зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-28 20:54:16 +02:00
1734 строки
61 KiB
BibTeX
1734 строки
61 KiB
BibTeX
|
||
|
||
-----------------------------------------------------------------------------------------------
|
||
|
||
@comment{A}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Abiteboul, Serge and Cattan, Jean},
|
||
title = {Nous sommes les réseaux sociaux},
|
||
year = {2022},
|
||
publisher= {Odile Jacob},
|
||
isbn = {9782415001704},
|
||
keyword={Réseaux sociaux}}
|
||
|
||
@book{étiquette,
|
||
title={Malware analyst's cookbook and DVD: tools and techniques for fighting malicious code},
|
||
author={Ligh, Michael and Adair, Steven and Hartstein, Blake and Richard, Matthew},
|
||
year={2010},
|
||
publisher={Wiley Publishing},
|
||
isbn = {978-0-470-61303-0},
|
||
note = {Une référence pour s'initier à l'analyse de codes malveillants},
|
||
keyword={Cybersécurité, Malware, Hacking}}
|
||
|
||
@book{étiquette,
|
||
author = {Allsopp, Will},
|
||
title = {Advanced penetration testing},
|
||
year = {2017},
|
||
publisher= {Wiley},
|
||
isbn = {978-1-119-36786-0},
|
||
note = {Même si les techniques de ce livre sont connues, il constitue une vue intéressante sur les potentiels vecteurs d'infection et d'ingénierie sociale pouvant être mis en oeuvre par des attaquants.},
|
||
keyword={Cybersécurité, Hacking}}
|
||
|
||
@book{étiquette,
|
||
title = {La longue traine},
|
||
author = {Anderson, Chris},
|
||
year={2012},
|
||
publisher={Pearson},
|
||
keyword = {économie},
|
||
note = {Livre un brin prophétique devenu un classique. Chris Anderson, rédacteur en chef de Wired, nous démontre comment Internet modifie en profondeur les mécanismes de l'économie.}}
|
||
|
||
@book{andress2012basics,
|
||
title={The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice},
|
||
author={Andress, Jason and Winterfeld, Steve},
|
||
year={2012},
|
||
note = {Un livre ancien qui a le mérite de présenter les bases de la construction des doctrines de cyberdéfense. L'ouvrage replace le concept de cyberguerre dans le corpus stratégique et la continuité des concepts militaires},
|
||
keyword = {cyberdéfense, stratégie, doctrine, cyberwarfare},
|
||
publisher={Newnes},
|
||
note = {disponible prêt adhérents M82}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Arpagian, Nicolas},
|
||
title = {Frontières.com},
|
||
year = {2022},
|
||
isbn = {103292134X},
|
||
publisher= {L'Observatoire},
|
||
Keyword={Géopolitique},
|
||
note = {disponible prêt adhérents M82. Cet ouvrage didactique est un excellent point d'entrée dans la réflexion sur les enjeux de pouvoir dans le cyberespace. Des "nouvelles frontières" qui se dessinent au relations entre Etats et grands groupes de la tech, l'auteur explore les équilibres qui naissent.}}
|
||
|
||
@book{étiquette,
|
||
author = {Arpagian, Nicolas},
|
||
title = {La cyberguerre, la guerre numérique a commencé},
|
||
year = {2009},
|
||
publisher= {Vuibert},
|
||
Keyword={Cyberguerre}}
|
||
|
||
@book{étiquette,
|
||
author = {Arpagian, Nicolas},
|
||
title = {La cybersécurité},
|
||
year = {2022},
|
||
publisher= {PUF},
|
||
Keyword={Cybersécurité},
|
||
note = {disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Arpagian, Nicolas},
|
||
title = {Innocence à crédit},
|
||
year = {2023},
|
||
publisher= {Mareuil Editions},
|
||
Keyword={roman},
|
||
note = {disponible prêt adhérents M82}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Arquilla, John},
|
||
title = {Bitskrieg, the new challenge of cyberwarfare},
|
||
year = {2021},
|
||
publisher = {Polity},
|
||
note = {Livre qui revient sur 20 ans d'évolution du concept de cyberguerre sans vraiment changer la ligne défendue par l'auteur depuis son article "Cyberwar is coming"},
|
||
note={disponible prêt adhérents M82},
|
||
Keyword={Cyberguerre, Géopolitique, cyberwar}}
|
||
|
||
@book{étiquette,
|
||
author = {Arquilla, John and Ronfeldt, David},
|
||
title = {Networks and Netwars: the Future of Terror, Crime and Militancy},
|
||
year = {2001},
|
||
publisher= {Rand},
|
||
Keyword={Cyberguerre}}
|
||
|
||
@book{étiquette,
|
||
author = {Article 19},
|
||
title = {Connaissez-vous vraiment internet ? Protocoles, sécurité, censure, gouvernance...},
|
||
year = {2022},
|
||
publisher= {Éditions Eyrolles},
|
||
isbn = {978-2-416-00727-9}}
|
||
|
||
@book{étiquette,
|
||
author = {Arutunyan, Anna},
|
||
title = {Hybrid Warriors, Proxies, Freelancers and Moscow's Struggle for Ukraine},
|
||
year = {2022},
|
||
publisher= {Hurst Publisher},
|
||
Keyword={Cyberguerre, Russie, Ukraine, Guerre Hybride}}
|
||
|
||
@book{étiquette,
|
||
title={Cybersecurity in China: the next wave},
|
||
author={Austin, Greg},
|
||
year={2018},
|
||
publisher={Springer},
|
||
keyword={Cybersécurité, Chine, Géopolitique}}
|
||
|
||
@comment{B}
|
||
|
||
@book{étiquette,
|
||
title={Le désenchantement de l'internet. Désinformation, rumeur et propagande},
|
||
author={Badouard, Romain},
|
||
year={2017},
|
||
publisher={FYP {\'e}ditions},
|
||
note = {Désinformation},
|
||
keyword = {Désinformation, Propagande}}
|
||
|
||
@book{étiquette,
|
||
title={Network propaganda: Manipulation, disinformation, and radicalization in American politics},
|
||
author={Benkler, Yochai and Faris, Robert and Roberts, Hal},
|
||
year={2018},
|
||
publisher={Oxford University Press},
|
||
keyword={Désinformation, Propagande}}
|
||
|
||
@book{étiquette,
|
||
author = {Billois, Gérôme and Cougot, Nicolas},
|
||
title = {Cyberattaques, les dessous d'une menace mondiale},
|
||
year = {2022},
|
||
publisher= {Hachette},
|
||
isbn = {978-2-915547-66-5},
|
||
note= {La qualité d’un consultant réside souvent dans sa capacité à expliquer des choses complexes de manière accessible. C’est justement ce qu’arrive à faire Gérôme Billois avec cet ouvrage complet et au design soigné. Vous y trouverez des récits sur les différents types de cyberattaques, des explications sur les enjeux de la cyber sécurité pour les états, les entreprises et les individus ainsi que des portraits de professionnels représentant la grande diversité des métiers. Ce libre est le B.A.-BA pour tout nouvel entrant dans le domaine de la cybersécurité et notamment ceux qui se destinent à une carrière dans le conseil.},
|
||
Keyword={Cyberguerre, Géopolitique}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Bittman, Ladistlav},
|
||
title = {The Deception Game},
|
||
year = {1981},
|
||
publisher= {Ballantine Books},
|
||
Keyword={Renseignement, Russie}}
|
||
|
||
@book{étiquette,
|
||
author = {Bittman, Ladistlav},
|
||
title = {The KGB and Soviet Disinformation: An Insider's View},
|
||
year = {1985},
|
||
publisher= {Brassey's Inc},
|
||
Keyword={Renseignement, Désinformation, Russie}}
|
||
|
||
@book{étiquette,
|
||
author = {Blondeau, Olivier},
|
||
title = {Devenir média. L'activisme sur Internet, entre défection et expérimentation},
|
||
year = {2007},
|
||
publisher = {Édition Amsterdam},
|
||
isbn = {978-2-915547-66-5},
|
||
Keyword={Guerre de l'information}}
|
||
|
||
@book{étiquette,
|
||
author = {Blondeau, Olivier and Latrive, Florent},
|
||
title = {Libres enfants du savoir numérique. Anthologie du libre},
|
||
year = {2000},
|
||
publisher = {Éditions de L'Éclat},
|
||
note = {Libre},
|
||
isbn = {978-2-84162-043-2},
|
||
keyword = {logiciel libre, informatique}}
|
||
|
||
@book{étiquette,
|
||
author = {Bortzmeyer, Stéphane},
|
||
title = {Cyberstructure, l'Internet un espace politique},
|
||
year = {2018},
|
||
publisher= {C\&F Editions},
|
||
Keyword={Géopolitique},
|
||
