Bibliography/mars_2023.bib
Sebastien Larinier 627c45504f
Rename Mars 2023 to mars_2023.bib
normalisation des noms de fichier
2023-03-13 08:48:32 +01:00

1390 строки
36 KiB
BibTeX
Исходник Ответственный История

Этот файл содержит неоднозначные символы Юникода

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

-----------------------------------------------------------------------------------------------
A
@book{étiquette,
author = {Abiteboul,Serge and Cattan, Jean},
title = {Nous sommes les réseaux sociaux},
year = {2022},
publisher= {Odile Jacob},
isbn = {9782415001704},
keyword={Réseaux sociaux}}
@book{étiquette,
author = {Agence nationale de la sécurité des systèmes dinformation},
title = {Maîtrise du risque numérique, latout confiance},
year = {2019},
publisher= {Agence nationale de la sécurité des systèmes dinformation},
keyword={Cybersécurité}}
@book{étiquette,
author = {Adair, Seven AND Hale, Michael AND Hartsein, Blake and Matthew, Richard},
title = {Malware analyst's Cookbook},
year = {2011},
publisher= {Wiley},
isbn = {978-0-470-61303-0},
note = {Une référence pour s'initier à l'analyse de codes malveillants.},
keyword={Cybersécurité, Malware, Hacking}}
@book{étiquette,
author = {Allsopp, Will},
title = {Advanced penetration testing},
year = {2017},
publisher= {Wiley},
isbn = {978-1-119-36786-0},
note = {Même si les techniques de ce livre sont connues, il constitue une vue intéressante sur les potentiels vecteurs d'infection et d'ingénierie sociale pouvant être mis en oeuvre par des attaquants.},
keyword={Cybersécurité, Hacking}}
@book{anderson2012longue,
title={La longue traine},
author={Anderson, Chris},
year={2012},
publisher={Pearson}}
@book{étiquette,
author = {Arpagian, Nicolas},
title = {Frontières.com},
year = {2022},
isbn = {103292134X},
publisher= {L'Observatoire},
Keyword={Géopolitique}}
@book{étiquette,
author = {Arpagian, Nicolas},
title = {La cyberguerre, la guerre numérique a commencé},
year = {2009},
publisher= {Vuibert},
Keyword={Cyberguerre}}
@book{étiquette,
author = {Arpagian, Nicolas},
title = {La cybersécurité},
year = {2018},
publisher= {PUF},
Keyword={Cybersécurité}}
@book{étiquette,
author = {Arquilla, John},
title = {Bitskrieg, the new challenge of cyberwarfare},
year = {2021},
publisher= {Polity},
Keyword={Cyberguerre, Géopolitique}}
@book{étiquette,
author = {Arquilla, John and Ronfeldt, David},
title = {Networks and Netwar: the Future of Terror, Crime and Militancy},
year = {2002},
publisher= {Rand},
Keyword={Cyberguerre}}
@book{étiquette,
author = {Arutunyan, Anna},
title = {Hybrid Warriors, Proxies, Freelancers and Moscow's Struggle for Ukraine},
year = {2022},
publisher= {Hurst Publisher},
Keyword={Cyberguerre, Russie, Ukraine, Guerre Hybride}}
@book{austin2018cybersecurity,
title={Cybersecurity in China: The next wave},
author={Austin, Greg},
year={2018},
publisher={Springer},
keyword={Cybersécurité, Chine, Géopolitique}}
B
@book{badouard2017desenchantement,
title={Le d{\'e}senchantement de l'internet. D{\'e}sinformation, rumeur et propagande},
author={Badouard, Romain},
year={2017},
publisher={FYP {\'e}ditions},
note = {Désinformation},
keyword = {Désinformation, Propagande}}
@book{étiquette,
author = {Billois, Jérome AND Nicolas, Cougot},
title = {Cyberattaques, les dessous d'une menace mondiale},
year = {2022},
publisher= {Hachette},
isbn = {978-2-915547-66-5},
Keyword={Cyberguerre, Géopolitique}}
@book{étiquette,
author = {Bittman, Ladistlav},
title = {The Deception Game},
year = {1981},
