зеркало из
https://github.com/M82-project/Bibliography.git
synced 2025-10-29 21:16:11 +02:00
1671 строка
57 KiB
TeX
1671 строка
57 KiB
TeX
|
||
|
||
-----------------------------------------------------------------------------------------------
|
||
|
||
@comment{A}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Abiteboul,Serge and Cattan, Jean},
|
||
title = {Nous sommes les réseaux sociaux},
|
||
year = {2022},
|
||
publisher= {Odile Jacob},
|
||
isbn = {9782415001704},
|
||
keyword={Réseaux sociaux}}
|
||
|
||
@book{étiquette,
|
||
author = {Adair, Seven and Hale, Michael and Hartsein, Blake and Matthew, Richard},
|
||
title = {Malware analyst's Cookbook},
|
||
year = {2011},
|
||
publisher= {Wiley},
|
||
isbn = {978-0-470-61303-0},
|
||
note = {Une référence pour s'initier à l'analyse de codes malveillants.},
|
||
keyword={Cybersécurité, Malware, Hacking}}
|
||
|
||
@book{étiquette,
|
||
author = {Allsopp, Will},
|
||
title = {Advanced penetration testing},
|
||
year = {2017},
|
||
publisher= {Wiley},
|
||
isbn = {978-1-119-36786-0},
|
||
note = {Même si les techniques de ce livre sont connues, il constitue une vue intéressante sur les potentiels vecteurs d'infection et d'ingénierie sociale pouvant être mis en oeuvre par des attaquants.},
|
||
keyword={Cybersécurité, Hacking}}
|
||
|
||
@book{étiquette,
|
||
title = {La longue traine},
|
||
author = {Anderson, Chris},
|
||
year={2012},
|
||
publisher={Pearson},
|
||
keyword = {économie},
|
||
note = {livre un brin prophétique devenu un "classique", Chris Anderson, rédacteur en chef de Wired, nous démontre comment Internet modifie en profondeur les mécanismes de l'économie.}}
|
||
|
||
@book{andress2012basics,
|
||
title={The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice},
|
||
author={Andress, Jason and Winterfeld, Steve},
|
||
year={2012},
|
||
note = {Un livre "ancien" qui a le mérite de présenter les bases de la construction des doctrines de cyberdéfense. L'ouvrage replace le concept de cyberguerre dans le corpus stratégique et la continuité des concepts militaires},
|
||
keyword = {cyberdéfense, stratégie, doctrine, cyberwarfare},
|
||
publisher={Newnes},
|
||
note = {disponible prêt adhérents M82}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Arpagian, Nicolas},
|
||
title = {Frontières.com},
|
||
year = {2022},
|
||
isbn = {103292134X},
|
||
publisher= {L'Observatoire},
|
||
Keyword={Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Arpagian, Nicolas},
|
||
title = {La cyberguerre, la guerre numérique a commencé},
|
||
year = {2009},
|
||
publisher= {Vuibert},
|
||
Keyword={Cyberguerre}}
|
||
|
||
@book{étiquette,
|
||
author = {Arpagian, Nicolas},
|
||
title = {La cybersécurité},
|
||
year = {2018},
|
||
publisher= {PUF},
|
||
Keyword={Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Arquilla, John},
|
||
title = {Bitskrieg, the new challenge of cyberwarfare},
|
||
year = {2021},
|
||
publisher = {Polity},
|
||
note = {Livre qui revient sur 20 ans d'évolution du concept de cyberguerre sans vraiment changer la ligne défendue par l'auteur depuis son article "Cyberwar is coming"},
|
||
note={disponible prêt adhérents M82},
|
||
Keyword={Cyberguerre, Géopolitique, cyberwar}}
|
||
|
||
@book{étiquette,
|
||
author = {Arquilla, John and Ronfeldt, David},
|
||
title = {Networks and Netwars: the Future of Terror, Crime and Militancy},
|
||
year = {2001},
|
||
publisher= {Rand},
|
||
Keyword={Cyberguerre}}
|
||
|
||
@book{étiquette,
|
||
author = {Article 19},
|
||
title = {Connaissez-vous vraiment internet ? Protocoles, sécurité, censure, gouvernance...},
|
||
year = {2022},
|
||
publisher= {Éditions Eyrolles},
|
||
isbn = {978-2-416-00727-9}}
|
||
|
||
@book{étiquette,
|
||
author = {Arutunyan, Anna},
|
||
title = {Hybrid Warriors, Proxies, Freelancers and Moscow's Struggle for Ukraine},
|
||
year = {2022},
|
||
publisher= {Hurst Publisher},
|
||
Keyword={Cyberguerre, Russie, Ukraine, Guerre Hybride}}
|
||
|
||
@book{étiquette,
|
||
title={Cybersecurity in China: the next wave},
|
||
author={Austin, Greg},
|
||
year={2018},
|
||
publisher={Springer},
|
||
keyword={Cybersécurité, Chine, Géopolitique}}
|
||
|
||
@comment{B}
|
||
|
||
@book{étiquette,
|
||
title={Le désenchantement de l'internet. Désinformation, rumeur et propagande},
|
||
author={Badouard, Romain},
|
||
year={2017},
|
||
publisher={FYP {\'e}ditions},
|
||
note = {Désinformation},
|
||
keyword = {Désinformation, Propagande}}
|
||
|
||
@book{étiquette,
|
||
author = {Benkler, Yochai and Faris, Robert and Robert, Hal},
|
||
title = {Network propaganda: Manipulation, Disinformation, Radicalization in American Politics},
|
||
year = {2018},
|
||
publisher= {Oxford University Press},
|
||
keyword={Désinformation, Propagande}}
|
||
|
||
@book{étiquette,
|
||
author = {Billois, Gérôme and Cougot, Nicolas},
|
||
title = {Cyberattaques, les dessous d'une menace mondiale},
|
||
year = {2022},
|
||
publisher= {Hachette},
|
||
isbn = {978-2-915547-66-5},
|
||
note= {La qualité d’un consultant réside souvent dans sa capacité à expliquer des choses complexes de manière accessible. C’est justement ce qu’arrive à faire Gérôme Billois avec cet ouvrage complet et au design soigné. Vous y trouverez des récits sur les différents types de cyberattaques, des explications sur les enjeux de la cyber sécurité pour les états, les entreprises et les individus ainsi que des portraits de professionnels représentant la grande diversité des métiers. Ce libre est le B.A.-BA pour tout nouvel entrant dans le domaine de la cybersécurité et notamment ceux qui se destinent à une carrière dans le conseil.},
|
||
Keyword={Cyberguerre, Géopolitique}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Bittman, Ladistlav},
|
||
title = {The Deception Game},
|
||
year = {1981},
|
||
publisher= {Ballantine Books},
|
||
Keyword={Renseignement, Russie}}
|
||
|
||
@book{étiquette,
|
||
author = {Bittman, Ladistlav},
|
||
title = {The KGB and Soviet Disinformation: An Insider's View},
|
||
year = {1985},
|
||
publisher= {Brassey's Inc},
|
||
Keyword={Renseignement, Désinformation, Russie}}
|
||
|
||
@book{étiquette,
|
||
author = {Blondeau, Olivier},
|
||
title = {Devenir média. L'activisme sur Internet, entre défection et expérimentation},
|
||
year = {2007},
|
||
publisher = {Édition Amsterdam},
|
||
isbn = {978-2-915547-66-5},
|
||
Keyword={Guerre de l'information}}
|
||
|
||
@book{étiquette,
|
||
author = {Blondeau, Olivier and Latrive, Florent},
|
||
title = {Libres enfants du savoir numérique. Anthologie du libre},
|
||
year = {2000},
|
||
publisher = {Éditions de L'Éclat},
|
||
note = {Libre},
|
||
isbn = {978-2-84162-043-2},
|
||
keyword = {logiciel libre, informatique}}
|
||
|
||
@book{étiquette,
|
||
author = {Bortzmeyer, Stéphane},
|
||
title = {Cyberstructure, l'Internet un espace politique},
|
||
year = {2018},
|
||
publisher= {C\&F Editions},
|
||
Keyword={Géopolitique},
|
||
note={Écrit par un expert des questions d’internet et travaillant pour l’AFNIC (organisme gestionnaire du registre des noms de domaine en .fr), ce livre se divise en deux parties. La première se concentre sur le fonctionnement d’internet : les protocoles, les applications web, les organismes de gouvernance et quelques sujets particuliers tels que les crypto monnaies. La deuxième partie est dédiée à une réflexion sur les aspects politiques d’internet : doit-on limiter le chiffrement ? Les concepts de sécurité et vie privée sont-ils opposés ? Quelles technologies choisir pour l’internet de demain ?}}