note={Écrit par un expert des questions d’internet et travaillant pour l’AFNIC (organisme gestionnaire du registre des noms de domaine en .fr), ce livre se divise en deux parties. La première se concentre sur le fonctionnement d’internet : les protocoles, les applications web, les organismes de gouvernance et quelques sujets particuliers tels que les crypto monnaies. La deuxième partie est dédiée à une réflexion sur les aspects politiques d’internet : doit-on limiter le chiffrement ? Les concepts de sécurité et vie privée sont-ils opposés ? Quelles technologies choisir pour l’internet de demain ?}}
|
||
|
||
@book{étiquette,
|
||
author = {Boullier, Dominique},
|
||
title = {Propagations. Un nouveau paradigme pour les sciences sociales},
|
||
year ={2023},
|
||
publisher = {Armand Colin, coll. « U »},
|
||
isbn = {978-2-20062-990-8},
|
||
keyword = {réseaux sociaux, virus, propagation, désinformation},
|
||
note = {Pour une présentation de l'ouvrage, voir Antoine Rolland, « Dominique Boullier. Propagations. Un nouveau paradigme pour les sciences sociales », Statistique et société [En ligne], 12 | 1 | 2024, mis en ligne le 19 juillet 2024, consulté le 09 août 2024. URL : http://journals.openedition.org/statsoc/1943 ; DOI : https://doi.org/10.4000/122om
|
||
On signale également l'excellent podcast "Le code a changé" qui présente cet ouvrage avec interview de l'auteur : https://www.radiofrance.fr/franceinter/podcasts/le-code-a-change/l-ere-des-propagations-9501183}}
|
||
|
||
@book{étiquette,
|
||
author = {Boyer, Bertrand},
|
||
title = {Guérilla 2.0, guerres irrégulières dans le cyberespace},
|
||
year = {2020},
|
||
publisher= {École de Guerre},
|
||
keyword={Guerre de l'information, Cyberguerre, Guerre Hybride}}
|
||
|
||
@book{étiquette,
|
||
author = {Boyer, Bertrand},
|
||
title = {Cyberstratégie, l'art de la guerre numérique},
|
||
year = {2012},
|
||
publisher= {NUVIS},
|
||
keyword={Cyberguerre, Cyberstratégie},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Boyer, Bertrand},
|
||
title = {Cybertactique, conduire la guerre numérique},
|
||
year = {2014},
|
||
publisher= {NUVIS},
|
||
keyword={Cyberguerre, Cyberstratégie},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Boyer, Bertrand},
|
||
title = {Dictionnaire de la Cybersécurité et des réseaux},
|
||
year = {2015},
|
||
publisher = {NUVIS},
|
||
keyword = {Dictionnaire},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
title={Weaponized words: The strategic role of persuasion in violent radicalization and counter-radicalization},
|
||
author={Braddock, Kurt},
|
||
year={2020},
|
||
publisher={Cambridge University Press},
|
||
keyword = {cyberstratégie}}
|
||
|
||
@book{étiquette,
|
||
title={The decision to attack: military and intelligence cyber decision-making},
|
||
author={Brantly, Aaron Franklin},
|
||
volume={5},
|
||
year={2016},
|
||
publisher={University of Georgia Press},
|
||
Keyword={Renseignement, Cyberguerre, Stratégie, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Brenner,Susan W},
|
||
title = {Cyberthreats, the emerging fault line of the Nation State},
|
||
year = {2009},
|
||
publisher= {Oxford University Press},
|
||
keyword={Cyberguerre, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Bronner, Gérald},
|
||
title = {Apocalypse cognitive},
|
||
year = {2021},
|
||
publisher = {PUF},
|
||
note = {},
|
||
isbn = {2130733042},
|
||
keyword={Guerre de l'information, Désinformation}}
|
||
|
||
@book{étiquette,
|
||
author = {Brunton, Finn and Nissenbaum, Helen},
|
||
title = {Obfuscation: A User's Guide for Privacy and Protest},
|
||
year = {2015},
|
||
isbn = {0262029731},
|
||
publisher = {The MIT Press},
|
||
keyword={Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Bryant, William D},
|
||
title = {International Conflict and Cyberspace superiority},
|
||
year = {2016},
|
||
publisher= {Routledge},
|
||
keyword={Géopolitique, Cyberguerre}}
|
||
|
||
@book{étiquette,
|
||
author = {Buchanan, Ben},
|
||
title = {The Cybersecurity Dilemna: Hacking, Trust and Fear Between Nations},
|
||
year={2016},
|
||
publisher={Oxford University Press},
|
||
keyword={Cyberguerre, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Buchanan, Ben},
|
||
title = {The Hacker and the state: The New Normal of Geopolitics},
|
||
year = {2020},
|
||
publisher= {Harvard University Press},
|
||
keyword={Géopolitique, cyberstratégie, Cyberguerre},
|
||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}},
|
||
|
||
@book{étiquette,
|
||
author = {Buchan, Russell},
|
||
title = {Cyberespionage and international law},
|
||
year = {2018},
|
||
publisher= {Hart Publishing},
|
||
keyword={Renseignement, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Bulinge, Franck},
|
||
title = {De l’espionnage au renseignement},
|
||
year = {2012},
|
||
publisher= {Vuibert},
|
||
isbn = {978-2-311-00658-2},
|
||
keyword={Renseignement}}
|
||
|
||
|
||
@comment{C}
|
||
|
||
@book{campbell2001surveillance,
|
||
title={Surveillance {\'e}lectronique plan{\'e}taire},
|
||
author={Campbell, Duncan},
|
||
year={2001},
|
||
publisher={{\'E}ditions Allia},
|
||
url={https://www.duncancampbell.org/content/surveillance-electronique-plan%C3%A9taire},
|
||
keyword={Echelon, Renseignement, Surveillance}}
|
||
|
||
|
||
@book{étiquette,
|
||
title={A quoi rêvent les algorithmes : nos vies à l’heure des Big data},
|
||
author={Cardon, Dominique},
|
||
year={2015},
|
||
publisher={Média Diffusion},
|
||
keyword={Humanités numériques}}
|
||
|
||
@book{étiquette,
|
||
author = {Carr, Jeffrey},
|
||
title = {Inside Cyber Warfare, mapping the cyber underworld},
|
||
year = {2009},
|
||
publisher = {O'Reilly},
|
||
keyword={Cyberguerre, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Carrier, Brian},
|
||
title = {File System Forensic Analysis},
|
||
year = {2005},
|
||
publisher = {Addison-Wesley Professional},
|
||
isbn = {0321268172},
|
||
keyword = {analyse, forensic},
|
||
note = {Un must have dans le domaine de l'analyse forensic}}
|
||
|
||
@book{étiquette,
|
||
author = {Cattaruzza, Amaël},
|
||
title = {Géopolitique des données numériques. Pouvoirs et confilts à l'heure du Big Data},
|
||
year = {2019},
|
||
publisher= {éditions le Cavalier bleu}}
|
||
|
||
@book{étiquette,
|
||
author = {Cattaruzza, Amaël and Danet, Didier and Taillat, Stéphane},
|
||
title = {La cyberféfense, politique de l'espace numérique},
|
||
year = {2023},
|
||
publisher= {Armand Colin},
|
||
note= {2ème édition. Mise à jour en 2023. Cet ouvrage collectif analyse la cyberdéfense sous le prisme des relations internationales. Les auteurs présentent l’état des connaissances scientifiques dans des sujets variés tel que le concept de guerre cyber, les enjeux de souveraineté numérique, le positionnement des grands pays cyber (États-Unis, Chine, Russie), le droit international appliqué au numérique… Plus théorique que pratique, cet ouvrage est un indispensable pour les étudiants ayant un projet de mémoire en lien avec la cyberdéfense.},
|
||
note={disponible prêt adhérents M82},
|
||
keyword={Cyberdéfense, Géopolitique, Humanités numériques}}
|
||
|
||
@book{étiquette,
|
||
author = {Charon, Paul and Jeangène Vimer, Jean-Baptiste},
|
||
title = {Les opérations d'influence chinoises},
|
||
year = {2024},
|
||
publisher = {Equateur Documents},
|
||
isbn = {978-2-3828-4249-2},
|
||
note = {disponible prêt adhérents M82},
|
||
keyword={Désinformation, Chine, influence, Opérations}}
|
||
|
||
@book{étiquette,
|
||
author = {Chavalarias, David},
|
||
title = {Toxic Data},
|
||
year = {2022},
|
||
publisher = {Flammarion},
|
||
isbn = {978-2-08-027494-6},
|
||
note = {disponible prêt adhérents M82},
|
||
keyword={Désinformation}}
|
||
|
||
@booK{étiquette,
|
||
author = {Chesney, Robert and Smeets, Max},
|
||
title = {Deter, Disrupt, or Deceive, Assessing Cyber Conflict as an Intelligence Contest},
|
||
year = {2023},
|
||
publisher = {Georgetown University Press},
|
||
note = {Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.},
|
||
isbn = {9781647123307},
|
||
keyword = {Cyberwar, Intelligence}}
|
||
|
||
@book{étiquette,
|
||
