зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 13:06:06 +02:00
Update Biblio_Décembre_2023.bib
Этот коммит содержится в:
родитель
2da93c0c7a
Коммит
ded4918d63
@ -17,7 +17,7 @@
|
|||||||
title={Malware analyst's cookbook and DVD: tools and techniques for fighting malicious code},
|
title={Malware analyst's cookbook and DVD: tools and techniques for fighting malicious code},
|
||||||
author={Ligh, Michael and Adair, Steven and Hartstein, Blake and Richard, Matthew},
|
author={Ligh, Michael and Adair, Steven and Hartstein, Blake and Richard, Matthew},
|
||||||
year={2010},
|
year={2010},
|
||||||
publisher={Wiley Publishing}
|
publisher={Wiley Publishing},
|
||||||
isbn = {978-0-470-61303-0},
|
isbn = {978-0-470-61303-0},
|
||||||
note = {Une référence pour s'initier à l'analyse de codes malveillants},
|
note = {Une référence pour s'initier à l'analyse de codes malveillants},
|
||||||
keyword={Cybersécurité, Malware, Hacking}}
|
keyword={Cybersécurité, Malware, Hacking}}
|
||||||
@ -302,7 +302,7 @@
|
|||||||
author = {Carrier, Brian},
|
author = {Carrier, Brian},
|
||||||
title = {File System Forensic Analysis},
|
title = {File System Forensic Analysis},
|
||||||
year = {2005},
|
year = {2005},
|
||||||
publisher = {Addison Wesley},
|
publisher={Addison-Wesley Professional},
|
||||||
isbn = {0321268172},
|
isbn = {0321268172},
|
||||||
keyword = {analyse, forensic},
|
keyword = {analyse, forensic},
|
||||||
note = {Un must have dans le domaine de l'analyse forensic}}
|
note = {Un must have dans le domaine de l'analyse forensic}}
|
||||||
@ -343,14 +343,12 @@
|
|||||||
keyword = {Cyberwar, Intelligence}}
|
keyword = {Cyberwar, Intelligence}}
|
||||||
|
|
||||||
@book{étiquette,
|
@book{étiquette,
|
||||||
title = {Influence et manipulation - 3e édition augmentée},
|
title={Influence et manipulation: L'art de la persuasion},
|
||||||
isbn = {978-2-266-22792-6},
|
author={Cialdini, Robert B},
|
||||||
publisher = {Pocket; Enlarged édition (17 avril 2014)},
|
year={2021},
|
||||||
author = {Cialdini, Robert B.},
|
publisher={First},
|
||||||
year = {2014},
|
|
||||||
keywords = {Renseignement, Psychologie sociale},
|
keywords = {Renseignement, Psychologie sociale},
|
||||||
note = {https://www.amazon.fr/Influence-manipulation-Robert-B-CIALDINI/dp/2266227920},
|
note = {Parfait pour apprendre les techniques que les médias/marketing/commerciaux utilisent tous les jours. Un point de départ pour la conduite d’opération HUMINT}}
|
||||||
note = {parfait pour apprendre les techniques que les médias/marketing/commerciaux utilisent tous les jours sans qu’on s’en rende compteun point de départ pour la conduite d’opération HUMINT}}
|
|
||||||
|
|
||||||
@book{étiquette,
|
@book{étiquette,
|
||||||
author = {Clancy, Tom},
|
author = {Clancy, Tom},
|
||||||
@ -364,7 +362,7 @@
|
|||||||
author = {Clarke, Richard and Knake, Robert},
|
author = {Clarke, Richard and Knake, Robert},
|
||||||
title = {Cyberwar: the next Threat to National Security and what to do about it},
|
title = {Cyberwar: the next Threat to National Security and what to do about it},
|
||||||
year = {2010},
|
year = {2010},
|
||||||
publisher= {Ecco Press},
|
publisher= {HarperCollins},
|
||||||
keyword={Cyberguerre, Géopolitique}}
|
keyword={Cyberguerre, Géopolitique}}
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
Загрузка…
x
Ссылка в новой задаче
Block a user