|
||
|
||
@book{étiquette,
|
||
author = {Boyer, Bertrand},
|
||
title = {Guérilla 2.0, guerres irrégulières dans le cyberespace},
|
||
year = {2020},
|
||
publisher= {École de Guerre},
|
||
keyword={Guerre de l'information, Cyberguerre, Guerre Hybride}}
|
||
|
||
@book{étiquette,
|
||
author = {Boyer, Bertrand},
|
||
title = {Cyberstratégie, l'art de la guerre numérique},
|
||
year = {2012},
|
||
publisher= {NUVIS},
|
||
keyword={Cyberguerre, Cyberstratégie},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Boyer, Bertrand},
|
||
title = {Cybertactique, conduire la guerre numérique},
|
||
year = {2014},
|
||
publisher= {NUVIS},
|
||
keyword={Cyberguerre, Cyberstratégie},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Boyer, Bertrand},
|
||
title = {Dictionnaire de la Cybersécurité et des réseaux},
|
||
year = {2015},
|
||
publisher = {NUVIS},
|
||
keyword = {Dictionnaire},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
title={Weaponized words: The strategic role of persuasion in violent radicalization and counter-radicalization},
|
||
author={Braddock, Kurt},
|
||
year={2020},
|
||
publisher={Cambridge University Press},
|
||
keyword = {cyberstratégie}}
|
||
|
||
@book{étiquette,
|
||
author = {Brenner,Susan},
|
||
title = {Cyberthreats, the emerging fault line of the Nation State},
|
||
year = {2009},
|
||
publisher= {Oxford University Press},
|
||
keyword={Cyberguerre, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Bronner, Gérald},
|
||
title = {Apocalypse cognitive},
|
||
year = {2021},
|
||
publisher = {PUF},
|
||
note = {},
|
||
isbn = {2130733042},
|
||
keyword={Guerre de l'information, Désinformation}}
|
||
|
||
@book{étiquette,
|
||
author = {Brunton, Finn and Nissenbaum, Helen},
|
||
title = {Obfuscation: A User's Guide for Privacy and Protest},
|
||
year = {2015},
|
||
isbn = {0262029731},
|
||
publisher = {The MIT Press},
|
||
keyword={Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Bryant, William},
|
||
title = {International Conflict and Cyberspace superiority},
|
||
year = {2016},
|
||
publisher= {Routledge},
|
||
keyword={Géopolitique, Cyberguerre}}
|
||
|
||
@book{étiquette,
|
||
author = {Buchanan, Ben},
|
||
title = {The Cybersecurity Dilemna: Hacking, Trust and Fear Between Nations},
|
||
year = {2019},
|
||
publisher= {C Hurst Co Publishers},
|
||
keyword={Cyberguerre, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Buchanan, Ben},
|
||
title = {The Hacker and the state: The New Normal of Geopolitics},
|
||
year = {2020},
|
||
publisher= {Harvard University Press},
|
||
keyword={Géopolitique, cyberstratégie, Cyberguerre},
|
||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}},
|
||
|
||
@book{étiquette,
|
||
author = {Buchan, Russell},
|
||
title = {Cyberespionage and international law},
|
||
year = {2018},
|
||
publisher= {Hart Publishing},
|
||
keyword={Renseignement, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Bulinge, Franck},
|
||
title = {De l’espionnage au renseignement},
|
||
year = {2012},
|
||
publisher= {Vuibert},
|
||
isbn = {978-2-311-00658-2},
|
||
keyword={Renseignement}}
|
||
|
||
|
||
@comment{C}
|
||
|
||
@book{étiquette,
|
||
title={A quoi rêvent les algorithmes : nos vies à l’heure des Big data},
|
||
author={Cardon, Dominique},
|
||
year={2015},
|
||
publisher={Média Diffusion},
|
||
keyword={Humanités numériques}}
|
||
|
||
@book{étiquette,
|
||
author = {Carr, Jeffrey},
|
||
title = {Inside Cyber Warfare, mapping the cyber underworld},
|
||
year = {2009},
|
||
publisher= {O'Reilly},
|
||
keyword={Cyberguerre, Géopolitique}}
|
||
|
||
@book{étiquette}
|
||
author = {Carrier, Brian},
|
||
title = {File System Forensic Analysis},
|
||
year = {2005},
|
||
publisher = {Addison Wesley},
|
||
isbn = {0321268172},
|
||
keyword = {analyse, forensic},
|
||
note = {Un must have dans le domaine de l'analyse forensic}}
|
||
|
||
@book{étiquette,
|
||
author = {Cattaruzza, Amaël},
|
||
title = {Géopolitique des données numériques. Pouvoirs et confilts à l'heure du Big Data},
|
||
year = {2019},
|
||
publisher= {éditions le Cavalier bleu}}
|
||
|
||
@book{étiquette,
|
||
author = {Cattaruzza, Amaël and Danet, Didier and Taillat, Stéphane},
|
||
title = {La cyberféfense, politique de l'espace numérique},
|
||
year = {2023},
|
||
publisher= {Armand Colin},
|
||
note= {2ème édition. Mise à jour en 2023. Cet ouvrage collectif analyse la cyberdéfense sous le prisme des relations internationales. Les auteurs présentent l’état des connaissances scientifiques dans des sujets variés tel que le concept de guerre cyber, les enjeux de souveraineté numérique, le positionnement des grands pays cyber (États-Unis, Chine, Russie), le droit international appliqué au numérique… Plus théorique que pratique, cet ouvrage est un indispensable pour les étudiants ayant un projet de mémoire en lien avec la cyberdéfense.},
|
||
note={disponible prêt adhérents M82},
|
||
keyword={Cyberdéfense, Géopolitique, Humanités numériques}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Chavalarias, David},
|
||
title = {Toxic Data},
|
||
year = {2022},
|
||
publisher = {Flammarion},
|
||
address = {},
|
||
note = {},
|
||
isbn = {978-2-08-027494-6},
|
||
keyword={Désinformation}}
|
||
|
||
@booK{étiquette,
|
||
author = {Chesney, Robert and Smeets, Max},
|
||
title = {Deter, Disrupt, or Deceive, Assessing Cyber Conflict as an Intelligence Contest},
|
||
year = {2023},
|
||
publisher = {Georgetown University Press},
|
||
note = {Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.},
|
||
isbn = {9781647123307},
|
||
keyword = {Cyberwar, Intelligence}}
|
||
|
||
@book{étiquette,
|
||
title = {Influence et manipulation - 3e édition augmentée},
|
||
isbn = {978-2-266-22792-6},
|
||
publisher = {Pocket; Enlarged édition (17 avril 2014)},
|
||
author = {Cialdini, Robert B.},
|
||
year = {2014},
|
||
keywords = {Renseignement, Psychologie sociale},
|
||
note = {https://www.amazon.fr/Influence-manipulation-Robert-B-CIALDINI/dp/2266227920},
|
||
note = {parfait pour apprendre les techniques que les médias/marketing/commerciaux utilisent tous les jours sans qu’on s’en rende compteun point de départ pour la conduite d’opération HUMINT}}
|
||
|
||
@book{étiquette,
|
||
author = {Clancy, Tom},
|
||
title = {Cybermenace},
|
||
year = {2013},
|
||
publisher= {Albin Michel},
|
||
keyword={Cyberguerre, Roman}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Clarke, Richard and Knake, Robert},
|
||
title = {Cyberwar: the next Threat to National Security and what to do about it},
|
||
year = {2010},
|
||
publisher= {Ecco Press},
|
||
keyword={Cyberguerre, Géopolitique}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Clough, Jonathan},
|
||
title = {Principles of cybercrime},
|
||
year = {2015},
|
||
publisher= {Cambridge University Press},
|
||
ISBN={9781139540803},
|
||
keyword={Cybercriminalité}}
|
||
|
||
@book{étiquette,
|
||
author={Coelho,Ophélie},
|
||
titel={Géopolitique du numérique: L'impérialisme à pas de géants},
|
||
publisher={Editions de l'Atelier},
|
||
year={2023},
|
||
ISBN={2708254022},
|
||
keywords={géopolitique, GAFAM},
|
||
note={},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author={Colon, David},
