I. Arce and G. Mcgraw, Guest Editors' Introduction: Why Attacking Systems Is a Good Idea, IEEE Security and Privacy Magazine, vol.2, issue.4, pp.17-19, 2004.
DOI : 10.1109/MSP.2004.46

P. Kirk, M. B. Arnett, and . Schmidt, Busting the ghost in the machine, Communications of the ACM, vol.48, issue.8, pp.92-95, 2005.

G. Conti, Why computer scientists should attend hacker conferences, Communications of the ACM, vol.48, issue.3, pp.23-24, 2005.
DOI : 10.1145/1047671.1047694

G. Conti, Hacking and innovation (Guest Editors' introduction), Communications of the ACM, vol.49, issue.6, pp.33-36, 2006.

D. Farmer and W. Venema, Improving the security of your site by breaking into it. Usenet Posting to comp.security.unix, 3, 1993.

. Homepage, Hack This Site

. Homepage, International Capture The Flag

E. Jonsson and T. Olovsson, A quantitative model of the security intrusion process based on attacker behavior, Transactions on Software Engineering, pp.235-245, 1997.
DOI : 10.1109/32.588541

C. Mertens, Wie lehrt man IT-Sicherheit am Besten ? ¨ Ubersicht, Klassifikation und Basismodule. Master's thesis, RWTH Aachen, 2007.

M. Mink, Vergleich von Lehransätzen für die Ausbildung in IT-Sicherheit, 2009.

M. Mink and F. C. Freiling, Is Attack Better Than Defense? Teaching Information Security the Right Way, Proceedings of the Conference on Information Security Curriculum Development (InfoSecCD), pp.44-48, 2006.

M. Näf and D. Basin, Two approaches to an information security laboratory, Communications of the ACM, vol.51, issue.12, pp.138-142, 2008.
DOI : 10.1145/1409360.1409386

M. Schumacher, M. Moschgath, and U. Roedig, Angewandte Informationssicherheit, Informatik-Spektrum, vol.23, issue.3, 2000.
DOI : 10.1007/s002870000099

R. William, T. D. Shadish, D. T. Cook, and . Campbell, Experimental and Quasi-Experimental Designs for Generalized Causal Inference, Cengage Learning, 2001.

G. Vigna, Red team/blue team, capture the flag, and treasure hunt: Teaching network security through live exercises, World Conference on Information Security Education, pp.3-18, 2003.

G. White and G. Nordstrom, Security across the curriculum: Using computer security to teach computer science principles, Proceedings of the 19th International Information Systems Security Conference, pp.519-525, 1998.