title={Influence et manipulation: L'art de la persuasion},
|
||
author={Cialdini, Robert B},
|
||
year={2021},
|
||
publisher={First},
|
||
keywords = {Renseignement, Psychologie sociale},
|
||
note = {Parfait pour apprendre les techniques que les médias/marketing/commerciaux utilisent tous les jours. Un point de départ pour la conduite d’opération HUMINT}}
|
||
|
||
@book{étiquette,
|
||
author = {Clancy, Tom},
|
||
title = {Cybermenace},
|
||
year = {2013},
|
||
publisher= {Albin Michel},
|
||
keyword={Cyberguerre, Roman}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Clarke, Richard and Knake, Robert},
|
||
title = {Cyberwar: the next Threat to National Security and what to do about it},
|
||
year = {2010},
|
||
publisher= {HarperCollins},
|
||
keyword={Cyberguerre, Géopolitique}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Clough, Jonathan},
|
||
title = {Principles of cybercrime},
|
||
year = {2015},
|
||
publisher= {Cambridge University Press},
|
||
ISBN={9781139540803},
|
||
keyword={Cybercriminalité}}
|
||
|
||
@book{étiquette,
|
||
author={Coelho, Ophélie},
|
||
titel={Géopolitique du numérique : l'impérialisme à pas de géants},
|
||
publisher={Editions de l'Atelier},
|
||
year={2023},
|
||
ISBN={2708254022},
|
||
keywords={géopolitique, GAFAM},
|
||
note={},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author={Colon, David},
|
||
title={La guerre de l'information},
|
||
year={2023},
|
||
publisher={Tallandier},
|
||
keyword={guerre de l'information, cyberguerre, propagande},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author={Cristiano, Fabio and Broeders, Dennis and Delerue, François and Douzet, Frédérick and Géry, Aude},
|
||
title={Intelligence artificielle et conflit international dans le cyberespace},
|
||
year={2023},
|
||
publisher={Taylor \& Francis},
|
||
keywords={intelligence artificielle}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Choucri, Nazli and Clark, David D.},
|
||
title = {International Relations in the Cyber Age. The Co-Evolution Dilemma},
|
||
year = {2019},
|
||
publisher= {The MIT Press},
|
||
ISBN={9780262038911},
|
||
keyword={Cybercriminalité}}
|
||
|
||
|
||
@comment{D}
|
||
|
||
@book{étiquette,
|
||
author = {Dahj, Jean Nestor},
|
||
title = {Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense},
|
||
year = {2022},
|
||
publisher= {Packt Publishing},
|
||
isbn = {978-1800209404},
|
||
keyword={Cybersécurité, Renseignement}}
|
||
|
||
@book{étiquette,
|
||
author={Damasio, Alain},
|
||
title={Vallée du sillicium},
|
||
year={2024},
|
||
publisher={Seuil},
|
||
isbn={9782021558746},
|
||
keyword={essai, société, technologie},
|
||
note={Le célébre écrivain de SF français se retrouve plongé dans l'univer de la sillicon vallée pour un voyage initiatique au coeur des nouveaux centres techno-culturels de nitre société numérique.Composé de sept chroniques littéraires et d’une nouvelle de science-fiction inédite, Vallée du silicium déploie un essai technopoétique troué par des visions qui entrelacent fascination, nostalgie et espoir. Du siège d’Apple aux quartiers dévastés par la drogue, de rencontres en portraits, l’auteur interroge tour à tour la prolifération des IA, l’art de coder et les métavers, les voitures autonomes ou l’avenir de nos corps, pour en dégager une lecture politique de l’époque et nous faire pressentir ces vies étranges qui nous attendent. M82 recommande !}}
|
||
|
||
@book{étiquette,
|
||
title={Cyber threat intelligence},
|
||
author={Dehghantanha, Ali and Conti, Mauro and Dargahi, Tooska},
|
||
year={2018},
|
||
publisher={Springer},
|
||
keyword = {Cyber Threat Intelligence, CTI, renseignement},
|
||
note = {Une bonne référence pour commencer dans la CTI}}
|
||
|
||
@book{étiquette,
|
||
author={DeNardis, Laura},
|
||
title={The Internet in everything},
|
||
year={2020},
|
||
publisher={Yale University Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Delerue, François},
|
||
title = {Cyberoperations and International Law},
|
||
year = {2020},
|
||
publisher= {Cambridge University Press},
|
||
keyword={Cyberdéfense, Cyberguerre, Relations internationales, Droit }}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Diogénes, Yuri and Ozkaya, Erdal},
|
||
title = {Cybersecurity. Attack and Defense Strategies: Counter modern threats and emply state of the art tools and techniques to protect your organization},
|
||
year = {2019},
|
||
publisher= {Packt Publishing},
|
||
keyword = {Cybersécurité, cybersecurity}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dosse, Stéphane and Kempf, Olivier},
|
||
title = {Stratégie dans le cyberespace},
|
||
year = {2011},
|
||
publisher= {L'esprit du livre},
|
||
keyword={Cyberstratégie, Cyberdéfense}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dosse, Stéphane and Kempf, Olivier and Malis, Christian},
|
||
title = {Cyberespace, nouveau domaine de la pensée stratégique},
|
||
year = {2013},
|
||
publisher= {Économica},
|
||
keyword={Cyberdéfense, Cyberstratégie},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dosse, Stéphane and Bonnemaison, Aymeric},
|
||
title = {Attention cyber ! Vers le combat cyber-electronique},
|
||
year = {2014},
|
||
publisher= {Économica},
|
||
keyword={Cyberdéfense, Cyberguerre},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dykstra, Josiah and Spafford, Eugene and Metcalf, Leigh},
|
||
title = {Cybersecurity myths and Misconceptions},
|
||
year = {2023},
|
||
publisher= {Pearson Education},
|
||
keyword={Cybersécurité}}
|
||
|
||
|
||
@comment{E}
|
||
|
||
@book{étiquette,
|
||
author = {Egloff, Florian J.},
|
||
title = {Semi-State Actors in Cybersecurity},
|
||
year = {2022},
|
||
publisher = {Oxford University Press Inc},
|
||
isbn = {9780197579275},
|
||
keyword={Cybersécurité, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Elsberg, Marc},
|
||
title = {Black-out : demain il sera trop tard},
|
||
year = {2016},
|
||
publisher= {LGF},
|
||
ISBN= {9782253098690 },
|
||
note= {roman, anticipation},
|
||
keyword={Roman}}
|
||
|
||
@book{étiquette,
|
||
author={Engebretson, Patrick},
|
||
title = {Les bases du Hacking},
|
||
year = {2017},
|
||
publisher = {Pearson},
|
||
ISBN = {2744066958},
|
||
note = {ouvrage technique},
|
||
keyword = {Hacking},
|
||
note={Vous souhaitez concrètement comprendre comment se déroule une cyberattaque ? Alors ce guide est fait pour vous ! Patrick Engebretson, professeur américain en sécurité informatique, va vous présenter chaque étape d’une attaque (reconnaissance, scan, exploitation, maintien d’accès) à l’aide d’un cas d’étude. Grâce à ses conseils, aux outils gratuits et aux lignes de commande présentées vous serez en mesure de refaire l’attaque depuis votre ordinateur personnel. Bien que ce livre comporte des éléments techniques, il reste accessible dans sa grande majorité à tous.}}
|
||
|
||
@comment{F}
|
||
|
||
@book{étiquette,
|
||
author = {Faillet, Caroline},
|
||
title = {L'art de la guerre digitale, survivre et dominer à l'ère du numérique},
|
||
year = {2016},
|
||
publisher = {Dunod},
|
||
isbn = {9782100748280},
|
||
keyword={Cyberguerre, Cyberstratégie, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author={Ferguson, Niels and Schneier, Bruce and Kohno, Tadayoshi},
|
||
title = {Cryptography Engineering: design principles and practical applications},
|
||
year = {2011},
|
||
publisher= {John Wiley \& Sons}}
|
||
|
||
@book{étiquette,
|
||
author = {Foster, James JF},
|
||
title = {Digital influence mercenaries, profits and power through information warfare},
|
||
year = {2022},
|
||
publisher = {US Naval Institute Press},
|
||
note = {Étude sur les acteurs d'influence privés avec une présentation de leurs méthodes et effets sur la population ciblée},
|
||
isbn = {9781682477229},
|
||
