Merge pull request #59 from M82-project/principeM82-patch-2

Update Biblio_Décembre_2023.bib
Этот коммит содержится в:
BartM82 2024-01-01 11:38:52 +01:00 коммит произвёл GitHub
родитель 0fffa009de d364870781
Коммит 2005c1d946
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -441,14 +441,6 @@
publisher= {Cambridge University Press},
keyword={Cyberdéfense, Cyberguerre, Relations internationales, Droit }}
@book{étiquette,
title = {Décider dans l'incertitude},
isbn = {978-2-7178-5335-3},
publisher = {Economica},
author = {Desportes, Vincent},
year = {2007},
keywords = {management, stratégie},
note = {le parallèle entre les opérations des forces armées permet de mieux penser une stratégie dans le monde de lindustrie.}}
@book{étiquette,
author = {Diogénes, Yuri and Ozkaya, Erdal},
@ -531,6 +523,12 @@
isbn = {9782100748280},
keyword={Cyberguerre, Cyberstratégie, Géopolitique}}
@book{étiquette,
author={Ferguson, Niels and Schneier, Bruce and Kohno, Tadayoshi},
title = {Cryptography Engineering: design principles and practical applications},
year = {2011},
publisher= {John Wiley \& Sons}}
@book{étiquette,
author = {Foster, James JF},
title = {Digital influence mercenaries, profits and power through information warfare},
@ -1289,7 +1287,7 @@
author = {Roccia, Thomas},
title = {Visual Threat Intelligence, An illustrated Guide For Threat Researchers},
year = {2023},
note = {livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel},
note = {Livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel},
keyword = {Cyber Threat Intell, CTI}}
@book{étiquette,
@ -1330,7 +1328,7 @@
@book{étiquette,
author = {Sanger, David},
title = {Confront and Conceal: Obamas secret wars},
title = {Confront and Conceal: Obamas secret wars and surprising use of American power},
year = {2012},
publisher= {Crown},
keyword = {stratégie, géopolitique,cyberguerre},
@ -1339,7 +1337,7 @@
@book{étiquette,
author = {Sanger, David},
title = {The Perfect Weapon: War, Sabotage and Fear in the Cyber Age},
year = {2019},
year = {2018},
publisher= {Crown},
isbn = {978-0451497901}}
@ -1354,12 +1352,11 @@
title = {Tallinn manual 2.0 on the international law applicable to cyber operations},
year = {2017},
publisher = {Cambridge university press},
address = {Cambridge, Royaume-Uni},
isbn = {978-1-316-63037-2}}
@book{étiquette,
author = {Schneier, Bruce},
title = {Applied Cryptography},
title = {Applied Cryptography: Protocols, Algorthms, and Source Code in C.},
year = {1996},
publisher= {John Wiley \& Sons}}
@ -1370,19 +1367,6 @@
publisher= {John Wiley \& Sons},
isbn = {0471453803}}
@book{étiquette,
author = {Schneier, Bruce},
title = {Cryptography Engineering},
year = {2010},
publisher= {John Wiley \& Sons}}
@book{étiquette,
author = {Schoch, Patrice and Akdim, Hamid and Sennouni, Amine and Jourt-Pineau, Cécilia},
title = {Pilotage stratégique 5.0 \& résilience des organisations},
year = {2021},
publisher = {L'Harmatan},
isbn = {978-2-343-23786-2}}
@book{étiquette,
author = {Schradie, Jen},
title = {L'illusion de la démocratie numérique. Internet est-il de droite ?},
@ -1402,14 +1386,14 @@
@book{étiquette,
author = {Séjean, Michel},
title = {Code de la cybersécurité},
year = {2022},
year = {2023},
publisher= {Lefevre Dalloz},
keyword={droit},
note={un incontournable pour ceux qui souhaitent maitriser le droit associé à la cybersécurité}}
@book{étiquette,
author = {Shevelyov, Nicholas},
title = {Cyber War ... and Peace:Building Digital Trust Today with History as Our Guide},
title = {Cyber War... and Peace: Building Digital Trust Today with History as Our Guide},
year = {2017},
publisher = {Lioncrest Publishing},
isbn = {978-1544517094},
@ -1418,7 +1402,7 @@
@book{étiquette,
author = {Shimomura,Tsutomu and Markoff, John},
title = {Cybertraque. La chasse au pirate informatique le plus célèbre des États-Unis},
