зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 13:06:06 +02:00
Update Biblio_Décembre_2023.bib
T
Этот коммит содержится в:
родитель
0fffa009de
Коммит
c163d33db3
@ -531,6 +531,12 @@
|
||||
isbn = {9782100748280},
|
||||
keyword={Cyberguerre, Cyberstratégie, Géopolitique}}
|
||||
|
||||
@book{étiquette,
|
||||
author={Ferguson, Niels and Schneier, Bruce and Kohno, Tadayoshi},
|
||||
title = {Cryptography Engineering: design principles and practical applications},
|
||||
year = {2011},
|
||||
publisher= {John Wiley \& Sons}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Foster, James JF},
|
||||
title = {Digital influence mercenaries, profits and power through information warfare},
|
||||
@ -1289,7 +1295,7 @@
|
||||
author = {Roccia, Thomas},
|
||||
title = {Visual Threat Intelligence, An illustrated Guide For Threat Researchers},
|
||||
year = {2023},
|
||||
note = {livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel},
|
||||
note = {Livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel},
|
||||
keyword = {Cyber Threat Intell, CTI}}
|
||||
|
||||
@book{étiquette,
|
||||
@ -1330,7 +1336,7 @@
|
||||
|
||||
@book{étiquette,
|
||||
author = {Sanger, David},
|
||||
title = {Confront and Conceal: Obama’s secret wars},
|
||||
title = {Confront and Conceal: Obama’s secret wars and surprising use of American power},
|
||||
year = {2012},
|
||||
publisher= {Crown},
|
||||
keyword = {stratégie, géopolitique,cyberguerre},
|
||||
@ -1339,7 +1345,7 @@
|
||||
@book{étiquette,
|
||||
author = {Sanger, David},
|
||||
title = {The Perfect Weapon: War, Sabotage and Fear in the Cyber Age},
|
||||
year = {2019},
|
||||
year = {2018},
|
||||
publisher= {Crown},
|
||||
isbn = {978-0451497901}}
|
||||
|
||||
@ -1354,12 +1360,11 @@
|
||||
title = {Tallinn manual 2.0 on the international law applicable to cyber operations},
|
||||
year = {2017},
|
||||
publisher = {Cambridge university press},
|
||||
address = {Cambridge, Royaume-Uni},
|
||||
isbn = {978-1-316-63037-2}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Schneier, Bruce},
|
||||
title = {Applied Cryptography},
|
||||
title = {Applied Cryptography: Protocols, Algorthms, and Source Code in C.},
|
||||
year = {1996},
|
||||
publisher= {John Wiley \& Sons}}
|
||||
|
||||
@ -1370,19 +1375,6 @@
|
||||
publisher= {John Wiley \& Sons},
|
||||
isbn = {0471453803}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Schneier, Bruce},
|
||||
title = {Cryptography Engineering},
|
||||
year = {2010},
|
||||
publisher= {John Wiley \& Sons}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Schoch, Patrice and Akdim, Hamid and Sennouni, Amine and Jourt-Pineau, Cécilia},
|
||||
title = {Pilotage stratégique 5.0 \& résilience des organisations},
|
||||
year = {2021},
|
||||
publisher = {L'Harmatan},
|
||||
isbn = {978-2-343-23786-2}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Schradie, Jen},
|
||||
title = {L'illusion de la démocratie numérique. Internet est-il de droite ?},
|
||||
@ -1402,14 +1394,14 @@
|
||||
@book{étiquette,
|
||||
author = {Séjean, Michel},
|
||||
title = {Code de la cybersécurité},
|
||||
year = {2022},
|
||||
year = {2023},
|
||||
publisher= {Lefevre Dalloz},
|
||||
keyword={droit},
|
||||
note={un incontournable pour ceux qui souhaitent maitriser le droit associé à la cybersécurité}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Shevelyov, Nicholas},
|
||||
title = {Cyber War ... and Peace:Building Digital Trust Today with History as Our Guide},
|
||||
title = {Cyber War... and Peace: Building Digital Trust Today with History as Our Guide},
|
||||
year = {2017},
|
||||
publisher = {Lioncrest Publishing},
|
||||
isbn = {978-1544517094},
|
||||
@ -1418,7 +1410,7 @@
|
||||
|
||||
@book{étiquette,
|
||||
author = {Shimomura,Tsutomu and Markoff, John},
|
||||
title = {Cybertraque. La chasse au pirate informatique le plus célèbre des États-Unis},
|
||||
title = {Cybertraque : la chasse au pirate informatique le plus célèbre des États-Unis},
|
||||
year = {1998},
|
||||
publisher = {Plon},
|
||||
note = {Traduction française de "Katching Kevin", récit du hack et de la traque de Kevin Mitnick en 1995},
|
||||
@ -1429,8 +1421,7 @@
|
||||
title = {Cognitive Surplus: Creativity and Generosity in a Connected Age},
|
||||
year = {2010},
|
||||
publisher= {Penguin Press},
|
||||
isbn = {9780141041605},
|
||||
note = {In Cognitive Surplus, Internet guru Clay Shirky forecasts the thrilling changes we will all enjoy as new digital technology puts our untapped resources of talent and goodwill to use at last. }}
|
||||
isbn = {9780141041605}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Sikorski, Michael and Honig, Andrew},
|
||||
@ -1438,16 +1429,6 @@
|
||||
year = {2012},
|
||||
publisher= {No Starch Press}}
|
||||
|
||||
@book{étiquette,
|
||||
title = {The {Infinite} {Game}},
|
||||
isbn = {978-0-7352-1350-0},
|
||||
publisher = {Portfolio},
|
||||
author = {Sinek, Simon},
|
||||
year = {2019},
|
||||
keywords = {personal development},
|
||||
url = {https://www.amazon.fr/Infinite-Game-Simon-Sinek/dp/073521350X},
|
||||
note = {ou comment penser long terme, et pourquoi il faut arrêter de réfléchir court terme une lecture intéressante lors de la définition d’une stratégie.}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Singer, P.W and Cole, August},
|
||||
title = {La flotte fantôme},
|
||||
@ -1469,7 +1450,7 @@
|
||||
author = {Smeets, Max},
|
||||
title = {No Shortcuts. Why States Struggle to Develop a Military Cyber-Force},
|
||||
year = {2022},
|
||||
publisher= {Hurst}}
|
||||
publisher= {Oxford University Press}}
|
||||
|
||||
@book{étiquette,
|
||||
author = {Stamboliyska, Rayna},
|
||||
@ -1483,10 +1464,10 @@
|
||||
year={2020},
|
||||
publisher={Springer Vieweg},
|
||||
keyword={Cybersécurité, Attribution},
|
||||
note = {un livre qui traite en profondeur la problématique de l’attribution, mais aussi l’ensemble des concepts clés de la CTI}}
|
||||
note = {Un livre qui traite en profondeur la problématique de l’attribution, mais aussi l’ensemble des concepts clés de la CTI}}
|
||||
|
||||
@book{étiquette,
|
||||
author={stengel, Richard},
|
||||
author={Stengel, Richard},
|
||||
title={Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About It},
|
||||
year={2019},
|
||||
publisher={Atlantic Monthly Press},
|
||||
@ -1504,7 +1485,7 @@
|
||||
author = {Stoll, Clifford},
|
||||
title = {The Cuckoo's Egg},
|
||||
year = {1989},
|
||||
publisher= {New York: Doubleday}}
|
||||
publisher= {Doubleday}}
|
||||
|
||||
|
||||
@comment{T}
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user