keyword={Cyberguerre, Guerre Hybride, Guerre de l'information}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Fourastier, Yannick and Pietre-Cambacedes, Ludovic},
|
||
title = {Cybersécurité des installations industrielles : défendre ses systèmes numériques},
|
||
year = {2015},
|
||
publisher = {Cépaduès},
|
||
note = {Destiné aux acteurs de la sécurité informatique dans le domaine des systèmes industriels},
|
||
isbn = {9782364931688},
|
||
keyword={Cybersécurité, systèmes industriels, SCADA}}
|
||
|
||
@book{fourquet2024dictature,
|
||
title={La dictature des algorithmes: Une transition num{\'e}rique d{\'e}mocratique est possible},
|
||
author={Fourquet, Jean-Lou and others},
|
||
year={2024},
|
||
publisher={Tallandier},
|
||
keyword={algorithmes, politique, transition numérique}}
|
||
|
||
@book{cukier2022framers,
|
||
title={Framers: Human advantage in an age of technology and turmoil},
|
||
author={Cukier, Kenneth and Mayer-Sch{\"o}nberger, Viktor and de V{\'e}ricourt, Francis},
|
||
year={2022},
|
||
publisher={Penguin}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Freyssinet, Eric},
|
||
title = {La cybercriminalité en mouvement},
|
||
year = {2012},
|
||
publisher = {Hermes Science Publications},
|
||
isbn = {274623288X},
|
||
keyword={Cybercriminalité, Cybersécurité}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Futter, Andrew},
|
||
title = {Hacking The Bomb: Cyber Threats and Nuclear Weapons},
|
||
year = {2018},
|
||
publisher = {Georgetown University Press},
|
||
isbn = {9781626165649 }}
|
||
|
||
|
||
@comment{G}
|
||
|
||
@book{étiquette,
|
||
author = {Galeotti, Mark},
|
||
title = {The Weaponisation of Everything: A Field Guide to the New Way of War},
|
||
year = {2022},
|
||
publisher= {Yale University Press}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Gastineau, Pierre and Vasset, Philippe},
|
||
title = {Armes de déstabilisation massive. Enquête sur le business des fuites de données},
|
||
year = {2017},
|
||
publisher= {Fayard},
|
||
note= {Enquête sur les groupes d'attaquants et entreprises privées spécialisées dans l'exfiltration de données et la publication ou revente de celles-ci à des fins lucratives ou de déstabilisation},
|
||
keywords = {cybercriminalité,data,économie}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Gergorin, Jean-Louis and Isacc-Dognin, Léo},
|
||
title = {Cyber, la guerre permanente},
|
||
year = {2018},
|
||
publisher= {Les éditions du Cerf},
|
||
keywords = {cyberdéfense, cyberguerre, cyberwar}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Greenberg, Andy},
|
||
title = {Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers},
|
||
year = {2019},
|
||
isbn = {0385544405},
|
||
publisher= {Anchor},
|
||
keywords = {Sandworm, hacking, cyberwar, Russie}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Greenberg, Andy},
|
||
title = {Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency},
|
||
year = {2022},
|
||
publisher = {Doubleday},
|
||
note = {Livre d'enquête consacré à l'utilisation des crypto-monnaies par des groupes cyber-criminels},
|
||
isbn = {978-0385548090},
|
||
keywords = {cryptomonnaies, cybercriminalité}}
|
||
|
||
@book{étiquette,
|
||
author = {Greenberg, Andy},
|
||
title = {Les criminels de la cryptomonnaie - Traque au coeur du Dark Web},
|
||
year = {2022},
|
||
publisher = {Saint-Simon},
|
||
note = {Traduction française par Henri Froment du livre "Tracers in the Dark"},
|
||
isbn = {978-2374350363}}
|
||
|
||
@book{étiquette,
|
||
author = {Roger, Grimes},
|
||
title = {Hacking the Hacker: Learn From the Experts Who Take Down Hackers},
|
||
year = {2017},
|
||
publisher = {Wiley},
|
||
note = {},
|
||
isbn = {9781119396215},
|
||
keyword = {Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Goldstein, Guy-Philippe},
|
||
title = {Babel minute zéro},
|
||
year = {2010},
|
||
isbn = {978-2070427505},
|
||
publisher= {Folio Policier},
|
||
note = {roman}}
|
||
|
||
@book{étiquette,
|
||
author = {Gottschall, Jonathan},
|
||
title = {The Storytelling Animal: How Stories Make Us Human},
|
||
year = {2013},
|
||
publisher= {Houghton Mifflin Harcourt},
|
||
keyword={InfoWar, Influence},
|
||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}}
|
||
|
||
@book{étiquette,
|
||
title = {Psychologie la manipulation et la soumission},
|
||
publisher = {Dunod},
|
||
author = {Guéguen, Nicolas},
|
||
year = {2021},
|
||
keywords = {Renseignement, recherche universitaire, Psychologie sociale},
|
||
note = {Une recherche universitaire sur la manipulation et la soumission un bon follow up a “Petit traité de manipulation à l'usage des honnêtes gens”}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Guisnel, Jean},
|
||
title = {Guerres dans le cyberespace : services secrets et Internet},
|
||
year = {1995},
|
||
publisher = {La Découverte},
|
||
note = {Un des premiers livres français d'investigation sur le monde du hacking, particulièrement sur les groupes US Legion of Doom (LoD) et Masters of Deception (MoD)},
|
||
isbn = {978-2707125026}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Guyaux, Jean},
|
||
title = {L'espion des sciences : les arcanes et les arnaques scientifiques du contre-espionnage},
|
||
year = {2002},
|
||
publisher = {Flammarion},
|
||
isbn = {2-08-068227-X},
|
||
note = {Le général Jean Guyaux a été détaché comme conseiller scientifique à la direction de la Surveillance du territoire (DST) de 1984 et 1995. Ces mémoires comprennent une partie parlant de la DST face à l'émergence de la piraterie informatique et la surveillance d'internshet.}}
|
||
|
||
|
||
@comment{H}
|
||
|
||
@book{étiquette,
|
||
author = {Hadjadji, Nastasia and Tesquet, Olivier},
|
||
title = {Apocalypse Nerds, comment les technos fascistes ont pris le pouvoir},
|
||
year = {2025},
|
||
publisher = {Editions Divergences},
|
||
isbn = {9791097088873},
|
||
url = {https://www.editionsdivergences.com/livre/apocalypse-nerds}}
|
||
|
||
@book{étiquette,
|
||
author = {Harrel, Yannick},
|
||
title = {La cyberstratégie russe},
|
||
year = {2013},
|
||
publisher = {NUVIS},
|
||
isbn = {9782363670519}}
|
||
|
||
@book{étiquette,
|
||
author = {Hecker, Marc and Rid, Thomas},
|
||
title = {War 2.0: Irregular Warfare in the information Age},
|
||
year = {2009},
|
||
publisher= {Praeger}}
|
||
|
||
@book{étiquette,
|
||
author = {Hémez, Rémy},
|
||
title = {Les opérations de déception, ruse et stratagèmes de guerre},
|
||
year = {2022},
|
||
publisher = {Perrin},
|
||
keyword = {déception, histoire},
|
||
note = {Ouvrage un peu éloigné de la cyber mais on en parle quand même dans la partie sur la déception aujourd'hui, mais très intétessant et très complet sur l'histoire des ruses de guerre. Toujours utile en cybersécurité également.},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Henning, Lahmann},
|
||
title = {Unilateral Remedies to Cyber Operations},
|
||
year = {2020},
|
||
publisher = {Cambridge University Press},
|
||
isbn = {9781108807050}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Hennion, Romain and Makhlouf, Anissa},
|
||
title = {La cybersécurité},
|
||
year = {2018},
|
||
publisher= {Eyrolles}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Henrotin, Joseph},
|
||
title = {L'art de la guerre à l'age des réseaux},
|
||
year = {2017},
|
||
publisher= {ISTE éditions}}
|
||
|
||
@book{étiquette,
|
||
title={Techno-gu{\'e}rilla et guerre hybride: le pire des deux mondes},
|
||
author={Henrotin, Joseph},
|
||
year={2014},
|
||
publisher={Nuvis}}
|
||
|
||
@book{étiquette,
|
||
title={Intelligence Services in the Information Age},
|
||
author={Herman, Michael},
|
||
year={2002},
|
||
ISBN = {9780714681962},
|
||
publisher={Routledge},
|
||
keyword={Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
title={Psychology of Intelligence Analysis},
|
||
author={Heuer, Richards J.},
|
||
year={1999},
|
||
publisher={Center for the Study of Intelligence},