|
||
title={La guerre de l'information},
|
||
year={2023},
|
||
publisher={Tallandier},
|
||
keyword={guerre de l'information, cyberguerre, propagande},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author={Cristiano, Fabio and Broeders, Dennis and Delerue, François and Douzet, Frédérick and Géry, Aude},
|
||
title={Intelligence artificielle et conflit international dans le cyberespace},
|
||
year={2023},
|
||
publisher={Taylor \& Francis},
|
||
keywords={intelligence artificielle}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Choucri, Nazli and Clark, David D.},
|
||
title = {International Relations in the Cyber Age. The Co-Evolution Dilemma},
|
||
year = {2019},
|
||
publisher= {The MIT Press},
|
||
ISBN={9780262038911},
|
||
keyword={Cybercriminalité}}
|
||
|
||
|
||
@comment{D}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dahj, Jean Nestor},
|
||
title = {Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense},
|
||
year = {2022},
|
||
publisher= {Packt Publishing},
|
||
isbn = {978-1800209404},
|
||
keyword={Cybersécurité, Renseignement}}
|
||
|
||
@book{étiquette,
|
||
title={Cyber threat intelligence},
|
||
author={Dehghantanha, Ali and Conti, Mauro and Dargahi, Tooska},
|
||
year={2018},
|
||
publisher={Springer},
|
||
keyword = {Cyber Threat Intelligence, CTI, renseignement},
|
||
note = {Une bonne référence pour commencer dans la CTI}}
|
||
|
||
@book{étiquette,
|
||
author={DeNardis, Laura},
|
||
title={The Internet in everything},
|
||
year={2020},
|
||
publisher={Yale University Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Delerue, François},
|
||
title = {Cyberoperations and International Law},
|
||
year = {2020},
|
||
publisher= { Cambridge University Press},
|
||
keyword={Cyberdéfense, Cyberguerre, Relations internationales, Droit }}
|
||
|
||
@book{étiquette,
|
||
title = {Décider dans l'incertitude},
|
||
isbn = {978-2-7178-5335-3},
|
||
publisher = {Economica; 2e édition (22 janvier 2007)},
|
||
author = {Desportes, Vincent},
|
||
year = {2007},
|
||
keywords = {management, stratégie},
|
||
note = {https://www.amazon.fr/D\%C3\%A9cider-dans-lincertitude-Vincent-Desportes/dp/2717853359},
|
||
note = {le parallèle entre les opérations des forces armées permet de mieux penser une stratégie dans le monde de l’industrie.}}
|
||
|
||
@book{étiquette,
|
||
author = {Diogénes, Yuri and Ozkaya, Erdal},
|
||
title = {Cybersecurity. Attack and Defense Strategies: Counter modern threats and emply state of the art tools and techniques to protect your organization},
|
||
year = {2019},
|
||
publisher= {Packt Publishing},
|
||
keyword = {Cybersécurité, cybersecurity}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dosse, Stéphane and Kempf, Olivier},
|
||
title = {Stratégie dans le cyberespace},
|
||
year = {2011},
|
||
publisher= {L'esprit du livre},
|
||
keyword={Cyberstratégie, Cyberdéfense}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dosse, Stéphane and Kempf, Olivier and Malis, Christian},
|
||
title = {Cyberespace, nouveau domaine de la pensée stratégique},
|
||
year = {2013},
|
||
publisher= {Économica},
|
||
keyword={Cyberdéfense, Cyberstratégie},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dosse, Stéphane and Bonnemaison, Aymeric},
|
||
title = {Attention cyber ! Vers le combat cyber-electronique},
|
||
year = {2014},
|
||
publisher= {Économica},
|
||
keyword={Cyberdéfense, Cyberguerre},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Dykstra, Josiah and Spafford, Eugene and Metcalf, Leigh},
|
||
title = {Cybersecurity myths and Misconceptions},
|
||
year = {2023},
|
||
publisher= {Pearson Education},
|
||
keyword={Cybersécurité}}
|
||
|
||
|
||
@comment{E}
|
||
|
||
@book{étiquette,
|
||
author = {Egloff, Florian J.},
|
||
title = {Semi-State Actors in Cybersecurity},
|
||
year = {2022},
|
||
publisher = {Oxford University Press Inc},
|
||
isbn = {9780197579275},
|
||
keyword={Cybersécurité, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Elsberg, Marc},
|
||
title = {Black-out : demain il sera trop tard},
|
||
year = {2016},
|
||
publisher= {LGF},
|
||
ISBN= {9782253098690 },
|
||
note= {roman, anticipation},
|
||
keyword={Roman}}
|
||
|
||
@book{étiquette,
|
||
author = {Engebreton, Patrick},
|
||
title = {Les bases du Hacking},
|
||
year = {2017},
|
||
publisher = {Pearson},
|
||
ISBN = {2744066958},
|
||
note = {ouvrage technique},
|
||
keyword = {Hacking},
|
||
note={Vous souhaitez concrètement comprendre comment se déroule une cyberattaque ? Alors ce guide est fait pour vous ! Patrick Engebretson, professeur américain en sécurité informatique, va vous présenter chaque étape d’une attaque (reconnaissance, scan, exploitation, maintien d’accès) à l’aide d’un cas d’étude. Grâce à ses conseils, aux outils gratuits et aux lignes de commande présentées vous serez en mesure de refaire l’attaque depuis votre ordinateur personnel. Bien que ce livre comporte des éléments techniques, il reste accessible dans sa grande majorité à tous.}}
|
||
|
||
@comment{F}
|
||
|
||
@book{étiquette,
|
||
author = {Faillet, Caroline },
|
||
title = {L'art de la guerre digitale, survivre et dominer à l'ère du numérique},
|
||
year = {2016},
|
||
publisher = {Dunod},
|
||
isbn = {9782100748280},
|
||
keyword={Cyberguerre, Cyberstratégie, Géopolitique}}
|
||
|
||
@book{étiquette,
|
||
author = {Foster, James},
|
||
title = {Digital influence mercenaries, profits and power through information warfare},
|
||
year = {2022},
|
||
publisher = {US Naval Institute Press},
|
||
note = {Étude sur les acteurs d'influence privés avec une présentation de leurs méthodes et effets sur la population ciblée},
|
||
isbn = {9781682477229},
|
||
keyword={Cyberguerre, Guerre Hybride, Guerre de l'information}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Fourastier, Yannick and Pietre-Cambacedes, Ludovic},
|
||
title = {Cybersécurité des installations industrielles : défendre ses systèmes numériques},
|
||
year = {2015},
|
||
publisher = {Cépaduès},
|
||
note = {Destiné aux acteurs de la sécurité informatique dans le domaine des systèmes industriels},
|
||
isbn = {9782364931688},
|
||
keyword={Cybersécurité, systèmes industriels, SCADA}}
|
||
|
||
|
||
@book{cukier2022framers,
|
||
title={Framers: Human advantage in an age of technology and turmoil},
|
||
author={Cukier, Kenneth and Mayer-Sch{\"o}nberger, Viktor and de V{\'e}ricourt, Francis},
|
||
year={2022},
|
||
publisher={Penguin}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Freyssinet, Eric},
|
||
title = {La cybercriminalité en mouvement},
|
||
year = {2012},
|
||
publisher = {Hermes Science Publications},
|
||
isbn = {274623288X},
|
||
keyword={Cybercriminalité, Cybersécurité}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Futter, Andrew},
|
||
title = {Hacking The Bomb: Cyber Threats and Nuclear Weapons},
|
||
year = {2018},
|
||
publisher = {Georgetown University Press},
|
||
isbn = {9781626165649 }}
|
||
|
||
|
||
@comment{G}
|
||
|
||
@book{étiquette,
|
||
author = {Galeotti, Mark},
|
||
title = {The Weaponisation of Everything: A Field Guide to the New Way of War},
|
||
year = {2022},
|
||
publisher= {Yale University Press}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Gastineau, Pierre and Vasset, Philippe},
|
||