publisher= {Ballantine Books},
Keyword={Renseignement, Russie}}
@book{étiquette,
author = {Bittman, Ladistlav},
title = {The KGB and Soviet Disinformation: An Insider's View},
year = {1985},
publisher= {Brassey's Inc},
Keyword={Renseignement, Désinformation, Russie}}
@book{étiquette,
author = {Blondeau, Olivier},
title = {Devenir média. L'activisme sur Internet, entre défection et expérimentation},
year = {2007},
publisher = {Édition Amsterdam},
isbn = {978-2-915547-66-5},
Keyword={Guerre de l'information}}
@book{étiquette,
author = {Blondeau, Olivier AND Latrive, Florent},
title = {Libres enfants du savoir numérique. Anthologie du libre},
year = {2000},
publisher = {Éditions de L'Éclat},
note = {Liber},
isbn = {978-2-84162-043-2}}
@book{étiquette,
author = {Bortzmeyer, Stéphane},
title = {Cyberstructure, l'Internet un espace politique},
year = {2018},
publisher= {C\&F Editions},
Keyword={Géopolitique}}
@book{étiquette,
author = {Boyer, Bertrand},
title = {Guérilla 2.0, guerres irrégulières dans le cyberespace},
year = {2020},
publisher= {École de Guerre},
keyword={Guerre de l'information, Cyberguerre, Guerre Hybride}}
@book{étiquette,
author = {Boyer, Bertrand},
title = {Cyberstratégie, l'art de la guerre numérique},
year = {2012},
publisher= {NUVIS},
keyword={Cyberguerre, Cyberstratégie}}
@book{étiquette,
author = {Boyer, Bertrand},
title = {Cybertactique, conduire la guerre numérique},
year = {2014},
publisher= {NUVIS},
keyword={Cyberguerre, Cyberstratégie}}
@article{boyer2017influence,
title={Linfluence {\guillemotleft}au contact{\guillemotright} et au clavier},
author={Boyer, Bertrand},
journal={DSI (D{\'e}fense et S{\'e}curit{\'e} Internationale)},
number={131},
pages={34--39},
year={2017},
publisher={JSTOR},
keyword={Guerre de l'information, Influence}}
@article{boyer2017countering,
title={Countering hybrid threats in cyberspace},
author={Boyer, Bertrand},
journal={Cyber Defense Review},
volume={2},
year={2017},
keyword={Cyberguerre, Guerre Hybride}}
@book{étiquette,
author = {Brenner,Susan},
title = {Cyberthreats, the emerging fault line of the Nation State},
year = {2009},
publisher= {Oxford University Press},
keyword={Cyberguerre, Géopolitique}}
@book{étiquette,
author = {Bronner, Gérald},
title = {Apocalypse cognitive},
year = {2021},
publisher = {PUF},
note = {},
isbn = {2130733042},
keyword={Guerre de l'information, Désinformation}}
@book{étiquette,
author = {Brunton, Finn and Nissenbaum, Helen},
title = {Obfuscation: A User's Guide for Privacy and Protest},
year = {2015},
isbn = {0262029731},
publisher = {The MIT Press},
keyword={Cybersécurité}}
@book{étiquette,
author = {Bryant, William},
title = {International Conflict and Cyberspace superiority},
year = {2016},
publisher= {Routledge},
keyword={Géopolitique, Cyberguerre}}
@book{étiquette,
author = {Buchanan, Ben},
title = {The Cybersecurity Dilemna : Hacking, Trust and Fear Between Nations},
year = {2019},
publisher= {C Hurst Co Publishers},
keyword={Cyberguerre, Géopolitique}}
@book{étiquette,
author = {Buchanan, Ben},
title = {The Hacker and the state: The New Normal of Geopolitics},
year = {2020},
publisher= {Harvard University Press},
keyword={Géopolitique}}
@book{étiquette,
author = {Buchan, Russell},
title = {Cyberespionage and international law},
year = {2018},
publisher= {Hart Publishing},
keyword={Renseignement, Géopolitique}}
@book{étiquette,
author = {Bulinge, Franck},
title = {De lespionnage au renseignement},
year = {2012},
publisher= {Vuibert},
isbn = {978-2-311-00658-2},
