зеркало из
				https://github.com/M82-project/Bibliography.git
				synced 2025-10-29 21:16:11 +02:00 
			
		
		
		
	Merge pull request #59 from M82-project/principeM82-patch-2
Update Biblio_Décembre_2023.bib
Этот коммит содержится в:
		
						Коммит
						2005c1d946
					
				| @ -441,14 +441,6 @@ | ||||
|     publisher= {Cambridge University Press}, | ||||
|     keyword={Cyberdéfense, Cyberguerre, Relations internationales, Droit }} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     title = {Décider dans l'incertitude}, | ||||
|     isbn = {978-2-7178-5335-3}, | ||||
|     publisher = {Economica}, | ||||
|     author = {Desportes, Vincent}, | ||||
|     year = {2007}, | ||||
|     keywords = {management, stratégie}, | ||||
|     note = {le parallèle entre les opérations des forces armées permet de mieux penser une stratégie dans le monde de l’industrie.}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Diogénes, Yuri and Ozkaya, Erdal}, | ||||
| @ -531,6 +523,12 @@ | ||||
|     isbn = {9782100748280}, | ||||
|     keyword={Cyberguerre, Cyberstratégie, Géopolitique}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author={Ferguson, Niels and Schneier, Bruce and Kohno, Tadayoshi}, | ||||
|     title = {Cryptography Engineering: design principles and practical applications}, | ||||
|     year = {2011}, | ||||
|     publisher= {John Wiley \& Sons}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Foster, James JF}, | ||||
|     title = {Digital influence mercenaries, profits and power through information warfare}, | ||||
| @ -1289,7 +1287,7 @@ | ||||
|     author = {Roccia, Thomas}, | ||||
|     title = {Visual Threat Intelligence, An illustrated Guide For Threat Researchers}, | ||||
|     year = {2023}, | ||||
|     note = {livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel}, | ||||
|     note = {Livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel}, | ||||
|     keyword = {Cyber Threat Intell, CTI}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
| @ -1330,7 +1328,7 @@ | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Sanger, David}, | ||||
|     title = {Confront and Conceal: Obama’s secret wars}, | ||||
|     title = {Confront and Conceal: Obama’s secret wars and surprising use of American power}, | ||||
|     year = {2012}, | ||||
|     publisher= {Crown}, | ||||
|     keyword = {stratégie, géopolitique,cyberguerre}, | ||||
| @ -1339,7 +1337,7 @@ | ||||
|     @book{étiquette, | ||||
|     author = {Sanger, David}, | ||||
|     title = {The Perfect Weapon: War, Sabotage and Fear in the Cyber Age}, | ||||
|     year = {2019}, | ||||
|     year = {2018}, | ||||
|     publisher= {Crown}, | ||||
|     isbn = {978-0451497901}} | ||||
| 
 | ||||
| @ -1354,12 +1352,11 @@ | ||||
|     title = {Tallinn manual 2.0 on the international law applicable to cyber operations}, | ||||
|     year = {2017}, | ||||
|     publisher = {Cambridge university press}, | ||||
|     address = {Cambridge, Royaume-Uni}, | ||||
|     isbn = {978-1-316-63037-2}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Schneier, Bruce}, | ||||
|     title = {Applied Cryptography}, | ||||
|     title = {Applied Cryptography: Protocols, Algorthms, and Source Code in C.}, | ||||
|     year = {1996}, | ||||
|     publisher= {John Wiley \& Sons}} | ||||
| 
 | ||||
| @ -1370,19 +1367,6 @@ | ||||
|     publisher= {John Wiley \& Sons}, | ||||
|     isbn = {0471453803}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Schneier, Bruce}, | ||||
|     title = {Cryptography Engineering}, | ||||
|     year = {2010}, | ||||
|     publisher= {John Wiley \& Sons}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Schoch, Patrice and Akdim, Hamid and Sennouni, Amine and Jourt-Pineau, Cécilia}, | ||||
|     title = {Pilotage stratégique 5.0 \& résilience des organisations}, | ||||
|     year = {2021}, | ||||
|     publisher = {L'Harmatan}, | ||||
|     isbn = {978-2-343-23786-2}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Schradie, Jen}, | ||||
|     title = {L'illusion de la démocratie numérique. Internet est-il de droite ?}, | ||||
| @ -1402,14 +1386,14 @@ | ||||
|     @book{étiquette, | ||||
|     author = {Séjean, Michel}, | ||||
|     title = {Code de la cybersécurité}, | ||||
|     year = {2022}, | ||||
|     year = {2023}, | ||||
|     publisher= {Lefevre Dalloz}, | ||||
|     keyword={droit}, | ||||
|     note={un incontournable pour ceux qui souhaitent maitriser le droit associé à la cybersécurité}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Shevelyov, Nicholas}, | ||||
|     title = {Cyber War ... and Peace:Building Digital Trust Today with History as Our Guide}, | ||||
|     title = {Cyber War... and Peace: Building Digital Trust Today with History as Our Guide}, | ||||
|     year = {2017}, | ||||
|     publisher = {Lioncrest Publishing},  | ||||
|     isbn = {978-1544517094}, | ||||
| @ -1418,7 +1402,7 @@ | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Shimomura,Tsutomu and Markoff, John}, | ||||
|     title = {Cybertraque. La chasse au pirate informatique le plus célèbre des États-Unis}, | ||||
|     title = {Cybertraque : la chasse au pirate informatique le plus célèbre des États-Unis}, | ||||
