зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 21:16:11 +02:00
Merge pull request #54 from M82-project/principeM82-patch-4
Update Biblio_Décembre_2023.bib
Этот коммит содержится в:
Коммит
60493b9bcc
@ -6,7 +6,7 @@
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Abiteboul,Serge and Cattan, Jean},
|
||||
author = {Abiteboul, Serge and Cattan, Jean},
|
||||
title = {Nous sommes les réseaux sociaux},
|
||||
year = {2022},
|
||||
publisher= {Odile Jacob},
|
||||
@ -37,7 +37,7 @@
|
||||
year={2012},
|
||||
publisher={Pearson},
|
||||
keyword = {économie},
|
||||
note = {livre un brin prophétique devenu un "classique", Chris Anderson, rédacteur en chef de Wired, nous démontre comment Internet modifie en profondeur les mécanismes de l'économie.}}
|
||||
note = {Livre un brin prophétique devenu un classique. Chris Anderson, rédacteur en chef de Wired, nous démontre comment Internet modifie en profondeur les mécanismes de l'économie.}}
|
||||
|
||||
@book{andress2012basics,
|
||||
title={The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice},
|
||||
@ -254,8 +254,8 @@
|
||||
@book{étiquette,
|
||||
author = {Buchanan, Ben},
|
||||
title = {The Cybersecurity Dilemna: Hacking, Trust and Fear Between Nations},
|
||||
year = {2019},
|
||||
publisher= {C Hurst Co Publishers},
|
||||
year={2016},
|
||||
publisher={Oxford University Press},
|
||||
keyword={Cyberguerre, Géopolitique}}
|
||||
|
||||
@book{étiquette,
|
||||
@ -295,14 +295,14 @@
|
||||
author = {Carr, Jeffrey},
|
||||
title = {Inside Cyber Warfare, mapping the cyber underworld},
|
||||
year = {2009},
|
||||
publisher= {O'Reilly},
|
||||
publisher = {O'Reilly},
|
||||
keyword={Cyberguerre, Géopolitique}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Carrier, Brian},
|
||||
title = {File System Forensic Analysis},
|
||||
year = {2005},
|
||||
publisher={Addison-Wesley Professional},
|
||||
publisher = {Addison-Wesley Professional},
|
||||
isbn = {0321268172},
|
||||
keyword = {analyse, forensic},
|
||||
note = {Un must have dans le domaine de l'analyse forensic}}
|
||||
@ -375,8 +375,8 @@
|
||||
keyword={Cybercriminalité}}
|
||||
|
||||
@book{étiquette,
|
||||
author={Coelho,Ophélie},
|
||||
titel={Géopolitique du numérique: L'impérialisme à pas de géants},
|
||||
author={Coelho, Ophélie},
|
||||
titel={Géopolitique du numérique : l'impérialisme à pas de géants},
|
||||
publisher={Editions de l'Atelier},
|
||||
year={2023},
|
||||
ISBN={2708254022},
|
||||
@ -438,17 +438,16 @@
|
||||
author = {Delerue, François},
|
||||
title = {Cyberoperations and International Law},
|
||||
year = {2020},
|
||||
publisher= { Cambridge University Press},
|
||||
publisher= {Cambridge University Press},
|
||||
keyword={Cyberdéfense, Cyberguerre, Relations internationales, Droit }}
|
||||
|
||||
@book{étiquette,
|
||||
title = {Décider dans l'incertitude},
|
||||
isbn = {978-2-7178-5335-3},
|
||||
publisher = {Economica; 2e édition (22 janvier 2007)},
|
||||
publisher = {Economica},
|
||||
author = {Desportes, Vincent},
|
||||
year = {2007},
|
||||
keywords = {management, stratégie},
|
||||
note = {https://www.amazon.fr/D\%C3\%A9cider-dans-lincertitude-Vincent-Desportes/dp/2717853359},
|
||||
note = {le parallèle entre les opérations des forces armées permet de mieux penser une stratégie dans le monde de l’industrie.}}
|
||||
|