title = {Armes de déstabilisation massive. Enquête sur le business des fuites de données},
|
||
year = {2017},
|
||
publisher= {Fayard},
|
||
note= {Enquête sur les groupes d'attaquants et entreprises privées spécialisées dans l'exfiltration de données et la publication ou revente de celles-ci à des fins lucratives ou de déstabilisation},
|
||
keywords = {cybercriminalité,data,économie}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Gergorin, Jean-Louis and Isacc-Dognin, Léo},
|
||
title = {Cyber, la guerre permanente},
|
||
year = {2018},
|
||
publisher= {Les éditions du Cerf},
|
||
keywords = {cyberdéfense, cyberguerre, cyberwar}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Greenberg, Andy},
|
||
title = {Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers},
|
||
year = {2019},
|
||
isbn = {0385544405},
|
||
publisher= {Doubleday},
|
||
keywords = {Sandworm, hacking, cyberwar, Russie}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Greenberg, Andy},
|
||
title = {Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency},
|
||
year = {2022},
|
||
publisher = {Doubleday},
|
||
note = {Livre d'enquête consacré à l'utilisation des crypto-monnaies par des groupes cyber-criminels},
|
||
isbn = {978-0385548090},
|
||
keywords = {cryptomonnaies, cybercriminalité}}
|
||
|
||
@book{étiquette,
|
||
author = {Greenberg, Andy},
|
||
title = {Les criminels de la cryptomonnaie - Traque au coeur du Dark Web},
|
||
year = {2022},
|
||
publisher = {Saint-Simon},
|
||
note = {Traduction française par Henri Froment du livre "Tracers in the Dark"},
|
||
isbn = {978-2374350363}}
|
||
|
||
@book{étiquette,
|
||
author = {Roger, Grimes},
|
||
title = {Hacking the Hacker: Learn From the Experts Who Take Down Hackers },
|
||
year = {2017},
|
||
publisher = {Wiley},
|
||
note = {},
|
||
isbn = {9781119396215},
|
||
keyword = {Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Goldstein, Guy-Philippe},
|
||
title = {Babel minute zéro},
|
||
year = {2010},
|
||
isbn = {2070427501},
|
||
publisher= {Galimard}}
|
||
|
||
@book{étiquette,
|
||
author = {Gottshall, Jonathan},
|
||
title = {The Storytelling Animal: How Stories Make Us Human},
|
||
year = {2013},
|
||
isbn = {978-0544002340},
|
||
publisher= {Mariner Books},
|
||
keyword={InfoWar, Influence},
|
||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}}
|
||
|
||
@book{étiquette,
|
||
title = {Psychologie la manipulation et la soumission},
|
||
isbn = {978-2-10-071292-2},
|
||
publisher = {Dunod},
|
||
author = {Guéguen, Nicolas},
|
||
year = {2014},
|
||
keywords = {Renseignement, recherche universitaire, Psychologie sociale},
|
||
url = {https://www.amazon.fr/Psychologie-manipulation-soumission-Nicolas-Gu\%C3\%A9guen/dp/2100712926},
|
||
note = {une recherche universitaire sur la manipulation et la soumission un bon follow up a “Petit traité de manipulation à l'usage des honnêtes gens”}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Guisnel, Jean},
|
||
title = {Guerres dans le cyberespace : services secrets et Internet},
|
||
year = {1995},
|
||
publisher = {La Découverte},
|
||
note = {Un des premiers livres français d'investigation sur le monde du hacking, particulièrement sur les groupes US Legion of Doom (LoD) et Masters of Deception (MoD)},
|
||
isbn = {978-2707125026}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Guyaux, Jean},
|
||
title = {L'espion des sciences : les arcanes et les arnaques scientifiques du contre-espionnage},
|
||
year = {2002},
|
||
publisher = {Flammarion},
|
||
isbn = {2-08-068227-X},
|
||
note = {Le général Jean Guyaux a été détaché comme conseiller scientifique à la direction de la Surveillance du territoire (DST) de 1984 et 1995. Ces mémoires comprennent une partie parlant de la DST face à l'émergence de la piraterie informatique et la surveillance d'internshet.}}
|
||
|
||
|
||
@comment{H}
|
||
|
||
@book{étiquette,
|
||
author = {Harrel, Yannick},
|
||
title = {La cyberstratégie russe},
|
||
year = {2013},
|
||
publisher = {NUVIS},
|
||
address = {https://www.eyrolles.com/Informatique/Livre/la-cyberstrategie-russe-9782363670519/},
|
||
isbn = {9782363670519}}
|
||
|
||
@book{étiquette,
|
||
author = {Hecker, Marc and Rid, Thomas},
|
||
title = {War 2.0: Irregular Warfare in the information Age},
|
||
year = {2009},
|
||
publisher= {Praeger}}
|
||
|
||
@book{étiquette,
|
||
author = {Hémez, Rémy},
|
||
title = {Les opérations de déception, ruse et stratagèmes de guerre},
|
||
year = {2022},
|
||
publisher = {Perrin},
|
||
keyword = {déception, histoire},
|
||
note = {Ouvrage un peu éloigné de la cyber mais on en parle quand même dans la partie sur la déception aujourd'hui, mais très intétessant et très complet sur l'histoire des ruses de guerre. Toujours utile en cybersécurité également.},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Henning, Lahmann},
|
||
title = {Unilateral Remedies to Cyber Operations},
|
||
year = {2020},
|
||
publisher = {Cambridge University Press},
|
||
isbn = {9781108807050}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Hennion, Romain and Maklhouf, Anissa},
|
||
title = {La cybersécurité},
|
||
year = {2018},
|
||
publisher= {Eyrolles}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Henrotin, Joseph},
|
||
title = {L'art de la guerre à l'age des réseaux},
|
||
year = {2017},
|
||
publisher= {ISTE éditions}}
|
||
|
||
@book{étiquette,
|
||
title={Intelligence Services in the Information Age},
|
||
author={Herman, Michael},
|
||
year={2002},
|
||
ISBN = {9780714681962},
|
||
publisher={Routledge},
|
||
keyword={Cybersécurité}}
|
||
|
||
|
||
@book{étiquette,
|
||
title={Psychology of Intelligence Analysis},
|
||
author={Heuer, Richards J.},
|
||
year={2018},
|
||
ISBN = {1684222079},
|
||
publisher={Martino Fine Books},
|
||
keyword={Analyse, psychologie, renseignement},
|
||
note={un indispensable pour tout analyste traitant de la donnée en vue de fournir du renseignement}}
|
||
|
||
|
||
@book{étiquette,
|
||
title={How to measure anything in cybersecurity risk},
|
||
author={Hubbard, Douglas W and Seiersen, Richard},
|
||
year={2023},
|
||
publisher={John Wiley \& Sons},
|
||
keyword={Cybersécurité}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Huyghe, François-Bernard and Kempf, Olivier and Mazzucchi, Nicolas},
|
||
title = {Gagner les cyberconflits, au-delà du technique},
|
||
year = {2015},
|
||
publisher= {Economica},
|
||
keyword={Cyberguerre},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Huyghe, François-Bernard},
|
||
title = {La désinformation, les armes du faux},
|
||
year = {2016},
|
||
ISBN = {2200601360},
|
||
publisher = {Armand Colin}},
|
||
keyword={désinformaiton, propagande, réseaux sociaux, InfoWar}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Hypponen, Mikko},
|
||
title = {If it's smart, it's vulnerable},
|
||
year = {2022},
|
||
publisher = {Wiley},
|
||
isbn = {1119895189}}
|
||
|
||
|
||
@comment{I}
|
||
|
||
|
||
@comment{J}
|
||
|
||
@book{étiquette,
|
||
title={Cyberwar: how Russian hackers and trolls helped elect a president: what we don't, can't, and do know},
|
||
author={Jamieson, Kathleen Hall},
|
||
year={2020},
|
||
publisher={Oxford University Press}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Janczewsky, Lech and Colarik, Andrew},
|
||
title = {Cyber warfare and Cyberterrorism},
|
||
year = {2007},
|
||
publisher= {Information Science Reference},