|
||
keyword={Analyse, psychologie, renseignement},
|
||
note={Un indispensable pour tout analyste traitant de la donnée en vue de fournir du renseignement}}
|
||
|
||
@book{étiquette,
|
||
title={How to measure anything in cybersecurity risk},
|
||
author={Hubbard, Douglas W and Seiersen, Richard},
|
||
year={2023},
|
||
publisher={John Wiley \& Sons},
|
||
keyword={Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Huyghe, François-Bernard and Kempf, Olivier and Mazzucchi, Nicolas},
|
||
title = {Gagner les cyberconflits, au-delà du technique},
|
||
year = {2015},
|
||
publisher= {Economica},
|
||
keyword={Cyberguerre},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Huyghe, François-Bernard},
|
||
title = {La désinformation, les armes du faux},
|
||
year = {2016},
|
||
ISBN = {2200601360},
|
||
publisher = {Armand Colin}},
|
||
keyword={désinformaiton, propagande, réseaux sociaux, InfoWar}}
|
||
|
||
@book{étiquette,
|
||
author = {Hypp{\"o}nen, Mikko},
|
||
title = {If it's smart, it's vulnerable},
|
||
year = {2022},
|
||
publisher = {Wiley},
|
||
isbn = {1119895189}}
|
||
|
||
|
||
@comment{I}
|
||
|
||
|
||
@comment{J}
|
||
|
||
@book{étiquette,
|
||
title={Cyberwar: how Russian hackers and trolls helped elect a president: what we don't, can't, and do know},
|
||
author={Jamieson, Kathleen Hall},
|
||
year={2020},
|
||
publisher={Oxford University Press}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Janczewski, Lech and Colarik, Andrew},
|
||
title = {Cyber warfare and Cyberterrorism},
|
||
year = {2007},
|
||
publisher= {IGI Global},
|
||
keyword={CyberWar, Terrorisme, cyberguerre}}
|
||
|
||
|
||
@book{étiquette,
|
||
author= {Jankowicz, Nina},
|
||
title = {How to lose the Information War: Russia, Fake News and the Future of Conflict},
|
||
year = {2020},
|
||
publisher= {Bloomsbury Publishing},
|
||
keyword={InfoWar, guerre de l'information, réseaux sociaux}}
|
||
|
||
@book{étiquette,
|
||
author = {Jean, Aurélie},
|
||
title = {De l'autre côté de la machine},
|
||
year = {2019},
|
||
publisher = {L'Observatoire},
|
||
keyword = {algorithme, sociologie, intelligence artificielle},
|
||
note = {Un essai particulièrement accessible qui propose une réflexion sur comment progressivement les algorithmes ont boulversé notre quotidien},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{joule1987petit,
|
||
title={Petit trait{\'e} de manipulation {\`a} l'usage des honn{\^e}tes gens},
|
||
author={Joule, Robert-Vincent and Beauvois, Jean-L{\'e}on and Deschamps, Jean Claude},
|
||
year={1987},
|
||
isbn = {978-2-7061-1885-2},
|
||
keywords = {Renseignement, interviewing, personal development, Psychologie sociale},
|
||
publisher={Presses universitaires de Grenoble Grenoble}}
|
||
|
||
@comment{K}
|
||
|
||
@book{étiquette,
|
||
title={Targeted},
|
||
author={Kaiser, Brittany},
|
||
year={2019},
|
||
publisher={Harper Collins Publishers}}
|
||
|
||
@book{étiquette,
|
||
author = {Kaplan, Fred},
|
||
title = {Dark Territory: The Secret History of Cyber War},
|
||
year = {2016},
|
||
publisher= {Simon and Schuster}}
|
||
|
||
@book{étiquette,
|
||
author = {Kempf, Olivier},
|
||
title = {Introduction à la cyberstratégie},
|
||
year = {2012},
|
||
publisher= {Economica},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Kitchin, Rob},
|
||
title = {The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences},
|
||
year = {2014},
|
||
publisher = {SAGE},
|
||
isbn = {978-1-4739-0826-0}}
|
||
|
||
@book{étiquette,
|
||
author = {Klimburg, Alexander},
|
||
title = {The Darkening Web: The War for Cyberspace},
|
||
year = {2018},
|
||
publisher= {Penguin Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Kramer, Franklin and Starr, Stuart and Wentz, Larry},
|
||
title = {Cyberpower and National Security. National Defense},
|
||
year = {2009},
|
||
publisher= {Georgetown University Press}}
|
||
|
||
@comment{L}
|
||
|
||
@book{étiquette,
|
||
author = {Lafourcade, Pascal and Onete, Cristina},
|
||
title = {20 énigmes ludiques pour se perfectionner en cryptographie},
|
||
year = {2023},
|
||
publisher = {Dunod},
|
||
keyword = {cryptographie},
|
||
note = {à écouter, l'épisode de NoLimit Sécu : https://www.nolimitsecu.fr/20-enigmes-ludiques-pour-se-perfectionner-en-cryptographie/},
|
||
isbn = {9782100855117}}
|
||
|
||
@book{lamdan2022data,
|
||
title={Data cartels: The companies that control and monopolize our information},
|
||
author={Lamdan, Sarah},
|
||
year={2022},
|
||
publisher={Stanford University Press}}
|
||
|
||
@book{etiquette,
|
||
author = {Lamy, Stéphanie},
|
||
title = {Agora toxica},
|
||
year = {2022},
|
||
publisher = {éditions du détour},
|
||
isbn = {979-10-97079-87-1}}
|
||
|
||
@book{étiquette,
|
||
title={Conflits, crimes et r{\'e}gulations dans le cyberespace},
|
||
author={Laurent, S{\'e}bastien-Yves},
|
||
volume={4},
|
||
year={2021},
|
||
keyword={cybersécurité, cyberstratégie, droit, géopolitique},
|
||
note={prix du livre cyber 2022},
|
||
isbn={1784057878},
|
||
publisher={ISTE Group}}
|
||
|
||
@book{étiquette,
|
||
title={Louis Pouzin, l'un des péres de l'internet},
|
||
author={Lebrument, Chantal et Soyez, Fabien},
|
||
year={2018},
|
||
publisher={Economica},
|
||
isbn={9782717870473},
|
||
note={Un éclairage sur un français à l'origine de l'Internet, une figure des débuts des réseaux},
|
||
keyword={Internet}}
|
||
|
||
@book{étiquette,
|
||
author = {Le Dez, Arnaud},
|
||
title = {Tactique cyber, le combat numérique},
|
||
year = {2019},
|
||
publisher= {Economica},
|
||
note = {Préface du Général Olivier Bonnet de Paillerets},
|
||
isbn = {978-2-7178-7060-2},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Lee, Marin},
|
||
title = {Cyber Threat Intelligence},
|
||
year = {2023},
|
||
publisher= {Wiley},
|
||
note = {retrouvez ici un billet de blog très complet sur cet ouvrage https://warnerchad.medium.com/cyber-threat-intelligence-by-martin-lee-notes-494a028c7d74},
|
||
isbn = {1119861748},
|
||
keyword = {Cyber Threat Intelligence}}
|
||
|
||
@book{étiquette,
|
||
author = {Lejeune, Yannick and EPITA},
|
||
title = {Big, fast, Open Data : décrire, décrypter et prédire le monde : l'avènement des données},
|
||
year = {2014},
|
||
publisher = {FYP},
|
||
keyword = {data},
|
||
note = {Ouvrage collectif réalisé à l'initiative de l'EPITA, il regroupe de nombreuses expertises et trace, dès 2014, les premières pistes sur l'avènement du monde de la donnée.},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Leonetti, Xavier and Féral-Schull, Christiane},
|
||
title = {Cybersécurité mode d'emploi : entreprise, monde numérique et protection des données personnelles : 57 fiches réflexes},
|
||
year = {2022},
|
||
publisher= {PUF},
|
||
isbn = {978-2-13-083369-7}}
|
||
|
||
@book{lessig2009code,
|
||
title={Code: And other laws of cyberspace},
|
||
author={Lessig, Lawrence},
|
||
year={2009},
|
||
publisher={ReadHowYouWant. com},
|
||
keyword = {Juridique, Law, droit}}
|
||
|
||
@book{étiquette,
|
||
author = {Levine, Yasha},
|
||
title = {Surveillance Valley, The Secret Military History of the Internet},
|
||
year = {2018},
|
||
publisher= {Public Affairs}}
|
||
|
||
@book{étiquette,
|
||
author = {Liang, Qiao and Xiangsui, Wang},
|
||
title = {La guerre hors limites},
|
||
year = {1999},
|
||
publisher= {Les éditions du Cerf},
|
||
isbn= {978-2743615178},
|
||
note = {Incontournable (entre autres) sur la pensée cyber chinoise.}}
|
||
|
||
@book{étiquette,
|
||
author = {Libicki, Martin},
|
||
title = {Cyberdeterrence and Cyberwar},
|
||
year = {2009},
|
||
publisher= {RAND Corporation},
|
||
keyword={dissuasion, cyberstratégie, cyberguerre}}
|
||
|
||
@book{étiquette,
|
||
author = {Libicki, Martin},
|
||
title = {Conquest in cyberspace: national security and information},
|
||
year = {2007},
|
||