|     year = {1998}, | ||||
|     publisher = {Plon}, | ||||
|     note = {Traduction française de "Katching Kevin", récit du hack et de la traque de Kevin Mitnick en 1995}, | ||||
| @ -1429,8 +1413,7 @@ | ||||
|     title = {Cognitive Surplus: Creativity and Generosity in a Connected Age}, | ||||
|     year = {2010}, | ||||
|     publisher= {Penguin Press}, | ||||
|     isbn = {9780141041605}, | ||||
|     note = {In Cognitive Surplus, Internet guru Clay Shirky forecasts the thrilling changes we will all enjoy as new digital technology puts our untapped resources of talent and goodwill to use at last. }} | ||||
|     isbn = {9780141041605}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Sikorski, Michael and Honig, Andrew}, | ||||
| @ -1438,16 +1421,6 @@ | ||||
|     year = {2012}, | ||||
|     publisher= {No Starch Press}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     title = {The {Infinite} {Game}}, | ||||
|     isbn = {978-0-7352-1350-0}, | ||||
|     publisher = {Portfolio}, | ||||
|     author = {Sinek, Simon}, | ||||
|     year = {2019}, | ||||
|     keywords = {personal development}, | ||||
|     url = {https://www.amazon.fr/Infinite-Game-Simon-Sinek/dp/073521350X}, | ||||
|     note = {ou comment penser long terme, et pourquoi il faut arrêter de réfléchir court terme une lecture intéressante lors de la définition d’une stratégie.}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Singer, P.W and Cole, August}, | ||||
|     title = {La flotte fantôme}, | ||||
| @ -1469,7 +1442,7 @@ | ||||
|     author = {Smeets, Max}, | ||||
|     title = {No Shortcuts. Why States Struggle to Develop a Military Cyber-Force}, | ||||
|     year = {2022}, | ||||
|     publisher= {Hurst}} | ||||
|     publisher= {Oxford University Press}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Stamboliyska, Rayna}, | ||||
| @ -1483,10 +1456,10 @@ | ||||
|     year={2020}, | ||||
|     publisher={Springer Vieweg}, | ||||
|     keyword={Cybersécurité, Attribution}, | ||||
|     note = {un livre qui traite en profondeur la problématique de l’attribution, mais aussi l’ensemble des concepts clés de la CTI}} | ||||
|     note = {Un livre qui traite en profondeur la problématique de l’attribution, mais aussi l’ensemble des concepts clés de la CTI}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author={stengel, Richard}, | ||||
|     author={Stengel, Richard}, | ||||
|     title={Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About It}, | ||||
|     year={2019}, | ||||
|     publisher={Atlantic Monthly Press}, | ||||
| @ -1504,7 +1477,7 @@ | ||||
|     author = {Stoll, Clifford}, | ||||
|     title = {The Cuckoo's Egg}, | ||||
|     year = {1989}, | ||||
|     publisher= {New York: Doubleday}} | ||||
|     publisher= {Doubleday}} | ||||
| 
 | ||||
| 
 | ||||
| @comment{T} | ||||
| @ -1529,22 +1502,13 @@ | ||||
|     title = {The Little Black Book of Lockpicking: Lock opening and Bypass techniques for Security Professionals}, | ||||
|     year = {2021}, | ||||
|     isbn = {979-8544602156}, | ||||
|     publisher= {publication indépendante}} | ||||
| 
 | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Triandafillidou, Olga}, | ||||
|     title = {Cybermenaces, un état de siège}, | ||||
|     year = {2019}, | ||||
|     publisher = {alsyse-news.com}, | ||||
|     isbn = {978-1706499497}} | ||||
| 
 | ||||
|     publisher= {Publication indépendante}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Troia, Vinny}, | ||||
|     title = {Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques}, | ||||
|     year = {2020}, | ||||
|     publisher= {Sybex Inc}} | ||||
|     publisher= {John Wiley \& Sons}} | ||||
| 
 | ||||
| 
 | ||||
| @comment{U} | ||||
| @ -1554,7 +1518,7 @@ | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author={Valeriano, Brandon and Maness, Ryan, C}, | ||||
|     title={Cyber War vs cyber realities}, | ||||
|     title={Cyber war versus cyber realities: Cyber conflict in the international system}, | ||||
|     year={2015}, | ||||
|     publisher={Oxford University Press}, | ||||
|     keyword={cyberwar}} | ||||
| @ -1563,7 +1527,7 @@ | ||||
|     author = {Van Puyvelde, Damien and Brantly, Aaron F.}, | ||||
|     title = {Cybersecurity. Politics, Governance and Conflict in Cyberspace}, | ||||
|     year = {2019}, | ||||
|     publisher= {Polity}} | ||||
|     publisher= {John Wiley \& Sons}} | ||||
| 
 | ||||
|     @book{étiquette, | ||||
|     author = {Ventre, Daniel}, | ||||
| @ -1619,7 +1583,7 @@ | ||||
|     author = {Zalewski, Michal}, | ||||
|     title = {Menaces sur le réseau, Sécurité informatique : guide pratique des attaques passives et indirectes}, | ||||
|     year = {2008}, | ||||
|     publisher= {Pearson}, | ||||
|     publisher= {CampusPresse}, | ||||
|     isbn = {978-2-7440-2226-5}, | ||||
|     note = {Superbe livre pout s'initier à la sécurité informatique au niveau réseau / protocolaire. Version FR du livre publié en 2005 "Silence on the Wire"}} | ||||
| 
 | ||||
|  | ||||
		Загрузка…
	
	
			
			x
			
			
		
	
		Ссылка в новой задаче
	
	Block a user
	 BartM82
						BartM82