||||
@book{étiquette,
|
||||
@ -513,7 +512,7 @@
|
||||
keyword={Roman}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Engebreton, Patrick},
|
||||
author={Engebretson, Patrick},
|
||||
title = {Les bases du Hacking},
|
||||
year = {2017},
|
||||
publisher = {Pearson},
|
||||
@ -525,7 +524,7 @@
|
||||
@comment{F}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Faillet, Caroline },
|
||||
author = {Faillet, Caroline},
|
||||
title = {L'art de la guerre digitale, survivre et dominer à l'ère du numérique},
|
||||
year = {2016},
|
||||
publisher = {Dunod},
|
||||
@ -533,7 +532,7 @@
|
||||
keyword={Cyberguerre, Cyberstratégie, Géopolitique}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Foster, James},
|
||||
author = {Foster, James JF},
|
||||
title = {Digital influence mercenaries, profits and power through information warfare},
|
||||
year = {2022},
|
||||
publisher = {US Naval Institute Press},
|
||||
@ -607,7 +606,7 @@
|
||||
title = {Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers},
|
||||
year = {2019},
|
||||
isbn = {0385544405},
|
||||
publisher= {Doubleday},
|
||||
publisher= {Anchor},
|
||||
keywords = {Sandworm, hacking, cyberwar, Russie}}
|
||||
|
||||
|
||||
@ -630,7 +629,7 @@
|
||||
|
||||
@book{étiquette,
|
||||
author = {Roger, Grimes},
|
||||
title = {Hacking the Hacker: Learn From the Experts Who Take Down Hackers },
|
||||
title = {Hacking the Hacker: Learn From the Experts Who Take Down Hackers},
|
||||
year = {2017},
|
||||
publisher = {Wiley},
|
||||
note = {},
|
||||
@ -641,27 +640,25 @@
|
||||
author = {Goldstein, Guy-Philippe},
|
||||
title = {Babel minute zéro},
|
||||
year = {2010},
|
||||
isbn = {2070427501},
|
||||
publisher= {Galimard}}
|
||||
isbn = {978-2070427505},
|
||||
publisher= {Folio Policier},
|
||||
note = {roman}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Gottshall, Jonathan},
|
||||
author = {Gottschall, Jonathan},
|
||||
title = {The Storytelling Animal: How Stories Make Us Human},
|
||||
year = {2013},
|
||||
isbn = {978-0544002340},
|
||||
publisher= {Mariner Books},
|
||||
publisher= {Houghton Mifflin Harcourt},
|
||||
keyword={InfoWar, Influence},
|
||||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}}
|
||||
|
||||
@book{étiquette,
|
||||
title = {Psychologie la manipulation et la soumission},
|
||||
isbn = {978-2-10-071292-2},
|
||||
publisher = {Dunod},
|
||||
author = {Guéguen, Nicolas},
|
||||
year = {2014},
|
||||
year = {2021},
|
||||
keywords = {Renseignement, recherche universitaire, Psychologie sociale},
|
||||
url = {https://www.amazon.fr/Psychologie-manipulation-soumission-Nicolas-Gu\%C3\%A9guen/dp/2100712926},
|
||||
note = {une recherche universitaire sur la manipulation et la soumission un bon follow up a “Petit traité de manipulation à l'usage des honnêtes gens”}}
|
||||
note = {Une recherche universitaire sur la manipulation et la soumission un bon follow up a “Petit traité de manipulation à l'usage des honnêtes gens”}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -689,7 +686,6 @@
|
||||
title = {La cyberstratégie russe},
|
||||
year = {2013},
|
||||
publisher = {NUVIS},
|
||||
address = {https://www.eyrolles.com/Informatique/Livre/la-cyberstrategie-russe-9782363670519/},
|
||||
isbn = {9782363670519}}
|
||||
|
||||
@book{étiquette,
|
||||
@ -716,7 +712,7 @@