|
||
keyword={CyberWar, Terrorisme, cyberguerre}}
|
||
|
||
|
||
@book{étiquette,
|
||
author= {Jankowicz, Nina},
|
||
title = {How to lose the Information War: Russia, Fake News and the Future of Conflict},
|
||
year = {2020},
|
||
publisher= {I. B. Tauris},
|
||
isbn={9780755642083},
|
||
keyword={InfoWar, guerre de l'information, réseaux sociaux}}
|
||
|
||
@book{étiquette,
|
||
author = {Jean, Aurélie},
|
||
title = {De l'autre côté de la machine},
|
||
year = {2019},
|
||
publisher = {L'Observatoire},
|
||
keyword = {algorithme, sociologie, intelligence artificielle},
|
||
note = {Un essai particulièrement accessible qui propose une réflexion sur comment progressivement les algorithmes ont boulversé notre quotidien.},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{joule1987petit,
|
||
title={Petit trait{\'e} de manipulation {\`a} l'usage des honn{\^e}tes gens},
|
||
author={Joule, Robert-Vincent and Beauvois, Jean-L{\'e}on and Deschamps, Jean Claude},
|
||
year={1987},
|
||
isbn = {978-2-7061-1885-2},
|
||
keywords = {Renseignement, interviewing, personal development, Psychologie sociale},
|
||
publisher={Presses universitaires de Grenoble Grenoble}}
|
||
|
||
@comment{K}
|
||
|
||
@book{étiquette,
|
||
title={Targeted},
|
||
author={Kaiser, Brittany},
|
||
year={2019},
|
||
publisher={Harper Collins Publishers}}
|
||
|
||
@book{étiquette,
|
||
author = {Kaplan, Fred},
|
||
title = {Dark Territory: The Secret History of Cyber War},
|
||
year = {2016},
|
||
publisher= {Simon and Schuster}}
|
||
|
||
@book{étiquette,
|
||
author = {Kempf, Olivier},
|
||
title = {Introduction à la cyberstratégie},
|
||
year = {2012},
|
||
publisher= {Economica},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Kitchin, Rob},
|
||
title = {The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences},
|
||
year = {2014},
|
||
publisher = {SAGE},
|
||
address = {},
|
||
note = {},
|
||
isbn = {978-1-4739-0826-0}}
|
||
|
||
@book{étiquette,
|
||
author = {Klimburg, Alexander},
|
||
title = {The Darkening Web: The War for Cyberspace},
|
||
year = {2017},
|
||
publisher= {Penguin Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Kramer, Franklin and Starr, Stuart and Wentz, Larry},
|
||
title = {Cyberpower and National Security. National Defense},
|
||
year = {2009},
|
||
publisher= {University Press and potomac books}}
|
||
|
||
@comment{L}
|
||
|
||
@book{étiquette,
|
||
author = {Lafourcade, Pascal and Onete, Cristina},
|
||
title = {20 énigmes ludiques pour se perfectionner en cryptographie},
|
||
year = {2023},
|
||
publisher = {Dunod},
|
||
keyword = {cryptographie},
|
||
note = {à écouter, l'épisode de NoLimit Sécu : https://www.nolimitsecu.fr/20-enigmes-ludiques-pour-se-perfectionner-en-cryptographie/},
|
||
isbn = {9782100855117}}
|
||
|
||
@book{lamdan2022data,
|
||
title={Data cartels: The companies that control and monopolize our information},
|
||
author={Lamdan, Sarah},
|
||
year={2022},
|
||
publisher={Stanford University Press}}
|
||
|
||
@book{etiquette,
|
||
author = {Lamy, Stéphanie},
|
||
title = {Agora toxica},
|
||
year = {2022},
|
||
publisher = {éditions du détour},
|
||
isbn = {979-10-97079-87-1}}
|
||
|
||
@book{étiquette,
|
||
title={Conflits, crimes et r{\'e}gulations dans le cyberespace},
|
||
author={Laurent, S{\'e}bastien-Yves},
|
||
volume={4},
|
||
year={2021},
|
||
keyword={cybersécurité, cyberstratégie, droit, géopolitique},
|
||
note={prix du livre cyber 2022},
|
||
isbn={1784057878},
|
||
publisher={ISTE Group}}
|
||
|
||
@book{étiquette,
|
||
title={Louis Pouzin, l'un des péres de l'internet},
|
||
author={Lebrument, Chantal et Soyez, Fabien},
|
||
year={2018},
|
||
publisher={Economica},
|
||
isbn={9782717870473},
|
||
note={Un éclairage sur un français à l'origine de l'Internet, une figure des débuts des réseaux},
|
||
keyword={Internet}}
|
||
|
||
@book{étiquette,
|
||
author = {Le Dez, Arnaud},
|
||
title = {Tactique cyber, le combat numérique},
|
||
year = {2019},
|
||
publisher= {Economica},
|
||
note = {Préface du Général Olivier BONNET DE PAILLERETS},
|
||
isbn = {978-2-7178-7060-2},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Lee, Marin},
|
||
title = {Cyber Threat Intelligence},
|
||
year = {2023},
|
||
publisher= {Wiley},
|
||
note = {retrouvez ici un billet de blog très complet sur cet ouvrage https://warnerchad.medium.com/cyber-threat-intelligence-by-martin-lee-notes-494a028c7d74},
|
||
url = {https://warnerchad.medium.com/cyber-threat-intelligence-by-martin-lee-notes-494a028c7d74},
|
||
isbn = {1119861748},
|
||
keyword = {Cyber Threat Intelligence}}
|
||
|
||
@book{étiquette,
|
||
author = {Lejeune, Yannick},
|
||
title = {Big, fast and Open Data},
|
||
year = {2014},
|
||
publisher = {EPITA},
|
||
keyword = {data},
|
||
note = {Ouvrage collectif réalisé à l'initiative de l'EPITA, il regroupe de nombreuses expertises et trace, dès 2014, les premières pistes sur l'avènement du monde de la donnée.},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Leonetti, Xavier and Féral-Schull, Christiane},
|
||
title = {Cybersécurité Mode d'emploi},
|
||
year = {2022},
|
||
publisher= {PUF},
|
||
isbn = {978-2-13-083369-7}}
|
||
|
||
@book{lessig2009code,
|
||
title={Code: And other laws of cyberspace},
|
||
author={Lessig, Lawrence},
|
||
year={2009},
|
||
publisher={ReadHowYouWant. com},
|
||
keyword = {Juridique, Law, droit}}
|
||
|
||
@book{étiquette,
|
||
author = {Levine, Yasha},
|
||
title = {Surveillance Valley, The Secret Military History of the Internet},
|
||
year = {2018},
|
||
publisher= {Public Affairs}}
|
||
|
||
@book{étiquette,
|
||
author = {Liang, Qiao and Xiangsui, Wang},
|
||
title = {La guerre hors limites},
|
||
year = {1999},
|
||
publisher= {Les éditions du Cerf},
|
||
isbn= {978-2743615178},
|
||
note = {Incontournable (entre autres) sur la pensée cyber chinoise.}}
|
||
|
||
@book{étiquette,
|
||
author = {Libicki, Martin},
|
||
title = {Cyberdeterrence and Cyberwar},
|
||
year = {2009},
|
||
publisher= {RAND Project Air force},
|
||
keyword={dissuasion, cyberstratégie, cyberguerre}}
|
||
|
||
@book{étiquette,
|
||
author = {Libicki, Martin},
|
||
title = {Conquest in cyberspace: national security and information},
|
||
year = {2007},
|
||
publisher= {Cambridge University Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Lilly, Bilyana},
|
||
title = {Russian Information Warfare},
|
||
year = {2022},
|
||
ISBN = {1682477193},
|
||
publisher= {Naval Institute Press }}
|
||
|
||
@book{étiquette,
|
||
author = {Limonier, Kevin},
|
||
title = {Ru.net},
|
||
year = {2018},
|
||
ISBN = {2355970327},
|
||
publisher= {Inventaire Eds De L'}}
|
||
|
||
@book{étiquette,
|
||
author = {Lonsdale, David},
|
||
title = {The Nature of War in the Information Age},
|
||
year = {2004},
|
||
publisher= {Frank Cass}}
|
||
|
||
|
||
@comment{M}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Maurer, Tim},
|
||
title = {Cyber Mercenaries : The State, Hackers, and Power},
|
||
year = {2018},
|
||
publisher= {Cambridge University Press}}
|
||
|
||
@book{étiquette,
|
||
author = {Menn, Joseph},
|
||
title = {Cult of the Dead Cow},
|
||
year = {2019},
|
||
publisher = {PublicAffairs},
|
||
isbn = {9781541724426}}
|
||
|
||
@book{étiquette,
|
||
author = {Mercier, Arnaud et Pignard-Cheynel, Nathalie},
|
||
title = {Commenter et partager l'actualité sur Twitter et Facebook},
