зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 05:04:16 +02:00
Update Biblio_Décembre_2023.bib
perkovitch
Этот коммит содержится в:
родитель
60493b9bcc
Коммит
672b0e6b2d
@ -864,7 +864,7 @@
|
||||
author = {Kramer, Franklin and Starr, Stuart and Wentz, Larry},
|
||||
title = {Cyberpower and National Security. National Defense},
|
||||
year = {2009},
|
||||
publisher= {University Press and potomac books}}
|
||||
publisher= {Georgetown University Press}}
|
||||
|
||||
@comment{L}
|
||||
|
||||
@ -914,7 +914,7 @@
|
||||
title = {Tactique cyber, le combat numérique},
|
||||
year = {2019},
|
||||
publisher= {Economica},
|
||||
note = {Préface du Général Olivier BONNET DE PAILLERETS},
|
||||
note = {Préface du Général Olivier Bonnet de Paillerets},
|
||||
isbn = {978-2-7178-7060-2},
|
||||
note={disponible prêt adhérents M82}}
|
||||
|
||||
@ -924,22 +924,21 @@
|
||||
year = {2023},
|
||||
publisher= {Wiley},
|
||||
note = {retrouvez ici un billet de blog très complet sur cet ouvrage https://warnerchad.medium.com/cyber-threat-intelligence-by-martin-lee-notes-494a028c7d74},
|
||||
url = {https://warnerchad.medium.com/cyber-threat-intelligence-by-martin-lee-notes-494a028c7d74},
|
||||
isbn = {1119861748},
|
||||
keyword = {Cyber Threat Intelligence}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Lejeune, Yannick},
|
||||
title = {Big, fast and Open Data},
|
||||
author = {Lejeune, Yannick and EPITA},
|
||||
title = {Big, fast, Open Data : décrire, décrypter et prédire le monde : l'avènement des données},
|
||||
year = {2014},
|
||||
publisher = {EPITA},
|
||||
publisher = {FYP},
|
||||
keyword = {data},
|
||||
note = {Ouvrage collectif réalisé à l'initiative de l'EPITA, il regroupe de nombreuses expertises et trace, dès 2014, les premières pistes sur l'avènement du monde de la donnée.},
|
||||
note={disponible prêt adhérents M82}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Leonetti, Xavier and Féral-Schull, Christiane},
|
||||
title = {Cybersécurité Mode d'emploi},
|
||||
title = {Cybersécurité mode d'emploi : entreprise, monde numérique et protection des données personnelles : 57 fiches réflexes},
|
||||
year = {2022},
|
||||
publisher= {PUF},
|
||||
isbn = {978-2-13-083369-7}}
|
||||
@ -969,7 +968,7 @@
|
||||
author = {Libicki, Martin},
|
||||
title = {Cyberdeterrence and Cyberwar},
|
||||
year = {2009},
|
||||
publisher= {RAND Project Air force},
|
||||
publisher= {RAND Corporation},
|
||||
keyword={dissuasion, cyberstratégie, cyberguerre}}
|
||||
|
||||
@book{étiquette,
|
||||
@ -980,7 +979,7 @@
|
||||
|
||||
@book{étiquette,
|
||||
author = {Lilly, Bilyana},
|
||||
title = {Russian Information Warfare},
|
||||
title = {Russian Information Warfare: assault on democracies in the cyber wild west},
|
||||
year = {2022},
|
||||
ISBN = {1682477193},
|
||||
publisher= {Naval Institute Press }}
|
||||
@ -990,11 +989,11 @@
|
||||
title = {Ru.net},
|
||||
year = {2018},
|
||||
ISBN = {2355970327},
|
||||
publisher= {Inventaire Eds De L'}}
|
||||
publisher= {édition de l'Inventaire}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Lonsdale, David},
|
||||
title = {The Nature of War in the Information Age},
|
||||
author = {Lonsdale, David J},
|
||||
title = {The Nature of War in the Information Age: Clausewitzian future},
|
||||
year = {2004},
|
||||
publisher= {Frank Cass}}
|
||||
|
||||
@ -1010,27 +1009,20 @@
|
||||
|
||||
@book{étiquette,
|
||||
author = {Menn, Joseph},
|
||||
title = {Cult of the Dead Cow},
|
||||
title = {Cult of the Dead Cow: how the original hacking Supergroup might just save the world},
|
||||
year = {2019},
|
||||
publisher = {PublicAffairs},
|
||||
isbn = {9781541724426}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Mercier, Arnaud et Pignard-Cheynel, Nathalie},
|
||||
title = {Commenter et partager l'actualité sur Twitter et Facebook},
|
||||
year = {2018},
|
||||
publisher = {Fondation maison des sciences de l'homme},
|
||||
isbn = {978-2-7351-2398-8}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Mitnick, Kevin},