title = {Cybertraque : la chasse au pirate informatique le plus célèbre des États-Unis},
year = {1998},
publisher = {Plon},
note = {Traduction française de "Katching Kevin", récit du hack et de la traque de Kevin Mitnick en 1995},
@ -1429,8 +1413,7 @@
title = {Cognitive Surplus: Creativity and Generosity in a Connected Age},
year = {2010},
publisher= {Penguin Press},
isbn = {9780141041605},
note = {In Cognitive Surplus, Internet guru Clay Shirky forecasts the thrilling changes we will all enjoy as new digital technology puts our untapped resources of talent and goodwill to use at last. }}
isbn = {9780141041605}}
@book{étiquette,
author = {Sikorski, Michael and Honig, Andrew},
@ -1438,16 +1421,6 @@
year = {2012},
publisher= {No Starch Press}}
@book{étiquette,
title = {The {Infinite} {Game}},
isbn = {978-0-7352-1350-0},
publisher = {Portfolio},
author = {Sinek, Simon},
year = {2019},
keywords = {personal development},
url = {https://www.amazon.fr/Infinite-Game-Simon-Sinek/dp/073521350X},
note = {ou comment penser long terme, et pourquoi il faut arrêter de réfléchir court terme une lecture intéressante lors de la définition dune stratégie.}}
@book{étiquette,
author = {Singer, P.W and Cole, August},
title = {La flotte fantôme},
@ -1469,7 +1442,7 @@
author = {Smeets, Max},
title = {No Shortcuts. Why States Struggle to Develop a Military Cyber-Force},
year = {2022},
publisher= {Hurst}}
publisher= {Oxford University Press}}
@book{étiquette,
author = {Stamboliyska, Rayna},
@ -1483,10 +1456,10 @@
year={2020},
publisher={Springer Vieweg},
keyword={Cybersécurité, Attribution},
note = {un livre qui traite en profondeur la problématique de lattribution, mais aussi lensemble des concepts clés de la CTI}}
note = {Un livre qui traite en profondeur la problématique de lattribution, mais aussi lensemble des concepts clés de la CTI}}
@book{étiquette,
author={stengel, Richard},
author={Stengel, Richard},
title={Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About It},
year={2019},
publisher={Atlantic Monthly Press},
@ -1504,7 +1477,7 @@
author = {Stoll, Clifford},
title = {The Cuckoo's Egg},
year = {1989},
publisher= {New York: Doubleday}}
publisher= {Doubleday}}
@comment{T}
@ -1529,22 +1502,13 @@
title = {The Little Black Book of Lockpicking: Lock opening and Bypass techniques for Security Professionals},
year = {2021},
isbn = {979-8544602156},
publisher= {publication indépendante}}
@book{étiquette,
author = {Triandafillidou, Olga},
title = {Cybermenaces, un état de siège},
year = {2019},
publisher = {alsyse-news.com},
isbn = {978-1706499497}}
publisher= {Publication indépendante}}
@book{étiquette,
author = {Troia, Vinny},
title = {Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques},
year = {2020},
publisher= {Sybex Inc}}
publisher= {John Wiley \& Sons}}
@comment{U}
@ -1554,7 +1518,7 @@
@book{étiquette,
author={Valeriano, Brandon and Maness, Ryan, C},
title={Cyber War vs cyber realities},
title={Cyber war versus cyber realities: Cyber conflict in the international system},
year={2015},
publisher={Oxford University Press},
keyword={cyberwar}}
@ -1563,7 +1527,7 @@
author = {Van Puyvelde, Damien and Brantly, Aaron F.},
title = {Cybersecurity. Politics, Governance and Conflict in Cyberspace},
year = {2019},
publisher= {Polity}}
publisher= {John Wiley \& Sons}}
@book{étiquette,
author = {Ventre, Daniel},
@ -1619,7 +1583,7 @@
author = {Zalewski, Michal},
title = {Menaces sur le réseau, Sécurité informatique : guide pratique des attaques passives et indirectes},
year = {2008},
publisher= {Pearson},
publisher= {CampusPresse},
isbn = {978-2-7440-2226-5},
note = {Superbe livre pout s'initier à la sécurité informatique au niveau réseau / protocolaire. Version FR du livre publié en 2005 "Silence on the Wire"}}