Update Biblio_Décembre_2023.bib

Этот коммит содержится в:
Principe Debase 2023-12-30 17:25:55 +01:00 коммит произвёл GitHub
родитель a9a4842997
Коммит 2da93c0c7a
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -14,12 +14,12 @@
keyword={Réseaux sociaux}} keyword={Réseaux sociaux}}
@book{étiquette, @book{étiquette,
author = {Adair, Seven and Hale, Michael and Hartsein, Blake and Matthew, Richard}, title={Malware analyst's cookbook and DVD: tools and techniques for fighting malicious code},
title = {Malware analyst's Cookbook}, author={Ligh, Michael and Adair, Steven and Hartstein, Blake and Richard, Matthew},
year = {2011}, year={2010},
publisher= {Wiley}, publisher={Wiley Publishing}
isbn = {978-0-470-61303-0}, isbn = {978-0-470-61303-0},
note = {Une référence pour s'initier à l'analyse de codes malveillants.}, note = {Une référence pour s'initier à l'analyse de codes malveillants},
keyword={Cybersécurité, Malware, Hacking}} keyword={Cybersécurité, Malware, Hacking}}
@book{étiquette, @book{étiquette,
@ -43,7 +43,7 @@
title={The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice}, title={The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice},
author={Andress, Jason and Winterfeld, Steve}, author={Andress, Jason and Winterfeld, Steve},
year={2012}, year={2012},
note = {Un livre "ancien" qui a le mérite de présenter les bases de la construction des doctrines de cyberdéfense. L'ouvrage replace le concept de cyberguerre dans le corpus stratégique et la continuité des concepts militaires}, note = {Un livre ancien qui a le mérite de présenter les bases de la construction des doctrines de cyberdéfense. L'ouvrage replace le concept de cyberguerre dans le corpus stratégique et la continuité des concepts militaires},
keyword = {cyberdéfense, stratégie, doctrine, cyberwarfare}, keyword = {cyberdéfense, stratégie, doctrine, cyberwarfare},
publisher={Newnes}, publisher={Newnes},
note = {disponible prêt adhérents M82}} note = {disponible prêt adhérents M82}}
@ -119,10 +119,10 @@
keyword = {Désinformation, Propagande}} keyword = {Désinformation, Propagande}}
@book{étiquette, @book{étiquette,
author = {Benkler, Yochai and Faris, Robert and Robert, Hal}, title={Network propaganda: Manipulation, disinformation, and radicalization in American politics},
title = {Network propaganda: Manipulation, Disinformation, Radicalization in American Politics}, author={Benkler, Yochai and Faris, Robert and Roberts, Hal},
year = {2018}, year={2018},
publisher= {Oxford University Press}, publisher={Oxford University Press}
keyword={Désinformation, Propagande}} keyword={Désinformation, Propagande}}
@book{étiquette, @book{étiquette,
@ -213,14 +213,15 @@
keyword = {cyberstratégie}} keyword = {cyberstratégie}}
@book{étiquette, @book{étiquette,
author = {Brantly, Aaron Franklin}, title={The decision to attack: military and intelligence cyber decision-making},
title = {The {Decision} to {Attack}: {Military} and {Intelligence} {Cyber} {Decision}-{Making}}, author={Brantly, Aaron Franklin},
year = {2018}, volume={5},
publisher= {University of Georgia Press}, year={2016},
publisher={University of Georgia Press}
Keyword={Renseignement, Cyberguerre, Stratégie, Géopolitique}} Keyword={Renseignement, Cyberguerre, Stratégie, Géopolitique}}
@book{étiquette, @book{étiquette,
author = {Brenner,Susan}, author = {Brenner,Susan W},
title = {Cyberthreats, the emerging fault line of the Nation State}, title = {Cyberthreats, the emerging fault line of the Nation State},
year = {2009}, year = {2009},
publisher= {Oxford University Press}, publisher= {Oxford University Press},
@ -244,7 +245,7 @@
keyword={Cybersécurité}} keyword={Cybersécurité}}
@book{étiquette, @book{étiquette,
author = {Bryant, William}, author = {Bryant, William D},
title = {International Conflict and Cyberspace superiority}, title = {International Conflict and Cyberspace superiority},
year = {2016}, year = {2016},
publisher= {Routledge}, publisher= {Routledge},