publisher= {Cambridge University Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Lilly, Bilyana},
|
||
title = {Russian Information Warfare: assault on democracies in the cyber wild west},
|
||
year = {2022},
|
||
ISBN = {1682477193},
|
||
publisher= {Naval Institute Press }}
|
||
|
||
@book{étiquette,
|
||
author = {Limonier, Kevin},
|
||
title = {Ru.net},
|
||
year = {2018},
|
||
ISBN = {2355970327},
|
||
publisher= {édition de l'Inventaire}}
|
||
|
||
@book{étiquette,
|
||
author = {Lonsdale, David J},
|
||
title = {The Nature of War in the Information Age: Clausewitzian future},
|
||
year = {2004},
|
||
publisher= {Frank Cass}}
|
||
|
||
|
||
@comment{M}
|
||
|
||
@book{étiquette,
|
||
title={La menace cyber, Mieux la connaître pour mieux s’en protéger},
|
||
author={Mahieux, Philippe},
|
||
year={2024},
|
||
publisher={Editions ENI},
|
||
keyword = {Sensibilisation, menace cyber}}
|
||
|
||
@book{maschmeyer2024subversion,
|
||
title={Subversion: From Covert Operations to Cyber Conflict},
|
||
author={Maschmeyer, Lennart},
|
||
year={2024},
|
||
publisher={Oxford University Press},
|
||
keyword = {Subversion, espionnage, cyberwar}}
|
||
|
||
@book{étiquette,
|
||
author = {Maurer, Tim},
|
||
title = {Cyber Mercenaries : The State, Hackers, and Power},
|
||
year = {2018},
|
||
publisher= {Cambridge University Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Menn, Joseph},
|
||
title = {Cult of the Dead Cow: how the original hacking Supergroup might just save the world},
|
||
year = {2019},
|
||
publisher = {PublicAffairs},
|
||
isbn = {9781541724426}}
|
||
|
||
@book{étiquette,
|
||
author = {Mitnick, Kevin D and Simon, William L},
|
||
title = {The Art of Deception: Controlling the Human Element of Security},
|
||
year = {2003},
|
||
publisher = {John Wiley \& Sons},
|
||
isbn = {9780764542800}}
|
||
|
||
@book{étiquette,
|
||
author = {Mitnick, Kevin D and Simon, William L},
|
||
title = {The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers},
|
||
year = {2005},
|
||
publisher = {John Wiley \& Sons},
|
||
isbn = {9780471782667},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Mitnick, Kevin},
|
||
title = {Ghost in the Wires: My Adventures as the World's Most Wanted Hacker},
|
||
year = {2012},
|
||
publisher = {Back Bay Books},
|
||
isbn = {9780316212182}}
|
||
|
||
@book{étiquette,
|
||
author = {Monte, Matthew},
|
||
title = {Network Attacks and Exploitation},
|
||
year = {2015},
|
||
publisher= {Wiley}}
|
||
|
||
@book{étiquette,
|
||
author = {Moore, Daniel},
|
||
title = {Offensive Cyber Operations},
|
||
year = {2022},
|
||
isbn = {9781787385610},
|
||
publisher= {Hurst}}
|
||
|
||
@book{étiquette,
|
||
author = {Morel, Camille},
|
||
title = {Les câbles sous-marins},
|
||
year = {2023},
|
||
publisher = {CNRS},
|
||
Keywords = {Infrastructures, câbles, cyberstratégie},
|
||
note = {Excellent ouvrage sur une thématique centrale pour comprendre les enjeux du numérique},
|
||
isbn = {2271141214}}
|
||
|
||
@book{étiquette,
|
||
author = {Motte, Martin},
|
||
title = {La mesure de la force},
|
||
year = {2018},
|
||
publisher= {Taillandier},
|
||
keyword={stratégie},
|
||
note={Ouvrage qui ne traite pas uniquement de cyber mais de stratégie au sens large, un chapitre couvre les enjeux du combat à l'ère numérique}}
|
||
|
||
|
||
@comment{N}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Nye, Joseph},
|
||
title = {Cyberpower},
|
||
year = {2010},
|
||
publisher= {Harvard University}}
|
||
|
||
@comment{O}
|
||
|
||
@book{étiquette,
|
||
author = {O'Hara, Kieron and Hall, Wendy},
|
||
title = {Four Internets: Data, Geopolitics, and the Governance of Cyberspace},
|
||
year = {2021},
|
||
publisher = {Oxford University Press},
|
||
isbn = {978-0-19-752368-1},
|
||
keywords = {Data, Géopolitique, gourvenance, geopolitic, governance}}
|
||
|
||
@book{olejnik2023philosophy,
|
||
author={Olejnik, Lukasz and Kurasi{\'n}ski, Artur},
|
||
title={Philosophy of Cybersecurity},
|
||
year={2023},
|
||
publisher={CRC Press}}
|
||
|
||
@book{olejnik2024propaganda,
|
||
title={Propaganda: From Disinformation and Influence to Operations and Information Warfare},
|
||
author={Olejnik, Lukasz},
|
||
year={2024},
|
||
url = {https://blog.lukaszolejnik.com/propaganda-my-book-on-information-security/},
|
||
publisher={CRC Press}}
|
||
|
||
@book{étiquette,
|
||
title={Renseignement et s{\'e}curit{\'e}-2e {\'e}d.},
|
||
author={Chopin, Olivier and Oudet, Benjamin},
|
||
year={2019},
|
||
publisher={Armand Colin},
|
||
keyword = {Renseignement}}
|
||
|
||
|
||
@comment{P}
|
||
|
||
@book{étiquette,
|
||
author = {Patino, Bruno},
|
||
title = {La civilisation du poisson rouge. Petit traité sur le marché de l'attention},
|
||
year = {2019},
|
||
publisher = {Grasset},
|
||
isbn = {978-2-253-10125-3}}
|
||
|
||
@book{étiquette,
|
||
author = {Patino, Bruno},
|
||
title = {Tempête dans le bocal, la nouvelle civilisation du poisson rouge},
|
||
year = {2022},
|
||
publisher = {Grasset},
|
||
isbn = {978-2-246-82896-9}}
|
||
|
||
@book{étiquette,
|
||
author = {Groupe Pandoras},
|
||
title = {cybersécurité : méthode de gestion de crise},
|
||
year = {2021},
|
||
publisher= {VA-ÉDITIONS}}
|
||
|
||
@book{étiquette,
|
||
author = {Payne, Kenneth},
|
||
title = {I, Warbot: The Dawn of Artificially Intelligent Conflict},
|
||
year = {2021},
|
||
publisher= {Oxford University Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Perlroth, Nicole},
|
||
title = {This is How they Tell me the World Ends: the Cyberweapons Arms Race},
|
||
year = {2021},
|
||
publisher= {Bloomsburry Publishing}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Penalba, Pierre},
|
||
title = {Cyber crimes : un flic 2.0 raconte},
|
||
year = {2020},
|
||
publisher = {Albin Michel}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Perkovich, George and Ariel, Levite},
|
||
title = {Understanding Cyber conflict: 14 analogies},
|
||
year = {2017},
|
||
publisher = {Georgetown University Press}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Pernet, Cédric},
|
||
title = {Sécurité et espionnage informatique},
|
||
year = {2014},
|
||
publisher= {Eyrolles},
|
||
isbn = {9782212139655},
|
||
note={Maitriser sa sécurité signifie que l’on doit comprendre les menaces auxquelles il faut faire face et c’est justement l’objet de ce livre consacré aux APT. Les APT, pour Advanced Persistent Threats, sont les menaces du haut du spectre (étatiques ou criminelles). L’auteur va ainsi définir ce terme qui fait débat au sein de la communauté cyber avant d’en décrire les différentes phases. L’exposé est enrichi d’exemples concrets et aborde certains aspects techniques. Il ne couvre cependant pas les actions à mener pour répondre à ce type de menace (la réponse à incident). Pour les débutants, il est intéressant de noter que si les APT sont des menaces avec un impact potentiel élevé, il ne s’agit pas forcément des attaques les plus sophistiquées techniquement.},
|
||
keyword={cybersécurité, APT}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Petrov, Victor},
|
||
title = {Balkan Cyberia: Cold War Computing, Bulgarian Modernization, and the Information Age behind the Iron Curtain},
|
||
year = {2023},
|
||
publisher = {MIT Press},
|
||
note = {Ascension et la chute de la puissante industrie informatique bulgare pendant la période du rideau de fer jusqu'à la chute du communisme},
|
||
isbn = {9780262545129},
|
||
keyword = {histoire, cyber}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Pharo, Patrick},
|
||
title = {Les data contre la liberté},
|
||
year = {2022},
|
||
publisher = {PUF},
|
||
isbn = {978-2-13-083304-8}}
|
||
|
||
@book{étiquette,
|
||
author = {Pillou, Jean-François et Bay, Jean-Philippe},
|
||
title = {Tout sur la sécurité informatique},
|
||
year = {2020},
|
||
publisher = {Dunod},
|
||
