Merge pull request #8 from sebdraven/main

Update fevrier_2023.bib
Этот коммит содержится в:
BartM82 2023-03-25 10:48:03 +01:00 коммит произвёл GitHub
родитель a165b22366 2364a37abb
Коммит f20e6a2108
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -1,7 +1,5 @@
-----------------------------------------------------------------------------------------------
A
@ -132,7 +130,8 @@
title = {The Deception Game},
year = {1981},
publisher= {Ballantine Books},
Keyword={Renseignement, Russie}}
Keyword={Renseignement, Russie},
isbn = {9780815680789}}
@book{étiquette,
author = {Bittman, Ladistlav},
@ -244,7 +243,9 @@
title = {International Conflict and Cyberspace superiority},
year = {2016},
publisher= {Routledge},
keyword={Géopolitique, Cyberguerre}}
keyword={Géopolitique, Cyberguerre},
isbn = {9781138918917}}
@book{étiquette,
@ -325,7 +326,9 @@
title = {Cybermenace},
year = {2013},
publisher= {Albin Michel},
keyword={Cyberguerre, Roman}}
keyword={Cyberguerre, Roman},
isbn={9782226252029}}
@book{étiquette,
@ -380,7 +383,8 @@
title={The Internet in everything},
author={DeNardis, Laura},
year={2020},
publisher={Yale University Press}}
publisher={Yale University Press},
isbn={9798811915644}}
@book{étiquette,
@ -450,7 +454,8 @@
title = {Cybersecurity myths and Misconceptions},
year = {2023},
publisher= {Pearson Education},
keyword={Cybersécurité}}
keyword={Cybersécurité},
isbn={0137929234}}
E
@ -641,7 +646,8 @@
author={Hubbard, Douglas W and Seiersen, Richard},
year={2023},
publisher={John Wiley \& Sons},
keyword={Cybersécurité}}
keyword={Cybersécurité},
isbn={1119162319}}
@book{étiquette,
@ -679,14 +685,16 @@
author = {Janczewsky, Lech and Andrew, Colarik},
title = {Cyber warfare and Cyberterrorism},
year = {2007},
publisher= {Information Science Reference}}
publisher= {Information Science Reference},
isbn = {9781423506331}}
@book{étiquette,
author= {Jankowicz, Nina},
title = {How to lose the Information War},
year = {2020},
publisher= {Bloomsbury}}
publisher= {Bloomsbury},
isbn = {9781838607685}}
K
@ -696,7 +704,8 @@
author = {Kaplan, Fred},
title = {Dark Territory: The Secret History of Cyber War},
year = {2016},
publisher= {Simon and Schuster}}
publisher= {Simon and Schuster},
isbn = {1476763275}}
@book{étiquette,
@ -769,7 +778,7 @@
title = {Agora toxica},
year = {2022}
publisher = {éditions du détour},
isbn = {979-10-97079-87-1}
isbn = {979-10-97079-87-1}}
@book{laurent2021conflits,
title={Conflits, crimes et r{\'e}gulations dans le cyberespace},
@ -835,14 +844,16 @@
author = {Libicki, Martin},
title = {Cyberdeterrence and Cyberwar},
year = {2009},
publisher= {RAND Project Air force}}
publisher= {RAND Project Air force},
isbn = {0833047345}}
@book{étiquette,
author = {Libicki, Martin},
title = {Conquest in cyberspace: national security and information},
year = {2007},
publisher= {Cambridge University Press}}
publisher= {Cambridge University Press},
isbn={0521692148}}
@book{étiquette,
@ -865,7 +876,9 @@
author = {Lonsdale, David},
title = {The Nature of War in the Information Age},
year = {2004},
publisher= {Frank Cass}}
publisher= {Frank Cass},
isbn = {1135757186}}
@ -924,8 +937,9 @@
author = {Monte, Matthew},
title = {Network Attacks and Exploitation},
year = {2015},
publisher= {Wiley}}
publisher= {Wiley},
isbn = {9781119183440}}
@book{étiquette,
author = {Moore, Daniel},
@ -950,7 +964,8 @@
author = {Motte, Martin},
title = {La mesure de la force},
year = {2018},
publisher= {Taillandier}}
publisher= {Taillandier},
isbn = {9782764437766}}
@ -961,7 +976,8 @@
author = {Nye, Joseph},
title = {Cyberpower},
year = {2010},
publisher= {Harvard University}}
publisher= {Harvard University},
isbn = {0203448634}}
P
@ -1075,7 +1091,8 @@
author = {Rattray, Gregory},
title = {Strategic warfare in cyberspace},
year = {2001},
publisher= {Mass MIT Press}}
publisher= {Mass MIT Press},
isbn ={9780262182096}}
@book{étiquette,
@ -1091,7 +1108,8 @@
author = {Rid, Thomas},
title = {Cyber War will not take place},
year = {2013},
publisher= {Oxford University Press}}
publisher= {Oxford University Press},
isbn={1849042802}}
@ -1150,7 +1168,8 @@
author = {Schneier, Bruce},
title = {Applied Cryptography},
year = {1996},
publisher= {John Wiley \& Sons}}
publisher= {John Wiley \& Sons},
isbn = {0471597562}}
@book{étiquette,
@ -1165,7 +1184,8 @@
author = {Schneier, Bruce},
title = {Cryptography Engineering},
year = {2010},
publisher= {John Wiley \& Sons}}
publisher= {John Wiley \& Sons},
isbn = {9781118082102}}
@book{étiquette,
author = {Schradie, Jen},
@ -1236,14 +1256,16 @@
author={Stevens, Tim},
year={2016},
publisher={Cambridge University Press},
keyword={Cybersécurité}}
keyword={Cybersécurité},
ibsn={9781107521599}}
@book{étiquette,
author = {Stoll, Clifford},
title = {The Cuckoo's Egg},
year = {1989},
publisher= {New York: Doubleday}}
publisher= {New York: Doubleday},
isbn = {3596139848}}
T
@ -1326,8 +1348,8 @@
year={2004},
publisher={l'Age d'homme},
keyword = {Désinformation},
note = {}
note = {},
isbn = {9782260004417}
}