|
||||
title = {The Art of Deception - Controlling the Human Element of Security },
|
||||
author = {Mitnick, Kevin D and Simon, William L},
|
||||
title = {The Art of Deception: Controlling the Human Element of Security},
|
||||
year = {2003},
|
||||
publisher = {John Wiley \& Sons},
|
||||
isbn = {9780764542800}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Mitnick, Kevin},
|
||||
author = {Mitnick, Kevin D and Simon, William L},
|
||||
title = {The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers},
|
||||
year = {2005},
|
||||
publisher = {John Wiley \& Sons},
|
||||
@ -1054,7 +1046,6 @@
|
||||
author = {Moore, Daniel},
|
||||
title = {Offensive Cyber Operations},
|
||||
year = {2022},
|
||||
note = {https://www.hurstpublishers.com/book/offensive-cyber-operations/},
|
||||
isbn = {9781787385610},
|
||||
publisher= {Hurst}}
|
||||
|
||||
@ -1073,7 +1064,7 @@
|
||||
year = {2018},
|
||||
publisher= {Taillandier},
|
||||
keyword={stratégie},
|
||||
note={ouvrage qui ne traite pas uniquement de cyber mais de stratégie au sens large, un chapitre couvre les enjeux du combat à l'ère numérique}}
|
||||
note={Ouvrage qui ne traite pas uniquement de cyber mais de stratégie au sens large, un chapitre couvre les enjeux du combat à l'ère numérique}}
|
||||
|
||||
|
||||
@comment{N}
|
||||
@ -1089,7 +1080,7 @@
|
||||
|
||||
@book{étiquette,
|
||||
author = {O'Hara, Kieron and Hall, Wendy},
|
||||
title = {Four Internets:Data, Geopolitics, and the Governance of Cyberspace },
|
||||
title = {Four Internets: Data, Geopolitics, and the Governance of Cyberspace},
|
||||
year = {2021},
|
||||
publisher = {Oxford University Press},
|
||||
isbn = {978-0-19-752368-1},
|
||||
@ -1105,44 +1096,34 @@
|
||||
|
||||
@comment{P}
|
||||
|
||||
@book{étiquette,
|
||||
title = {Negotiating {Like} {Lives} {Are} on the {Line}: {The} {Essentials} of {Crisis} {Negotiation} for {Use} in {Everyday} {Situations}},
|
||||
isbn = {978-1-946754-20-2},
|
||||
publisher = {CopWorld Press},
|
||||
author = {Pultz, Jonathan},
|
||||
year = {2022},
|
||||
keywords = {négociation},
|
||||
url = {https://www.amazon.fr/Negotiating-Like-Lives-Are-Line/dp/194675420X},
|
||||
note = {parce qu’on négocie tous, tous les jours … }}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Patino, Bruno},
|
||||
title = {La civilisation du poisson rouge. Petit traité sur le marché de l'attention},
|
||||
year = {2019},
|
||||
publisher = {Grasset et Fasquelle},
|
||||
publisher = {Grasset},
|
||||
isbn = {978-2-253-10125-3}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Patino, Bruno},
|
||||
title = {Tempête dans le bocal, la nouvelle civilisation du poisson rouge},
|
||||
year = {2022},
|
||||
publisher = {Grasset et Fasquelle},
|
||||
publisher = {Grasset},
|
||||
isbn = {978-2-246-82896-9}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Groupe Pandoras},
|
||||
title = {cybersécurité - méthode de gestion de crise},
|
||||
title = {cybersécurité : méthode de gestion de crise},
|
||||
year = {2021},
|
||||
publisher= {VA-EDITIONS}}
|
||||
publisher= {VA-ÉDITIONS}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Payne, Kenneth},
|
||||
title = {I, Warbot: The Dawn of Artificially Intelligent Conflict},
|
||||
year = {2021},
|
||||
publisher= {Hurst Publishers}}
|
||||
publisher= {Oxford University Press}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Pelroth, Nicole},
|
||||
author = {Perlroth, Nicole},
|
||||
title = {This is How they Tell me the World Ends: the Cyberweapons Arms Race},
|
||||
year = {2021},
|
||||
publisher= {Bloomsburry Publishing}}
|
||||
@ -1150,10 +1131,9 @@
|
||||
|
||||
@book{étiquette,
|
||||
author = {Penalba, Pierre},
|
||||
title = {Cyber crimes: un flic 2.0 raconte},
|
||||
year = {2021},
|
||||
publisher = {Albin Michel},
|
||||
isbn = {978-2226445957}}
|
||||
title = {Cyber crimes : un flic 2.0 raconte},
|
||||
year = {2020},
|
||||
publisher = {Albin Michel}}
|
||||
|
||||
|
||||
@book{étiquette,
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user