note = {Excellent ouvrage généraliste pour bien débutter avec les bases du domaine},
|
||
keyword = {Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Pomerantsev, Peter},
|
||
title = {This Is Not Propaganda : Adventures in the War Against Reality},
|
||
year = {2019},
|
||
publisher = {Faber \& Faber},
|
||
keyword = {propagande, Russie},
|
||
note = {}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Porche, Isaac},
|
||
title = {Cyberwarfare: An Introduction to Information-Age Conflict},
|
||
year = {2019},
|
||
ISBN = {978-1630815769},
|
||
publisher= {Artech House}}
|
||
|
||
|
||
@comment{Q}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Quemener, Myriam and Ferry, Joël},
|
||
title = {Cybercriminalité : défi mondial et réponse},
|
||
year = {2007},
|
||
publisher= {Economica}}
|
||
|
||
@book{étiquette,
|
||
author = {Quesard, Maud et Marangé, Céline},
|
||
title = {Les guerres de l'information à l'ère numérique},
|
||
year = {2021},
|
||
publisher= {PUF},
|
||
keyword={guerre de l'information}}
|
||
|
||
|
||
@comment{R}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Raimondo, Laurane},
|
||
title = {Les fondamentaux de la gestion de crise cyber},
|
||
year = {2022},
|
||
publisher= {Ellipses}}
|
||
|
||
@book{étiquette,
|
||
author = {Rains, Tim},
|
||
title = {Cybersecurity Threats, Malware Trends, and Strategies: Learn to mitigate exploits, malware, phishing, and other social engineering attacks},
|
||
year = {2020},
|
||
publisher = {Packt Publishing Ltd}}
|
||
|
||
@book{étiquette,
|
||
author={Rains, Tim},
|
||
title={Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization},
|
||
year={2023},
|
||
publisher={Packt Publishing Ltd}}
|
||
|
||
@book{étiquette,
|
||
author = {Rascagnères, Paul and Larinier, Sébastien},
|
||
title = {Cybersécurité et Malwares. Détection, analyse et Threat Intelligence},
|
||
year = {2022},
|
||
publisher = {ENI},
|
||
note = {4ème édition (2022) d'un livre de référence sur le sujet},
|
||
isbn = {978-2409038105}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Rattray, Gregory},
|
||
title = {Strategic warfare in cyberspace},
|
||
year = {2001},
|
||
publisher= {Mass MIT Press}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Raufast, Pierre},
|
||
title = {Habemus piratam},
|
||
year = {2022},
|
||
publisher = {Forges Vulcain},
|
||
isbn = {9782373051193},
|
||
note = {Un très bon roman français dans le domaine Cyber/Hacking, auteur membre de l'équipe SSI chez Michelin}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Rid, Thomas},
|
||
title = {Cyber War will not take place},
|
||
year = {2013},
|
||
publisher= {Oxford University Press},
|
||
keyword={CyberWar, cyberguerre, cyberstratégie},
|
||
note={Excellent livre qui ne perd rien de son actualité, fait partie des 5 recommendations de lecture sur le sujet par le Modern Warfare Institue de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Rid, Thomas},
|
||
title = {Active Measures: The Secret History of Disinformation and Political Warfare},
|
||
year = {2020},
|
||
publisher= {Profile Books Ltd},
|
||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Roberts, Scott J. and Brown, Rebekah},
|
||
title = {Intelligence-Driven Incident Response},
|
||
year = {2023},
|
||
publisher = {O'Reilly Media},
|
||
isbn = {9781098120627},
|
||
note = {Un livre sur le renseignement appliqué à la réponse à incident, donc la CTI.}}
|
||
|
||
@book{étiquette,
|
||
author = {Roccia, Thomas},
|
||
title = {Visual Threat Intelligence, An illustrated Guide For Threat Researchers},
|
||
year = {2023},
|
||
note = {Livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel},
|
||
keyword = {Cyber Threat Intell, CTI}}
|
||
|
||
@book{étiquette,
|
||
author = {Roscini, Marco},
|
||
title = {Cyber Operations and the Use of Force in International Law},
|
||
year={2014},
|
||
publisher = {Oxford University Press},
|
||
isbn={9780199655014},
|
||
keyword = {cyber warfare, international law, use of force, international humanitarian law, self-defence, cyber attack}}
|
||
|
||
@book{étiquette,
|
||
author = {Roux, Thierry},
|
||
title = {L'art de la guerre cyber : vers une intelligence des crises},
|
||
year = {2020},
|
||
publisher = {Nunkee Editions},
|
||
isbn = {978-2492639005},
|
||
keyword = {Cyberguerre, gestion de crise}}
|
||
|
||
|
||
@comment{S}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Salamon, Yann},
|
||
title = {Cybersécurité et Cyberdéfense : enjeux stratégiques},
|
||
year = {2020},
|
||
publisher= {Ellipses},
|
||
keyword = {cybersécurité, cyberdéfense, menace, géopolitique},
|
||
note = {S’adressant à un panel de publics divers, cet ouvrage balaie un large panorama de sujets structurants liés à la sécurité numérique. Prenant comme point de départ la compréhension du cyberespace, il en décrit quelques propriétés importantes : tendances, enjeux, caractéristiques « topologiques », acteurs en présence.}}
|
||
|
||
@book{étiquette,
|
||
author = {Salobir, Eric},
|
||
title = {Dieu et la silicon valley},
|
||
year = {2020},
|
||
publisher = {Buchet Chastel},
|
||
note = {Ouvrage stimulant sur la place de la technologie dans nos vies et une réflexion sur le lien entre foi et technique},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Sanger, David},
|
||
title = {Confront and Conceal: Obama’s secret wars and surprising use of American power},
|
||
year = {2012},
|
||
publisher= {Crown},
|
||
keyword = {stratégie, géopolitique,cyberguerre},
|
||
note = {Un livre à lire pour comprendre l'histoire récente des conflits numériques et la conduite de cette guerre par l'administration Obama}}
|
||
|
||
@book{étiquette,
|
||
author = {Sanger, David},
|
||
title = {The Perfect Weapon: War, Sabotage and Fear in the Cyber Age},
|
||
year = {2018},
|
||
publisher= {Crown},
|
||
isbn = {978-0451497901}}
|
||
|
||
@book{étiquette,
|
||
author = {Sarfraz, Muhammad},
|
||
title = {Cybersecurity Threats with New Perspectives},
|
||
year = {2021},
|
||
publisher = {BoD--Books on Demand}}
|
||
|
||
@book{étiquette,
|
||
author = {Schmitt, Michael N. and Vihul, Liis},
|
||
title = {Tallinn manual 2.0 on the international law applicable to cyber operations},
|
||
year = {2017},
|
||
publisher = {Cambridge university press},
|
||
isbn = {978-1-316-63037-2}}
|
||
|
||
@book{étiquette,
|
||
author = {Schneier, Bruce},
|
||
title = {Applied Cryptography: Protocols, Algorthms, and Source Code in C.},
|
||
year = {1996},
|
||
publisher= {John Wiley \& Sons}}
|
||
|
||
@book{étiquette,
|
||
author = {Schneier, Bruce},
|
||
title = {Secrets and Lies: Digital Security in a Networked World},
|
||
year = {2004},
|
||
publisher= {John Wiley \& Sons},
|
||
isbn = {0471453803}}
|
||
|
||
@book{étiquette,
|
||
author = {Schradie, Jen},
|
||
title = {L'illusion de la démocratie numérique. Internet est-il de droite ?},
|
||
year = {2022},
|
||
publisher= {Quanto},
|
||
isbn = {978-288915-454-8}}
|
||
|
||
@book{étiquette,
|
||
author = {Scott Card, Orson},
|
||
title = {Ender's Game},
|
||
year = {1985},
|
||
publisher= {Mass Market Paperback},
|
||
isbn = {9780812550702},
|
||
keyword={Roman},
|
||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}}
|
||
|
||
@book{étiquette,
|
||
author = {Séjean, Michel},
|
||
title = {Code de la cybersécurité},
|
||
year = {2023},
|
||
publisher= {Lefevre Dalloz},
|
||
keyword={droit},
|
||
note={un incontournable pour ceux qui souhaitent maitriser le droit associé à la cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
title={Global Cybersecurity and International Law},
|
||
author={Serrano, Antonio Segura},
|
||
year={2024},
|
||
publisher={Taylor \& Francis},
|
||
keyword={droit,legal,cybersecurity}}
|
||
|
||
@book{étiquette,
|
||
author = {Shevelyov, Nicholas},
|
||
title = {Cyber War... and Peace: Building Digital Trust Today with History as Our Guide},
|
||