|
||
year = {2018},
|
||
publisher = {Fondation maison des sciences de l'homme},
|
||
isbn = {978-2-7351-2398-8}}
|
||
|
||
@book{étiquette,
|
||
author = {Mitnick, Kevin},
|
||
title = {The Art of Deception - Controlling the Human Element of Security },
|
||
year = {2003},
|
||
publisher = {John Wiley \& Sons},
|
||
isbn = {9780764542800}}
|
||
|
||
@book{étiquette,
|
||
author = {Mitnick, Kevin},
|
||
title = {The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers},
|
||
year = {2005},
|
||
publisher = {John Wiley \& Sons},
|
||
isbn = {9780471782667},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Mitnick, Kevin},
|
||
title = {Ghost in the Wires: My Adventures as the World's Most Wanted Hacker},
|
||
year = {2012},
|
||
publisher = {Back Bay Books},
|
||
isbn = {9780316212182}}
|
||
|
||
@book{étiquette,
|
||
author = {Monte, Matthew},
|
||
title = {Network Attacks and Exploitation},
|
||
year = {2015},
|
||
publisher= {Wiley}}
|
||
|
||
@book{étiquette,
|
||
author = {Moore, Daniel},
|
||
title = {Offensive Cyber Operations},
|
||
year = {2022},
|
||
note = {https://www.hurstpublishers.com/book/offensive-cyber-operations/},
|
||
isbn = {9781787385610},
|
||
publisher= {Hurst}}
|
||
|
||
@book{étiquette,
|
||
author = {Morel, Camille},
|
||
title = {Les câbles sous-marins},
|
||
year = {2023},
|
||
publisher = {CNRS},
|
||
Keywords = {Infrastructures, câbles, cyberstratégie},
|
||
note = {Excellent ouvrage sur une thématique centrale pour comprendre les enjeux du numérique},
|
||
isbn = {2271141214}}
|
||
|
||
@book{étiquette,
|
||
author = {Motte, Martin},
|
||
title = {La mesure de la force},
|
||
year = {2018},
|
||
publisher= {Taillandier},
|
||
keyword={stratégie},
|
||
note={ouvrage qui ne traite pas uniquement de cyber mais de stratégie au sens large, un chapitre couvre les enjeux du combat à l'ère numérique}}
|
||
|
||
|
||
@comment{N}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Nye, Joseph},
|
||
title = {Cyberpower},
|
||
year = {2010},
|
||
publisher= {Harvard University}}
|
||
|
||
@comment{O}
|
||
|
||
@book{étiquette,
|
||
author = {O'Hara, Kieron and Hall, Wendy},
|
||
title = {Four Internets:Data, Geopolitics, and the Governance of Cyberspace },
|
||
year = {2021},
|
||
publisher = {Oxford University Press},
|
||
isbn = {978-0-19-752368-1},
|
||
keywords = {Data, Géopolitique, gourvenance, geopolitic, governance}}
|
||
|
||
@book{étiquette,
|
||
title={Renseignement et s{\'e}curit{\'e}-2e {\'e}d.},
|
||
author={Chopin, Olivier and Oudet, Benjamin},
|
||
year={2019},
|
||
publisher={Armand Colin},
|
||
keyword = {Renseignement}}
|
||
|
||
|
||
@comment{P}
|
||
|
||
@book{étiquette,
|
||
title = {Negotiating {Like} {Lives} {Are} on the {Line}: {The} {Essentials} of {Crisis} {Negotiation} for {Use} in {Everyday} {Situations}},
|
||
isbn = {978-1-946754-20-2},
|
||
publisher = {CopWorld Press},
|
||
author = {Pultz, Jonathan},
|
||
year = {2022},
|
||
keywords = {négociation},
|
||
url = {https://www.amazon.fr/Negotiating-Like-Lives-Are-Line/dp/194675420X},
|
||
note = {parce qu’on négocie tous, tous les jours … }}
|
||
|
||
@book{étiquette,
|
||
author = {Patino, Bruno},
|
||
title = {La civilisation du poisson rouge. Petit traité sur le marché de l'attention},
|
||
year = {2019},
|
||
publisher = {Grasset et Fasquelle},
|
||
isbn = {978-2-253-10125-3}}
|
||
|
||
@book{étiquette,
|
||
author = {Patino, Bruno},
|
||
title = {Tempête dans le bocal, la nouvelle civilisation du poisson rouge},
|
||
year = {2022},
|
||
publisher = {Grasset et Fasquelle},
|
||
isbn = {978-2-246-82896-9}}
|
||
|
||
@book{étiquette,
|
||
author = {Groupe Pandoras},
|
||
title = {cybersécurité - méthode de gestion de crise},
|
||
year = {2021},
|
||
publisher= {VA-EDITIONS}}
|
||
|
||
@book{étiquette,
|
||
author = {Payne, Kenneth},
|
||
title = {I, Warbot: The Dawn of Artificially Intelligent Conflict},
|
||
year = {2021},
|
||
publisher= {Hurst Publishers}}
|
||
|
||
@book{étiquette,
|
||
author = {Pelroth, Nicole},
|
||
title = {This is How they Tell me the World Ends: the Cyberweapons Arms Race},
|
||
year = {2021},
|
||
publisher= {Bloomsburry Publishing}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Penalba, Pierre},
|
||
title = {Cyber crimes: un flic 2.0 raconte},
|
||
year = {2021},
|
||
publisher = {Albin Michel},
|
||
isbn = {978-2226445957}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Perkovich, George and Ariel, Levite},
|
||
title = {Understanding Cyber conflict: 14 analogies},
|
||
year = {2017},
|
||
publisher = {Georgetown University Press}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Pernet, Cédric},
|
||
title = {Sécurité et espionnage informatique},
|
||
year = {2014},
|
||
publisher= {Eyrolles},
|
||
isbn = {9782212139655},
|
||
note={Maitriser sa sécurité signifie que l’on doit comprendre les menaces auxquelles il faut faire face et c’est justement l’objet de ce livre consacré aux APT. Les APT, pour Advanced Persistent Threats, sont les menaces du haut du spectre (étatiques ou criminelles). L’auteur va ainsi définir ce terme qui fait débat au sein de la communauté cyber avant d’en décrire les différentes phases. L’exposé est enrichi d’exemples concrets et aborde certains aspects techniques. Il ne couvre cependant pas les actions à mener pour répondre à ce type de menace (la réponse à incident). Pour les débutants, il est intéressant de noter que si les APT sont des menaces avec un impact potentiel élevé, il ne s’agit pas forcément des attaques les plus sophistiquées techniquement.},
|
||
keyword={cybersécurité, APT}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Pharo, Patrick},
|
||
title = {Les data contre la liberté},
|
||
year = {2022},
|
||
publisher = {PUF},
|
||
isbn = {978-2-13-083304-8}}
|
||
|
||
@book{étiquette,
|
||
author = {Pillou, Jean-François et Bay, Jean-Philippe},
|
||
title = {Tout sur la sécurité informatique},
|
||
year = {2020},
|
||
publisher = {Dunod},
|
||
note = {excellent ouvrage généraliste pour bien débutter avec les bases du domaine},
|
||
keyword = {Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Pomerantsev, Peter},
|
||
title = {This Is Not Propaganda : Adventures in the War Against Reality},
|
||
year = {2019},
|
||
publisher = {Faber \& Faber},
|
||
keyword = {propagande, Russie},
|
||
note = {}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Porche, Isaac},
|
||
title = {Cyberwarfare: An Introduction to Information-Age Conflict },
|
||
year = {2019},
|
||
ISBN = {978-1630815769},
|
||
publisher= {Artech House}}
|
||
|
||
|
||
@comment{Q}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Quemener, Myriam and Ferry, Joël},
|
||
title = {Cybercriminalité : défi mondial et réponse},
|
||
year = {2007},
|
||
publisher= {Economica}}
|
||
|
||
@book{étiquette,
|
||
author = {Quesard, Maud et Marangé, Céline},
|
||
title = {Les guerres de l'information à lère numérique},
|
||
year = {2021},
|
||
publisher= {Presses Universitaires de France},
|
||
keyword={guerre de l'information}}
|
||
|
||
|
||
@comment{R}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Raimondo, Laurane},
|
||
title = {Les fondamentaux de la gestion de crise cyber},
|
||
year = {2022},
|
||
publisher= {Ellipses}}
|
||
|
||
@book{étiquette,
|
||
author = {Rains, Tim},
|
||