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Hennion, Romain and Maklhouf, Anissa},
|
||||
author = {Hennion, Romain and Makhlouf, Anissa},
|
||||
title = {La cybersécurité},
|
||||
year = {2018},
|
||||
publisher= {Eyrolles}}
|
||||
@ -728,6 +724,12 @@
|
||||
year = {2017},
|
||||
publisher= {ISTE éditions}}
|
||||
|
||||
@book{étiquette,
|
||||
title={Techno-gu{\'e}rilla et guerre hybride: le pire des deux mondes},
|
||||
author={Henrotin, Joseph},
|
||||
year={2014},
|
||||
publisher={Nuvis}}
|
||||
|
||||
@book{étiquette,
|
||||
title={Intelligence Services in the Information Age},
|
||||
author={Herman, Michael},
|
||||
@ -740,11 +742,10 @@
|
||||
@book{étiquette,
|
||||
title={Psychology of Intelligence Analysis},
|
||||
author={Heuer, Richards J.},
|
||||
year={2018},
|
||||
ISBN = {1684222079},
|
||||
publisher={Martino Fine Books},
|
||||
year={1999},
|
||||
publisher={Center for the Study of Intelligence},
|
||||
keyword={Analyse, psychologie, renseignement},
|
||||
note={un indispensable pour tout analyste traitant de la donnée en vue de fournir du renseignement}}
|
||||
note={Un indispensable pour tout analyste traitant de la donnée en vue de fournir du renseignement}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
@ -774,7 +775,7 @@
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Hypponen, Mikko},
|
||||
author = {Hypp{\"o}nen, Mikko},
|
||||
title = {If it's smart, it's vulnerable},
|
||||
year = {2022},
|
||||
publisher = {Wiley},
|
||||
@ -794,10 +795,10 @@
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
author = {Janczewsky, Lech and Colarik, Andrew},
|
||||
author = {Janczewski, Lech and Colarik, Andrew},
|
||||
title = {Cyber warfare and Cyberterrorism},
|
||||
year = {2007},
|
||||
publisher= {Information Science Reference},
|
||||
publisher= {IGI Global},
|
||||
keyword={CyberWar, Terrorisme, cyberguerre}}
|
||||
|
||||
|
||||
@ -805,8 +806,7 @@
|
||||
author= {Jankowicz, Nina},
|
||||
title = {How to lose the Information War: Russia, Fake News and the Future of Conflict},
|
||||
year = {2020},
|
||||
publisher= {I. B. Tauris},
|
||||
isbn={9780755642083},
|
||||
publisher= {Bloomsbury Publishing},
|
||||
keyword={InfoWar, guerre de l'information, réseaux sociaux}}
|
||||
|
||||
@book{étiquette,
|
||||
@ -815,7 +815,7 @@
|
||||
year = {2019},
|
||||
publisher = {L'Observatoire},
|
||||
keyword = {algorithme, sociologie, intelligence artificielle},
|
||||
note = {Un essai particulièrement accessible qui propose une réflexion sur comment progressivement les algorithmes ont boulversé notre quotidien.},
|
||||
note = {Un essai particulièrement accessible qui propose une réflexion sur comment progressivement les algorithmes ont boulversé notre quotidien},
|
||||
note={disponible prêt adhérents M82}}
|
||||
|
||||
@book{joule1987petit,
|
||||
@ -852,14 +852,12 @@
|
||||
title = {The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences},
|
||||
year = {2014},
|
||||
publisher = {SAGE},
|
||||
address = {},
|
||||
note = {},
|
||||
isbn = {978-1-4739-0826-0}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Klimburg, Alexander},
|
||||
title = {The Darkening Web: The War for Cyberspace},
|
||||
year = {2017},
|
||||
year = {2018},
|
||||
publisher= {Penguin Press}}
|
||||
|
||||
@book{étiquette,
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user