Merge pull request #8 from sebdraven/main

Update fevrier_2023.bib
Этот коммит содержится в:
BartM82 2023-03-25 10:48:03 +01:00 коммит произвёл GitHub
родитель a165b22366 2364a37abb
Коммит f20e6a2108
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -1,7 +1,5 @@
-----------------------------------------------------------------------------------------------
A A
@ -132,7 +130,8 @@
title = {The Deception Game}, title = {The Deception Game},
year = {1981}, year = {1981},
publisher= {Ballantine Books}, publisher= {Ballantine Books},
Keyword={Renseignement, Russie}} Keyword={Renseignement, Russie},
isbn = {9780815680789}}
@book{étiquette, @book{étiquette,
author = {Bittman, Ladistlav}, author = {Bittman, Ladistlav},
@ -244,7 +243,9 @@
title = {International Conflict and Cyberspace superiority}, title = {International Conflict and Cyberspace superiority},
year = {2016}, year = {2016},
publisher= {Routledge}, publisher= {Routledge},
keyword={Géopolitique, Cyberguerre}} keyword={Géopolitique, Cyberguerre},
isbn = {9781138918917}}
@book{étiquette, @book{étiquette,
@ -325,7 +326,9 @@
title = {Cybermenace}, title = {Cybermenace},
year = {2013}, year = {2013},
publisher= {Albin Michel}, publisher= {Albin Michel},
keyword={Cyberguerre, Roman}} keyword={Cyberguerre, Roman},
isbn={9782226252029}}
@book{étiquette, @book{étiquette,
@ -380,7 +383,8 @@
title={The Internet in everything}, title={The Internet in everything},
author={DeNardis, Laura}, author={DeNardis, Laura},
year={2020}, year={2020},
publisher={Yale University Press}} publisher={Yale University Press},
isbn={9798811915644}}
@book{étiquette, @book{étiquette,
@ -450,7 +454,8 @@
title = {Cybersecurity myths and Misconceptions}, title = {Cybersecurity myths and Misconceptions},
year = {2023}, year = {2023},
publisher= {Pearson Education}, publisher= {Pearson Education},
keyword={Cybersécurité}} keyword={Cybersécurité},
isbn={0137929234}}
E E
@ -641,7 +646,8 @@
author={Hubbard, Douglas W and Seiersen, Richard}, author={Hubbard, Douglas W and Seiersen, Richard},
year={2023}, year={2023},
publisher={John Wiley \& Sons}, publisher={John Wiley \& Sons},
keyword={Cybersécurité}} keyword={Cybersécurité},
isbn={1119162319}}
@book{étiquette, @book{étiquette,
@ -679,14 +685,16 @@
author = {Janczewsky, Lech and Andrew, Colarik}, author = {Janczewsky, Lech and Andrew, Colarik},
title = {Cyber warfare and Cyberterrorism}, title = {Cyber warfare and Cyberterrorism},
year = {2007}, year = {2007},
publisher= {Information Science Reference}} publisher= {Information Science Reference},
isbn = {9781423506331}}
@book{étiquette, @book{étiquette,
author= {Jankowicz, Nina}, author= {Jankowicz, Nina},
title = {How to lose the Information War}, title = {How to lose the Information War},
year = {2020}, year = {2020},
publisher= {Bloomsbury}} publisher= {Bloomsbury},
isbn = {9781838607685}}
K K
@ -696,7 +704,8 @@
author = {Kaplan, Fred}, author = {Kaplan, Fred},
title = {Dark Territory: The Secret History of Cyber War}, title = {Dark Territory: The Secret History of Cyber War},
year = {2016}, year = {2016},
publisher= {Simon and Schuster}} publisher= {Simon and Schuster},
isbn = {1476763275}}
@book{étiquette, @book{étiquette,
@ -769,7 +778,7 @@
title = {Agora toxica}, title = {Agora toxica},
year = {2022} year = {2022}
publisher = {éditions du détour}, publisher = {éditions du détour},
isbn = {979-10-97079-87-1} isbn = {979-10-97079-87-1}}
@book{laurent2021conflits, @book{laurent2021conflits,
title={Conflits, crimes et r{\'e}gulations dans le cyberespace}, title={Conflits, crimes et r{\'e}gulations dans le cyberespace},
@ -835,14 +844,16 @@
author = {Libicki, Martin}, author = {Libicki, Martin},
