#47;&#x75;&#x70;l&#x6f;&#97;&#x64;&#x73;\/&#x32;&#48;&#x31;&#x36;\/&#x31;&#48;&#x2f;&#x73;i&#x63;&#104;&#x65;&#x72;e&#x2d;&#112;&#x72;&#x6f;g&#x72;&#97;&#x6d;&#x6d;i&#x65;&#114;&#x75;&#x6e;g&#x2d;&#55;&#x30;&#x30;x&#x34;&#52;&#x31;&#x40;2&#x78;&#46;&#x6a;&#x70;g 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\">Sichere Programmierung<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><span>20. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sichere Programmierung<\/span><\/span><\/span><\/p><\/div><\/article><\/section><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hier finden Sie Informationen zur Vorlesung Computer Forensik.<\/p>\n","protected":false},"author":2,"featured_media":675,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,4],"tags":[],"class_list":["post-665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vorlesung_archiv","category-vorlesung"],"_links":{"self":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=665"}],"version-history":[{"count":16,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/665\/revisions"}],"predecessor-version":[{"id":1415,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/665\/revisions\/1415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/media\/675"}],"wp:attachment":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}