title = {Cybersecurity Threats, Malware Trends, and Strategies: Learn to mitigate exploits, malware, phishing, and other social engineering attacks},
|
||
year = {2020},
|
||
publisher = {Packt Publishing Ltd}}
|
||
|
||
@book{étiquette,
|
||
author={Rains, Tim and CISSP, Timothy Youngblood},
|
||
title={Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization},
|
||
year={2023},
|
||
publisher={Packt Publishing Ltd}}
|
||
|
||
@book{étiquette,
|
||
author = {Rascagnères, Paul and Larinier, Sébastien},
|
||
title = {Cybersécurité et Malwares. Détection, analyse et Threat Intelligence},
|
||
year = {2022},
|
||
publisher = {ENI},
|
||
note = {4ème édition (2022) d'un livre de référence sur le sujet},
|
||
isbn = {978-2409038105}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Rattray, Gregory},
|
||
title = {Strategic warfare in cyberspace},
|
||
year = {2001},
|
||
publisher= {Mass MIT Press}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Raufast, Pierre},
|
||
title = {Habemus piratam},
|
||
year = {2022},
|
||
publisher = {Forges Vulcain},
|
||
isbn = {9782373051193},
|
||
note = {Un très bon roman français dans le domaine Cyber/Hacking, auteur membre de l'équipe SSI chez Michelin}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Rid, Thomas},
|
||
title = {Cyber War will not take place},
|
||
year = {2013},
|
||
publisher= {Oxford University Press},
|
||
keyword={CyberWar, cyberguerre, cyberstratégie},
|
||
note={Excellent livre qui ne perd rien de son actualité, fait partie des 5 recommendations de lecture sur le sujet par le Modern Warfare Institue de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Rid, Thomas},
|
||
title = {Active Measures: The Secret History of Disinformation and Political Warfare},
|
||
year = {2020},
|
||
publisher= {Profile Books Ltd},
|
||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Roberts, Scott J. and Brown, Rebekah},
|
||
title = {Intelligence-Driven Incident Response, 2nd Edition},
|
||
year = {2023},
|
||
publisher = {O'Reilly},
|
||
isbn = {9781098120627},
|
||
note = {Un livre sur le renseignement appliqué à la réponse à incident, donc la CTI.}}
|
||
|
||
@book{étiquette,
|
||
author = {Roccia, Thomas},
|
||
title = {Visual Threat Intelligence, An illustrated Guide For Threat Researchers},
|
||
year = {2023},
|
||
note = {livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel},
|
||
keyword = {Cyber Threat Intell, CTI}}
|
||
|
||
@book{étiquette,
|
||
author = {Roscini, Marco},
|
||
title = {Cyber Operations and the Use of Force in International Law},
|
||
year={2014},
|
||
publisher = {Oxford University Press},
|
||
isbn={9780199655014},
|
||
keyword = {cyber warfare, international law, use of force, international humanitarian law, self-defence, cyber attack}}
|
||
|
||
@book{étiquette,
|
||
author = {Roux, Thierry},
|
||
title = {L'art de la guerre cyber : vers une intelligence des crises},
|
||
year = {2020},
|
||
publisher = {Nunkee Editions},
|
||
isbn = {978-2492639005},
|
||
keyword = {Cyberguerre, gestion de crise}}
|
||
|
||
|
||
@comment{S}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Salamon, Yann},
|
||
title = {Cybersécurité et Cyberdéfense : enjeux stratégiques},
|
||
year = {2020},
|
||
publisher= {Ellipses},
|
||
keyword = {cybersécurité, cyberdéfense, menace, géopolitique},
|
||
note = {S’adressant à un panel de publics divers, cet ouvrage balaie un large panorama de sujets structurants liés à la sécurité numérique. Prenant comme point de départ la compréhension du cyberespace, il en décrit quelques propriétés importantes : tendances, enjeux, caractéristiques « topologiques », acteurs en présence.}}
|
||
|
||
@book{étiquette,
|
||
author = {Salobir, Eric},
|
||
title = {Dieu et la silicon valley},
|
||
year = {2020},
|
||
publisher = {Buchet Chastel},
|
||
note = {Ouvrage stimulant sur la place de la technologie dans nos vies et une réflexion sur le lien entre foi et technique},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Sanger, David},
|
||
title = {Confront and Conceal: Obama’s secret wars},
|
||
year = {2012},
|
||
publisher= {Crown},
|
||
keyword = {stratégie, géopolitique,cyberguerre},
|
||
note = {Un livre à lire pour comprendre l'histoire récente des conflits numériques et la conduite de cette guerre par l'administration Obama}}
|
||
|
||
@book{étiquette,
|
||
author = {Sanger, David},
|
||
title = {The Perfect Weapon: War, Sabotage and Fear in the Cyber Age},
|
||
year = {2019},
|
||
publisher= {Crown},
|
||
isbn = {978-0451497901}}
|
||
|
||
@book{étiquette,
|
||
author = {Sarfraz, Muhammad},
|
||
title = {Cybersecurity Threats with New Perspectives},
|
||
year = {2021},
|
||
publisher = {BoD--Books on Demand}}
|
||
|
||
@book{étiquette,
|
||
author = {Schmitt, Michael N. and Vihul, Liis},
|
||
title = {Tallinn manual 2.0 on the international law applicable to cyber operations},
|
||
year = {2017},
|
||
publisher = {Cambridge university press},
|
||
address = {Cambridge, Royaume-Uni},
|
||
isbn = {978-1-316-63037-2}}
|
||
|
||
@book{étiquette,
|
||
author = {Schneier, Bruce},
|
||
title = {Applied Cryptography},
|
||
year = {1996},
|
||
publisher= {John Wiley \& Sons}}
|
||
|
||
@book{étiquette,
|
||
author = {Schneier, Bruce},
|
||
title = {Secrets and Lies: Digital Security in a Networked World},
|
||
year = {2004},
|
||
publisher= {John Wiley \& Sons},
|
||
isbn = {0471453803}}
|
||
|
||
@book{étiquette,
|
||
author = {Schneier, Bruce},
|
||
title = {Cryptography Engineering},
|
||
year = {2010},
|
||
publisher= {John Wiley \& Sons}}
|
||
|
||
@book{étiquette,
|
||
author = {Schoch, Patrice and Akdim, Hamid and Sennouni, Amine and Jourt-Pineau, Cécilia},
|
||
title = {Pilotage stratégique 5.0 \& résilience des organisations},
|
||
year = {2021},
|
||
publisher = {L'Harmatan},
|
||
isbn = {978-2-343-23786-2}}
|
||
|
||
@book{étiquette,
|
||
author = {Schradie, Jen},
|
||
title = {L'illusion de la démocratie numérique. Internet est-il de droite ?},
|
||
year = {2022},
|
||
publisher= {Quanto},
|
||
isbn = {978-288915-454-8}}
|
||
|
||
@book{étiquette,
|
||
author = {Scott Card, Orson},
|
||
title = {Ender's Game},
|
||
year = {1985},
|
||
publisher= {Mass Market Paperback},
|
||
isbn = {9780812550702},
|
||
keyword={Roman},
|
||
note={Une des 5 références sur le sujet selon le Modern Warfare Institute de West Point : https://mwi.usma.edu/war-books-cyber-and-influence-for-nonexperts/}}
|
||
|
||
@book{étiquette,
|
||
author = {Séjean, Michel},
|
||
title = {Code de la cybersécurité},
|
||
year = {2022},
|
||
publisher= {Lefevre Dalloz},
|
||
keyword={droit},
|
||
note={un incontournable pour ceux qui souhaitent maitriser le droit associé à la cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Shevelyov, Nicholas},
|
||
title = {Cyber War ... and Peace:Building Digital Trust Today with History as Our Guide},
|
||
year = {2017},
|
||
publisher = {Lioncrest Publishing},
|
||
isbn = {978-1544517094},
|
||
keyword = {Cyberwar, cyberguerre},
|
||
note = {}}
|
||
|
||
@book{étiquette,
|
||
author = {Shimomura,Tsutomu and Markoff, John},
|
||
title = {Cybertraque. La chasse au pirate informatique le plus célèbre des États-Unis},
|
||
year = {1998},
|
||
publisher = {Plon},
|
||
note = {Traduction française de "Katching Kevin", récit du hack et de la traque de Kevin Mitnick en 1995},
|
||
isbn = {978-2259184021}}
|
||
|
||