title = {Cyberdeterrence and Cyberwar}, title = {Cyberdeterrence and Cyberwar},
year = {2009}, year = {2009},
publisher= {RAND Project Air force}} publisher= {RAND Project Air force},
isbn = {0833047345}}
@book{étiquette, @book{étiquette,
author = {Libicki, Martin}, author = {Libicki, Martin},
title = {Conquest in cyberspace: national security and information}, title = {Conquest in cyberspace: national security and information},
year = {2007}, year = {2007},
publisher= {Cambridge University Press}} publisher= {Cambridge University Press},
isbn={0521692148}}
@book{étiquette, @book{étiquette,
@ -865,7 +876,9 @@
author = {Lonsdale, David}, author = {Lonsdale, David},
title = {The Nature of War in the Information Age}, title = {The Nature of War in the Information Age},
year = {2004}, year = {2004},
publisher= {Frank Cass}} publisher= {Frank Cass},
isbn = {1135757186}}
@ -924,8 +937,9 @@
author = {Monte, Matthew}, author = {Monte, Matthew},
title = {Network Attacks and Exploitation}, title = {Network Attacks and Exploitation},
year = {2015}, year = {2015},
publisher= {Wiley}} publisher= {Wiley},
isbn = {9781119183440}}
@book{étiquette, @book{étiquette,
author = {Moore, Daniel}, author = {Moore, Daniel},
@ -950,7 +964,8 @@
author = {Motte, Martin}, author = {Motte, Martin},
title = {La mesure de la force}, title = {La mesure de la force},
year = {2018}, year = {2018},
publisher= {Taillandier}} publisher= {Taillandier},
isbn = {9782764437766}}
@ -961,7 +976,8 @@
author = {Nye, Joseph}, author = {Nye, Joseph},
title = {Cyberpower}, title = {Cyberpower},
year = {2010}, year = {2010},
publisher= {Harvard University}} publisher= {Harvard University},
isbn = {0203448634}}
P P
@ -1075,7 +1091,8 @@
author = {Rattray, Gregory}, author = {Rattray, Gregory},
title = {Strategic warfare in cyberspace}, title = {Strategic warfare in cyberspace},
year = {2001}, year = {2001},
publisher= {Mass MIT Press}} publisher= {Mass MIT Press},
isbn ={9780262182096}}
@book{étiquette, @book{étiquette,
@ -1091,7 +1108,8 @@
author = {Rid, Thomas}, author = {Rid, Thomas},
title = {Cyber War will not take place}, title = {Cyber War will not take place},
year = {2013}, year = {2013},
publisher= {Oxford University Press}} publisher= {Oxford University Press},
isbn={1849042802}}
@ -1150,7 +1168,8 @@
author = {Schneier, Bruce}, author = {Schneier, Bruce},
title = {Applied Cryptography}, title = {Applied Cryptography},
year = {1996}, year = {1996},
publisher= {John Wiley \& Sons}} publisher= {John Wiley \& Sons},
isbn = {0471597562}}
@book{étiquette, @book{étiquette,
@ -1165,7 +1184,8 @@
author = {Schneier, Bruce}, author = {Schneier, Bruce},
title = {Cryptography Engineering}, title = {Cryptography Engineering},
year = {2010}, year = {2010},
publisher= {John Wiley \& Sons}} publisher= {John Wiley \& Sons},
isbn = {9781118082102}}
@book{étiquette, @book{étiquette,
author = {Schradie, Jen}, author = {Schradie, Jen},
@ -1236,14 +1256,16 @@
author={Stevens, Tim}, author={Stevens, Tim},
year={2016}, year={2016},
publisher={Cambridge University Press}, publisher={Cambridge University Press},
keyword={Cybersécurité}} keyword={Cybersécurité},
ibsn={9781107521599}}
@book{étiquette, @book{étiquette,
author = {Stoll, Clifford}, author = {Stoll, Clifford},
title = {The Cuckoo's Egg}, title = {The Cuckoo's Egg},
year = {1989}, year = {1989},
publisher= {New York: Doubleday}} publisher= {New York: Doubleday},
isbn = {3596139848}}
T T
@ -1326,8 +1348,8 @@
year={2004}, year={2004},
publisher={l'Age d'homme}, publisher={l'Age d'homme},
keyword = {Désinformation}, keyword = {Désinformation},
note = {} note = {},
isbn = {9782260004417}
} }