From c163d33db337ed557f226475fc0d81d44a20d997 Mon Sep 17 00:00:00 2001 From: Principe Debase <127015047+principeM82@users.noreply.github.com> Date: Mon, 1 Jan 2024 11:02:42 +0100 Subject: [PATCH] =?UTF-8?q?Update=20Biblio=5FD=C3=A9cembre=5F2023.bib?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit T --- Décembre_2023/Biblio_Décembre_2023.bib | 55 +++++++++----------------- 1 file changed, 18 insertions(+), 37 deletions(-) diff --git a/Décembre_2023/Biblio_Décembre_2023.bib b/Décembre_2023/Biblio_Décembre_2023.bib index a22dd52..cbf6e1f 100644 --- a/Décembre_2023/Biblio_Décembre_2023.bib +++ b/Décembre_2023/Biblio_Décembre_2023.bib @@ -531,6 +531,12 @@ isbn = {9782100748280}, keyword={Cyberguerre, Cyberstratégie, Géopolitique}} + @book{étiquette, + author={Ferguson, Niels and Schneier, Bruce and Kohno, Tadayoshi}, + title = {Cryptography Engineering: design principles and practical applications}, + year = {2011}, + publisher= {John Wiley \& Sons}} + @book{étiquette, author = {Foster, James JF}, title = {Digital influence mercenaries, profits and power through information warfare}, @@ -1289,7 +1295,7 @@ author = {Roccia, Thomas}, title = {Visual Threat Intelligence, An illustrated Guide For Threat Researchers}, year = {2023}, - note = {livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel}, + note = {Livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel}, keyword = {Cyber Threat Intell, CTI}} @book{étiquette, @@ -1330,7 +1336,7 @@ @book{étiquette, author = {Sanger, David}, - title = {Confront and Conceal: Obama’s secret wars}, + title = {Confront and Conceal: Obama’s secret wars and surprising use of American power}, year = {2012}, publisher= {Crown}, keyword = {stratégie, géopolitique,cyberguerre}, @@ -1339,7 +1345,7 @@ @book{étiquette, author = {Sanger, David}, title = {The Perfect Weapon: War, Sabotage and Fear in the Cyber Age}, - year = {2019}, + year = {2018}, publisher= {Crown}, isbn = {978-0451497901}} @@ -1354,12 +1360,11 @@ title = {Tallinn manual 2.0 on the international law applicable to cyber operations}, year = {2017}, publisher = {Cambridge university press}, - address = {Cambridge, Royaume-Uni}, isbn = {978-1-316-63037-2}} @book{étiquette, author = {Schneier, Bruce}, - title = {Applied Cryptography}, + title = {Applied Cryptography: Protocols, Algorthms, and Source Code in C.}, year = {1996}, publisher= {John Wiley \& Sons}} @@ -1370,19 +1375,6 @@ publisher= {John Wiley \& Sons}, isbn = {0471453803}} - @book{étiquette, - author = {Schneier, Bruce}, - title = {Cryptography Engineering}, - year = {2010}, - publisher= {John Wiley \& Sons}} - - @book{étiquette, - author = {Schoch, Patrice and Akdim, Hamid and Sennouni, Amine and Jourt-Pineau, Cécilia}, - title = {Pilotage stratégique 5.0 \& résilience des organisations}, - year = {2021}, - publisher = {L'Harmatan}, - isbn = {978-2-343-23786-2}} - @book{étiquette, author = {Schradie, Jen}, title = {L'illusion de la démocratie numérique. Internet est-il de droite ?}, @@ -1402,14 +1394,14 @@ @book{étiquette, author = {Séjean, Michel}, title = {Code de la cybersécurité}, - year = {2022}, + year = {2023}, publisher= {Lefevre Dalloz}, keyword={droit}, note={un incontournable pour ceux qui souhaitent maitriser le droit associé à la cybersécurité}} @book{étiquette, author = {Shevelyov, Nicholas}, - title = {Cyber War ... and Peace:Building Digital Trust Today with History as Our Guide}, + title = {Cyber War... and Peace: Building Digital Trust Today with History as Our Guide}, year = {2017}, publisher = {Lioncrest Publishing}, isbn = {978-1544517094}, @@ -1418,7 +1410,7 @@ @book{étiquette, author = {Shimomura,Tsutomu and Markoff, John}, - title = {Cybertraque. La chasse au pirate informatique le plus célèbre des États-Unis}, + title = {Cybertraque : la chasse au pirate informatique le plus célèbre des États-Unis}, year = {1998}, publisher = {Plon}, note = {Traduction française de "Katching Kevin", récit du hack et de la traque de Kevin Mitnick en 1995}, @@ -1429,8 +1421,7 @@ title = {Cognitive Surplus: Creativity and Generosity in a Connected Age}, year = {2010}, publisher= {Penguin Press}, - isbn = {9780141041605}, - note = {In Cognitive Surplus, Internet guru Clay Shirky forecasts the thrilling changes we will all enjoy as new digital technology puts our untapped resources of talent and goodwill to use at last. }} + isbn = {9780141041605}} @book{étiquette, author = {Sikorski, Michael and Honig, Andrew}, @@ -1438,16 +1429,6 @@ year = {2012}, publisher= {No Starch Press}} - @book{étiquette, - title = {The {Infinite} {Game}}, - isbn = {978-0-7352-1350-0}, - publisher = {Portfolio}, - author = {Sinek, Simon}, - year = {2019}, - keywords = {personal development}, - url = {https://www.amazon.fr/Infinite-Game-Simon-Sinek/dp/073521350X}, - note = {ou comment penser long terme, et pourquoi il faut arrêter de réfléchir court terme une lecture intéressante lors de la définition d’une stratégie.}} - @book{étiquette, author = {Singer, P.W and Cole, August}, title = {La flotte fantôme}, @@ -1469,7 +1450,7 @@ author = {Smeets, Max}, title = {No Shortcuts. Why States Struggle to Develop a Military Cyber-Force}, year = {2022}, - publisher= {Hurst}} + publisher= {Oxford University Press}} @book{étiquette, author = {Stamboliyska, Rayna}, @@ -1483,10 +1464,10 @@ year={2020}, publisher={Springer Vieweg}, keyword={Cybersécurité, Attribution}, - note = {un livre qui traite en profondeur la problématique de l’attribution, mais aussi l’ensemble des concepts clés de la CTI}} + note = {Un livre qui traite en profondeur la problématique de l’attribution, mais aussi l’ensemble des concepts clés de la CTI}} @book{étiquette, - author={stengel, Richard}, + author={Stengel, Richard}, title={Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About It}, year={2019}, publisher={Atlantic Monthly Press}, @@ -1504,7 +1485,7 @@ author = {Stoll, Clifford}, title = {The Cuckoo's Egg}, year = {1989}, - publisher= {New York: Doubleday}} + publisher= {Doubleday}} @comment{T}