{"id":306,"date":"2007-10-09T02:57:21","date_gmt":"2007-10-09T00:57:21","guid":{"rendered":"http:\/\/www.mitternachtshacking.de\/blog\/306-links-zu-security-konferenzen"},"modified":"2009-03-22T12:56:23","modified_gmt":"2009-03-22T11:56:23","slug":"links-zu-security-konferenzen","status":"publish","type":"post","link":"https:\/\/www.mitternachtshacking.de\/blog\/306-links-zu-security-konferenzen","title":{"rendered":"Links zu Security-Konferenzen"},"content":{"rendered":"<p>Ein paar Konferenz-Links<\/p>\n<ul>\n<li><a href=\"http:\/\/www.ccc.de\/congress\/\">Chaos Computer Conference<\/a><\/li>\n<li><a href=\"http:\/\/conference.auscert.org.au\/\">AusCERT2007<\/a><\/li>\n<li><a href=\"http:\/\/www.blackhat.com\/\">BlackHat<\/a><\/li>\n<li><a href=\"http:\/\/www.cansecwest.com\/\">CanSecWest<\/a><\/li>\n<li><a href=\"http:\/\/www.defcon.org\/\">DefCon<\/a><\/li>\n<li><a href=\"http:\/\/eusecwest.com\/\">EuSecWest<\/a><\/li>\n<li><a href=\"http:\/\/www.fosdem.org\/\">FOSDEM<\/a><\/li>\n<li><a href=\"http:\/\/www.hackcon.org\/\">HackCon<\/a><\/li>\n<li><a href=\"http:\/\/hack.lu\/\">Hack.lu<\/a><\/li>\n<li><a href=\"http:\/\/conference.hitb.org\/\">HITBSecConf<\/a><\/li>\n<li><a href=\"http:\/\/www.it-defense.de\/\">IT-Defense<\/a><\/li>\n<li><a href=\"http:\/\/www.it-secuta.de\/\">IT-Secuta<\/a><\/li>\n<li><a href=\"http:\/\/www.meitsec.ae\/\">MEITSEC<\/a><\/li>\n<li><a href=\"http:\/\/0x736563.org\/\">0sec<\/a><\/li>\n<li><a href=\"http:\/\/pacsec.jp\/\">PacSec<\/a><\/li>\n<li><a href=\"http:\/\/ph-neutral.org\/\">PH-Neutral<\/a><\/li>\n<li><a href=\"http:\/\/www.itunderground.org\/\">IT Underground<\/a><\/li>\n<li><a href=\"http:\/\/xcon.xfocus.org\/\">XFocus XCon<\/a><\/li>\n<li><a href=\"http:\/\/www.h2hc.org.br\/\">H2HC<\/a><\/li>\n<li><a href=\"http:\/\/www.layerone.info\">Layerone<\/a><\/li>\n<li><a href=\"http:\/\/www.shmoocon.org\">Shmoocon<\/a><\/li>\n<li><a href=\"http:\/\/www.toorcon.org\">Toorcon<\/a><\/li>\n<li><a href=\"http:\/\/www.ysts.org\">YSTS<\/a><\/li>\n<\/ul>\n<p>Reihenfolge wie \u00fcblich ohne Wertung<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ein paar Konferenz-Links Chaos Computer Conference AusCERT2007 BlackHat CanSecWest DefCon EuSecWest FOSDEM HackCon Hack.lu HITBSecConf IT-Defense IT-Secuta MEITSEC 0sec PacSec PH-Neutral IT Underground XFocus XCon H2HC Layerone Shmoocon Toorcon YSTS Reihenfolge wie \u00fcblich ohne Wertung<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,6],"tags":[],"_links":{"self":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts\/306"}],"collection":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":0,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts\/306\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/media?parent=306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/categories?post=306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/tags?post=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}