зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 21:16:11 +02:00
Update fevrier_2023.bib
add isbn and bibtex validation
Этот коммит содержится в:
родитель
a165b22366
Коммит
2364a37abb
@ -1,7 +1,5 @@
|
||||
|
||||
|
||||
-----------------------------------------------------------------------------------------------
|
||||
|
||||
|
||||
A
|
||||
|
||||
@ -132,7 +130,8 @@
|
||||
title = {The Deception Game},
|
||||
year = {1981},
|
||||
publisher= {Ballantine Books},
|
||||
Keyword={Renseignement, Russie}}
|
||||
Keyword={Renseignement, Russie},
|
||||
isbn = {9780815680789}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Bittman, Ladistlav},
|
||||
@ -244,7 +243,9 @@
|
||||
title = {International Conflict and Cyberspace superiority},
|
||||
year = {2016},
|
||||
publisher= {Routledge},
|
||||
keyword={Géopolitique, Cyberguerre}}
|
||||
keyword={Géopolitique, Cyberguerre},
|
||||
isbn = {9781138918917}}
|
||||
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -325,7 +326,9 @@
|
||||
title = {Cybermenace},
|
||||
year = {2013},
|
||||
publisher= {Albin Michel},
|
||||
keyword={Cyberguerre, Roman}}
|
||||
keyword={Cyberguerre, Roman},
|
||||
isbn={9782226252029}}
|
||||
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -380,7 +383,8 @@
|
||||
title={The Internet in everything},
|
||||
author={DeNardis, Laura},
|
||||
year={2020},
|
||||
publisher={Yale University Press}}
|
||||
publisher={Yale University Press},
|
||||
isbn={9798811915644}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -450,7 +454,8 @@
|
||||
title = {Cybersecurity myths and Misconceptions},
|
||||
year = {2023},
|
||||
publisher= {Pearson Education},
|
||||
keyword={Cybersécurité}}
|
||||
keyword={Cybersécurité},
|
||||
isbn={0137929234}}
|
||||
|
||||
|
||||
E
|
||||
@ -641,7 +646,8 @@
|
||||
author={Hubbard, Douglas W and Seiersen, Richard},
|
||||
year={2023},
|
||||
publisher={John Wiley \& Sons},
|
||||
keyword={Cybersécurité}}
|
||||
keyword={Cybersécurité},
|
||||
isbn={1119162319}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -679,14 +685,16 @@
|
||||
author = {Janczewsky, Lech and Andrew, Colarik},
|
||||
title = {Cyber warfare and Cyberterrorism},
|
||||
year = {2007},
|
||||
publisher= {Information Science Reference}}
|
||||
publisher= {Information Science Reference},
|
||||
isbn = {9781423506331}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author= {Jankowicz, Nina},
|
||||
title = {How to lose the Information War},
|
||||
year = {2020},
|
||||
publisher= {Bloomsbury}}
|
||||
publisher= {Bloomsbury},
|
||||
isbn = {9781838607685}}
|
||||
|
||||
|
||||
K
|
||||
@ -696,7 +704,8 @@
|
||||
author = {Kaplan, Fred},
|
||||
title = {Dark Territory: The Secret History of Cyber War},
|
||||
year = {2016},
|
||||
publisher= {Simon and Schuster}}
|
||||
publisher= {Simon and Schuster},
|
||||
isbn = {1476763275}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -769,7 +778,7 @@
|
||||
title = {Agora toxica},
|
||||
year = {2022}
|
||||
publisher = {éditions du détour},
|
||||
isbn = {979-10-97079-87-1}
|
||||
isbn = {979-10-97079-87-1}}
|
||||
|
||||
@book{laurent2021conflits,
|
||||
title={Conflits, crimes et r{\'e}gulations dans le cyberespace},
|
||||
@ -835,14 +844,16 @@
|
||||
author = {Libicki, Martin},
|
||||
title = {Cyberdeterrence and Cyberwar},
|
||||
year = {2009},
|
||||