@book{étiquette,
|
||
author = {Shirky, Clay},
|
||
title = {Cognitive Surplus: Creativity and Generosity in a Connected Age},
|
||
year = {2010},
|
||
publisher= {Penguin Press},
|
||
isbn = {9780141041605},
|
||
note = {In Cognitive Surplus, Internet guru Clay Shirky forecasts the thrilling changes we will all enjoy as new digital technology puts our untapped resources of talent and goodwill to use at last. }}
|
||
|
||
@book{étiquette,
|
||
author = {Sikorski, Michael and Honig, Andrew},
|
||
title = {Practical Malware Analysis: the Hands-On Guide to Dissecting Malicious Software},
|
||
year = {2012},
|
||
publisher= {No Starch Press}}
|
||
|
||
@book{étiquette,
|
||
title = {The {Infinite} {Game}},
|
||
isbn = {978-0-7352-1350-0},
|
||
publisher = {Portfolio},
|
||
author = {Sinek, Simon},
|
||
year = {2019},
|
||
keywords = {personal development},
|
||
url = {https://www.amazon.fr/Infinite-Game-Simon-Sinek/dp/073521350X},
|
||
note = {ou comment penser long terme, et pourquoi il faut arrêter de réfléchir court terme une lecture intéressante lors de la définition d’une stratégie.}}
|
||
|
||
@book{étiquette,
|
||
author = {Singer, P.W and Cole, August},
|
||
title = {La flotte fantôme},
|
||
year = {2022},
|
||
publisher= {Folio},
|
||
isbn = {9780358108474},
|
||
Keyword={Roman, Cyberguerre}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Singer, P.W and Brooking, Emerson T},
|
||
title = {LikeWar: The Weaponization of Social Media},
|
||
year = {2019},
|
||
publisher= {Mariner Books},
|
||
isbn = {978-2-07-297935-4},
|
||
Keyword={Guerre de l'information, InfoWar}}
|
||
|
||
@book{étiquette,
|
||
author = {Smeets, Max},
|
||
title = {No Shortcuts. Why States Struggle to Develop a Military Cyber-Force},
|
||
year = {2022},
|
||
publisher= {Hurst}}
|
||
|
||
@book{étiquette,
|
||
author = {Stamboliyska, Rayna},
|
||
title = {La face cachée d'internet : hackers},
|
||
year = {2017},
|
||
publisher= {Larousse}}
|
||
|
||
@book{étiquette,
|
||
author={Steffens, Timo},
|
||
title={Attribution of Advanced Persistent Threat},
|
||
year={2020},
|
||
publisher={Springer Vieweg},
|
||
keyword={Cybersécurité, Attribution},
|
||
note = {un livre qui traite en profondeur la problématique de l’attribution, mais aussi l’ensemble des concepts clés de la CTI}}
|
||
|
||
@book{étiquette,
|
||
author={stengel, Richard},
|
||
title={Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About It},
|
||
year={2019},
|
||
publisher={Atlantic Monthly Press},
|
||
isbn={9780802147981},
|
||
keyword={guerre de l'information, infowar}}
|
||
|
||
@book{étiquette,
|
||
title={Cyber security and the politics of time},
|
||
author={Stevens, Tim},
|
||
year={2016},
|
||
publisher={Cambridge University Press},
|
||
keyword={Cybersécurité}}
|
||
|
||
@book{étiquette,
|
||
author = {Stoll, Clifford},
|
||
title = {The Cuckoo's Egg},
|
||
year = {1989},
|
||
publisher= {New York: Doubleday}}
|
||
|
||
|
||
@comment{T}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Tarissan, Fabien},
|
||
title = {Au coeur des réseaux, des sciences aux citoyens},
|
||
year = {2019},
|
||
publisher = {Le Pommier},
|
||
isbn = {978-2-7465-1666-3}}
|
||
|
||
@book{étiquette,
|
||
author = {Thames, Lane and Schaefer, Dirk},
|
||
title = {Cybersecurity for industry 4.0},
|
||
year = {2017},
|
||
publisher = {Springer},
|
||
keyword = {cybersécurité, cybersecurity}}
|
||
|
||
@book{étiquette,
|
||
author = {Triffault, Alexandre},
|
||
title = {The Little Black Book of Lockpicking: Lock opening and Bypass techniques for Security Professionals},
|
||
year = {2021},
|
||
isbn = {979-8544602156},
|
||
publisher= {publication indépendante}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Triandafillidou, Olga},
|
||
title = {Cybermenaces, un état de siège},
|
||
year = {2019},
|
||
publisher = {alsyse-news.com},
|
||
isbn = {978-1706499497}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Troia, Vinny},
|
||
title = {Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques},
|
||
year = {2020},
|
||
publisher= {Sybex Inc}}
|
||
|
||
|
||
@comment{U}
|
||
|
||
|
||
@comment{V}
|
||
|
||
@book{étiquette,
|
||
author={Valeriano, Brandon and Maness, Ryan, C},
|
||
title={Cyber War vs cyber realities},
|
||
year={2015},
|
||
publisher={Oxford University Press},
|
||
keyword={cyberwar}}
|
||
|
||
@book{étiquette,
|
||
author = {Van Puyvelde, Damien and Brantly, Aaron F.},
|
||
title = {Cybersecurity. Politics, Governance and Conflict in Cyberspace},
|
||
year = {2019},
|
||
publisher= {Polity}}
|
||
|
||
@book{étiquette,
|
||
author = {Ventre, Daniel},
|
||
title = {Cyberattaque et cyberdéfense},
|
||
year = {2011},
|
||
publisher= {Lavoisier},
|
||
note = {disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
author = {Ventre, Daniel},
|
||
title = {Cyberguerre et guerre de l’information. Stratégie,règles et enjeux},
|
||
year = {2010},
|
||
publisher= {Lavoisier}}
|
||
|
||
@book{étiquette,
|
||
author = {Ventre, Daniel},
|
||
title = {La guerre de l'information},
|
||
year = {2007},
|
||
isbn = {978-2-7462-1883-3},
|
||
publisher= {Lavoisier}}
|
||
|
||
@book{étiquette,
|
||
author = {Ventre, Daniel},
|
||
title = {Information Warfare},
|
||
year = {2016},
|
||
isbn = {978-1-848216600},
|
||
publisher= {Wiley},
|
||
note={disponible prêt adhérents M82}}
|
||
|
||
@book{étiquette,
|
||
title={La désinformation: arme de guerre},
|
||
author={Volkoff, Vladimir},
|
||
year={2004},
|
||
publisher={l'Age d'homme},
|
||
keyword = {Désinformation},
|
||
note = {}}
|
||
|
||
|
||
@comment{W}
|
||
|
||
|
||
@comment{X}
|
||
|
||
|
||
@comment{Y}
|
||
|
||
|
||
@comment{Z}
|
||
|
||
|
||
@book{étiquette,
|
||
|
||
author = {Zalewski, Michal},
|
||
title = {Menaces sur le réseau, Sécurité informatique : guide pratique des attaques passives et indirectes},
|
||
year = {2008},
|
||
publisher= {Pearson},
|
||
isbn = {978-2-7440-2226-5},
|
||
note = {Superbe livre pout s'initier à la sécurité informatique au niveau réseau / protocolaire. Version FR du livre publié en 2005 "Silence on the Wire"}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Zalewski, Michal},
|
||
title = {The Tangled Web: A Guide to Securing Modern Web Applications},
|
||
year = {2011},
|
||
publisher = {No Starch Press},
|
||
isbn = {9781593273880}}
|
||
|
||
|
||
@book{étiquette,
|
||
author = {Zegart, Amy},
|
||
title = {Spies, Lies, and Algorithms: The History and Future of American Intelligence},
|
||
year = {2022},
|
||
publisher= {Princeton},
|
||
isbn = {9780691147130}}
|
||
|
||
@book{étiquette,
|
||
author = {Zetter, Kim},
|
||
title = {Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon},
|
||
year = {2014},
|
||
publisher= {Crown},
|
||
isbn = {077043617X},
|
||
note = {The story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare}}
|
||
|
||
@book{étiquette,
|
||
author = {Zittrain, Jopnathan},
|
||
title = {The future of the Internet: And How to Stop it},
|
||
year = {2008},
|
||
publisher= {Yale University Press},
|
||
isbn = {},
|
||
keyword = {internet, governance}}
|
||
|
||
@book{étiquette,
|
||
author = {Zuboff, Shoshana},
|
||
title = {The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power},
|
||
year = {2019},
|
||
publisher= {Profile Books Ltd},
|
||
isbn = {1781256853},
|
||
note = {The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control us. }}
|