year = {2017},
|
||
publisher = {Lioncrest Publishing},
|
||
isbn = {978-1544517094},
|
||
keyword = {Cyberwar, cyberguerre},
|
||
note = {}}
|
||
|
||
@book{étiquette,
|
||
author = {Shimomura,Tsutomu and Markoff, John},
|
||
title = {Cybertraque : la chasse au pirate informatique le plus célèbre des États-Unis},
|
||
year = {1998},
|
||
publisher = {Plon},
|
||
note = {Traduction française de "Katching Kevin", récit du hack et de la traque de Kevin Mitnick en 1995},
|
||
isbn = {978-2259184021}}
|
||
|
||
@book{étiquette,
|
||
author = {Shirky, Clay},
|
||
title = {Cognitive Surplus: Creativity and Generosity in a Connected Age},
|
||
year = {2010},
|
||
publisher= {Penguin Press},
|
||
isbn = {9780141041605}}
|
||
|
||
@book{étiquette,
|
||
author = {Sikorski, Michael and Honig, Andrew},
|
||
title = {Practical Malware Analysis: the Hands-On Guide to Dissecting Malicious Software},
|
||
year = {2012},
|
||
publisher= {No Starch Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Singer, P.W and Cole, August},
|
||
title = {La flotte fantôme},
|
||
year = {2022},
|
||
publisher= {Folio},
|
||
isbn = {9780358108474},
|
||
Keyword={Roman, Cyberguerre}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Singer, P.W and Brooking, Emerson T},
|
||
title = {LikeWar: The Weaponization of Social Media},
|
||
year = {2019},
|
||
publisher= {Mariner Books},
|
||
isbn = {978-2-07-297935-4},
|
||
Keyword={Guerre de l'information, InfoWar}}
|
||
|
||
@book{étiquette,
|
||
author = {Smeets, Max},
|
||
title = {No Shortcuts. Why States Struggle to Develop a Military Cyber-Force},
|
||
year = {2022},
|
||
publisher= {Oxford University Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Stamboliyska, Rayna},
|
||
title = {La face cachée d'internet : hackers},
|
||
year = {2017},
|
||
publisher= {Larousse}}
|
||
|
||
@book{étiquette,
|
||
author={Steffens, Timo},
|
||
title={Attribution of Advanced Persistent Threat},
|
||
year={2020},
|
||
publisher={Springer Vieweg},
|
||
keyword={Cybersécurité, Attribution},
|
||
note = {Un livre qui traite en profondeur la problématique de l’attribution, mais aussi l’ensemble des concepts clés de la CTI}}
|
||
|
||
@book{étiquette,
|
||
author={Stengel, Richard},
|
||
title={Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About It},
|
||
year={2019},
|
||
publisher={Atlantic Monthly Press},
|
||
isbn={9780802147981},
|
||
keyword={guerre de l'information, infowar}}
|
||
|
||
@book{étiquette,
|
||
title={Cyber security and the politics of time},
|
||
author={Stevens, Tim},
|
||
year={2016},
|
||
publisher={Cambridge University Press},
|
||
keyword={Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Stoll, Clifford},
|
||
title = {The Cuckoo's Egg},
|
||
year = {1989},
|
||
publisher= {Doubleday}}
|
||
|
||
|
||
@comment{T}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Tarissan, Fabien},
|
||
title = {Au coeur des réseaux, des sciences aux citoyens},
|
||
year = {2019},
|
||
publisher = {Le Pommier},
|
||
isbn = {978-2-7465-1666-3}}
|
||
|
||
@book{étiquette,
|
||
author = {Thames, Lane and Schaefer, Dirk},
|
||
title = {Cybersecurity for industry 4.0},
|
||
year = {2017},
|
||
publisher = {Springer},
|
||
keyword = {cybersécurité, cybersecurity}}
|
||
|
||
@book{étiquette,
|
||
author = {Triffault, Alexandre},
|
||
title = {The Little Black Book of Lockpicking: Lock opening and Bypass techniques for Security Professionals},
|
||
year = {2021},
|
||
isbn = {979-8544602156},
|
||
publisher= {Publication indépendante}}
|
||
|
||
@book{étiquette,
|
||
author = {Troia, Vinny},
|
||
title = {Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques},
|
||
year = {2020},
|
||
publisher= {John Wiley \& Sons}}
|
||
|
||
|
||
@comment{U}
|
||
|
||
@book{étiquette,
|
||
author = {Untersinger, Martin},
|
||
title = {Espionner, mentir, détruire : Comment le cyberespace est devenu un champ de bataille},
|
||
year = {2024},
|
||
publisher = {Grasset},
|
||
note = {Une enquête sur l'histoire du cyberespace et des affrontements qui y ont lieu. Sources de l'ouvrage : https://cyber.untersin.gr/sources.html},
|
||
isbn = {978-2-246-82807-5},
|
||
keyword = {cybersécurité, cyberguerre, cyberdéfense, espionnage}}
|
||
|
||
@comment{V}
|
||
|
||
@book{étiquette,
|
||
author={Valeriano, Brandon and Maness, Ryan, C},
|
||
title={Cyber war versus cyber realities: Cyber conflict in the international system},
|
||
year={2015},
|
||
publisher={Oxford University Press},
|
||
keyword={cyberwar}}
|
||
|
||
@book{étiquette,
|
||
author = {Van Puyvelde, Damien and Brantly, Aaron F.},
|
||
title = {Cybersecurity. Politics, Governance and Conflict in Cyberspace},
|
||
year = {2019},
|
||
publisher= {John Wiley \& Sons}}
|
||
|
||
@book{étiquette,
|
||
author = {Ventre, Daniel},
|
||
title = {Cyberattaque et cyberdéfense},
|
||
year = {2011},
|
||
publisher= {Lavoisier},
|
||
note = {disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Ventre, Daniel},
|
||
title = {Cyberguerre et guerre de l’information. Stratégie,règles et enjeux},
|
||
year = {2010},
|
||
publisher= {Lavoisier}}
|
||
|
||
@book{étiquette,
|
||
author = {Ventre, Daniel},
|
||
title = {La guerre de l'information},
|
||
year = {2007},
|
||
isbn = {978-2-7462-1883-3},
|
||
publisher= {Lavoisier}}
|
||
|
||
@book{étiquette,
|
||
author = {Ventre, Daniel},
|
||
title = {Information Warfare},
|
||
year = {2016},
|
||
isbn = {978-1-848216600},
|
||
publisher= {Wiley},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
title={La désinformation: arme de guerre},
|
||
author={Volkoff, Vladimir},
|
||
year={2004},
|
||
publisher={l'Age d'homme},
|
||
keyword = {Désinformation},
|
||
note = {}}
|
||
|
||
|
||
@comment{W}
|
||
|
||
|
||
@comment{X}
|
||
|
||
|
||
@comment{Y}
|
||
|
||
|
||
@comment{Z}
|
||
|
||
|
||
@book{étiquette,
|
||
|
||
author = {Zalewski, Michal},
|
||
title = {Menaces sur le réseau, Sécurité informatique : guide pratique des attaques passives et indirectes},
|
||
year = {2008},
|
||
publisher= {CampusPresse},
|
||
isbn = {978-2-7440-2226-5},
|
||
note = {Superbe livre pout s'initier à la sécurité informatique au niveau réseau / protocolaire. Version FR du livre publié en 2005 "Silence on the Wire"}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Zalewski, Michal},
|
||
title = {The Tangled Web: A Guide to Securing Modern Web Applications},
|
||
year = {2011},
|
||
publisher = {No Starch Press},
|
||
isbn = {9781593273880}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Zegart, Amy},
|
||
title = {Spies, Lies, and Algorithms: The History and Future of American Intelligence},
|
||
year = {2022},
|
||
publisher= {Princeton},
|
||
isbn = {9780691147130}}
|
||
|
||
@book{étiquette,
|
||
author = {Zetter, Kim},
|
||
title = {Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon},
|
||
year = {2014},
|
||
publisher= {Crown},
|
||
isbn = {077043617X},
|
||
note = {The story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare}}
|
||
|
||
@book{étiquette,
|
||
author = {Zittrain, Jopnathan},
|
||
title = {The future of the Internet: And How to Stop it},
|
||
year = {2008},
|
||
publisher= {Yale University Press},
|
||
isbn = {},
|
||
keyword = {internet, governance}}
|
||
|
||
@book{étiquette,
|
||
author = {Zuboff, Shoshana},
|
||
title = {The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power},
|
||
year = {2019},
|
||
publisher= {Profile Books Ltd},
|
||
isbn = {1781256853},
|
||
note = {The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control us. }}
|
||
|
||
|
||
@book{conti_cyber_2018,
|
||
author = {Conti, Greg and Raymond, David},
|
||
title = {On cyber: towards an operational art for cyber conflict},
|
||
year = {2018},
|
||
publisher = {Kopidion Press},
|
||
note = {OCLC: 1023656225},
|
||
isbn = {978-0-692-91156-3},
|
||
keyword = {cyberwar, operational art,cyberdefense}}
|