publisher= {RAND Project Air force}}
|
||||
publisher= {RAND Project Air force},
|
||||
isbn = {0833047345}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Libicki, Martin},
|
||||
title = {Conquest in cyberspace: national security and information},
|
||||
year = {2007},
|
||||
publisher= {Cambridge University Press}}
|
||||
publisher= {Cambridge University Press},
|
||||
isbn={0521692148}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -865,7 +876,9 @@
|
||||
author = {Lonsdale, David},
|
||||
title = {The Nature of War in the Information Age},
|
||||
year = {2004},
|
||||
publisher= {Frank Cass}}
|
||||
publisher= {Frank Cass},
|
||||
isbn = {1135757186}}
|
||||
|
||||
|
||||
|
||||
|
||||
@ -924,8 +937,9 @@
|
||||
author = {Monte, Matthew},
|
||||
title = {Network Attacks and Exploitation},
|
||||
year = {2015},
|
||||
publisher= {Wiley}}
|
||||
|
||||
publisher= {Wiley},
|
||||
isbn = {9781119183440}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Moore, Daniel},
|
||||
@ -950,7 +964,8 @@
|
||||
author = {Motte, Martin},
|
||||
title = {La mesure de la force},
|
||||
year = {2018},
|
||||
publisher= {Taillandier}}
|
||||
publisher= {Taillandier},
|
||||
isbn = {9782764437766}}
|
||||
|
||||
|
||||
|
||||
@ -961,7 +976,8 @@
|
||||
author = {Nye, Joseph},
|
||||
title = {Cyberpower},
|
||||
year = {2010},
|
||||
publisher= {Harvard University}}
|
||||
publisher= {Harvard University},
|
||||
isbn = {0203448634}}
|
||||
|
||||
|
||||
P
|
||||
@ -1075,7 +1091,8 @@
|
||||
author = {Rattray, Gregory},
|
||||
title = {Strategic warfare in cyberspace},
|
||||
year = {2001},
|
||||
publisher= {Mass MIT Press}}
|
||||
publisher= {Mass MIT Press},
|
||||
isbn ={9780262182096}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -1091,7 +1108,8 @@
|
||||
author = {Rid, Thomas},
|
||||
title = {Cyber War will not take place},
|
||||
year = {2013},
|
||||
publisher= {Oxford University Press}}
|
||||
publisher= {Oxford University Press},
|
||||
isbn={1849042802}}
|
||||
|
||||
|
||||
|
||||
@ -1150,7 +1168,8 @@
|
||||
author = {Schneier, Bruce},
|
||||
title = {Applied Cryptography},
|
||||
year = {1996},
|
||||
publisher= {John Wiley \& Sons}}
|
||||
publisher= {John Wiley \& Sons},
|
||||
isbn = {0471597562}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -1165,7 +1184,8 @@
|
||||
author = {Schneier, Bruce},
|
||||
title = {Cryptography Engineering},
|
||||
year = {2010},
|
||||
publisher= {John Wiley \& Sons}}
|
||||
publisher= {John Wiley \& Sons},
|
||||
isbn = {9781118082102}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Schradie, Jen},
|
||||
@ -1236,14 +1256,16 @@
|
||||
author={Stevens, Tim},
|
||||
year={2016},
|
||||
publisher={Cambridge University Press},
|
||||
keyword={Cybersécurité}}
|
||||
keyword={Cybersécurité},
|
||||
ibsn={9781107521599}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Stoll, Clifford},
|
||||
title = {The Cuckoo's Egg},
|
||||
year = {1989},
|
||||
publisher= {New York: Doubleday}}
|
||||
publisher= {New York: Doubleday},
|
||||
isbn = {3596139848}}
|
||||
|
||||
|
||||
T
|
||||
@ -1326,8 +1348,8 @@
|
||||
year={2004},
|
||||
publisher={l'Age d'homme},
|
||||
keyword = {Désinformation},
|
||||
note = {}
|
||||
|
||||
note = {},
|
||||
isbn = {9782260004417}
|
||||
}
|
||||
|
||||
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user