keyword={Renseignement}}
C
@book{cardon2015quoi,
title={A quoi r{\^e}vent les algorithmes : nos vies {\`a} lheure des Big data},
author={Cardon, Dominique},
year={2015},
publisher={M{\'e}dia Diffusion},
keyword={Humanités numériques}}
@book{étiquette,
author = {Carr, Jeffrey},
title = {Inside Cyber Warfare, mapping the cyber underworld},
year = {2009},
publisher= {O'Reilly},
keyword={Cyberguerre, Géopolitique}}
@book{étiquette,
author = {Cattaruzza, Amaël and Danet, Didier and Taillat, Stéphane},
title = {La cyberféfense, politique de l'espace numérique},
year = {2023},
publisher= {Armand Colin},
note= {2ème édition. Mise à jour en 2023},
keyword={Cyberdéfense, Géopolitique, Humanités numériques}}
@book{étiquette,
author = {Chavalarias, David},
title = {Toxic Data},
year = {2022},
publisher = {Flammarion},
address = {},
note = {},
isbn = {978-2-08-027494-6},
keyword={Désinformation}}
@book{étiquette,
author = {Clancy, Tom},
title = {Cybermenace},
year = {2013},
publisher= {Albin Michel},
keyword={Cyberguerre, Roman}}
@book{étiquette,
author = {Clarke, Richard and Knake, Robert},
title = {Cyberwar: the next Threat to National Security and what to do about it},
year = {2010},
publisher= {Ecco Press},
keyword={Cyberguerre, Géopolitique}}
@book{étiquette,
author = {Chesney, Robert and Smeets Max},
title = {Deter, Disrupt, or Deceive},
year = {2023},
publisher= {Georgetown University Press},
ISBN= {9781647123260},
keyword={Cyberguerre, Cyberdéfense}}
@book{étiquette,
author = {Clough, Jonathan},
title = {Principles of cybercrime},
year = {2015},
publisher= {Cambridge University Press},
ISBN={9781139540803},
keyword={Cybercriminalité}}
@book{étiquette,
author = {Choucri, Nazli AND Clark, David D.},
title = {International Relations in the Cyber Age. The Co-Evolution Dilemma},
year = {2019},
publisher= {The MIT Press},
ISBN={9780262038911},
keyword={Cybercriminalité}}
D
@book{étiquette,
author = {Dahj, Jean Nestor},
title = {Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense},
year = {2022},
publisher= {Packt Publishing},
isbn = {978-1800209404},
keyword={Cybersécurité, Renseignement}}
@book{denardis2020internet,
title={The Internet in everything},
author={DeNardis, Laura},
year={2020},
publisher={Yale University Press}}
@book{étiquette,
author = {Delerue, François},
title = {Cyberoperations and International Law},
year = {2020},
publisher= { Cambridge University Press},
keyword={Cyberdéfense, Cyberguerre, Relations internationales, Droit }}
@book{étiquette,
author = {Diogénes, Yuri and Ozkaya, Erdal},
title = {Cybersecurity. Attack and Defense Strategies: Counter modern threats and emply state of the art tools and techniques to protect your organization},
year = {2019},
publisher= {Packt Publishing,}}
@book{étiquette,
author = {Dosse, Stéphane and Kempf, Olivier},
title = {Stratégie dans le cyberespace},
year = {2011},
publisher= {L'esprit du livre},
keyword={Cyberstratégie, Cyberdéfense}}
@book{étiquette,
author = {Dosse, Stéphane AND Kempf, Olivier AND Malis, Christian},
title = {Cyberespace, nouveau domaine de la pensée stratégique},
year = {2013},
publisher= {Économica},
keyword={Cyberdéfense, Cyberstratégie}}
@book{étiquette,
author = {Dosse, Stéphane AND Bonnemaison, Aymeric},
title = {Attention cyber ! Vers le combat cyber-electronique},
year = {2014},
publisher= {Économica},
keyword={Cyberdéfense, Cyberguerre}}
@article{douzet2014geopolitique,
title={G{\'e}opolitique du cyberespace: La cyberstrat{\'e}gie de ladministration Obama},
author={Douzet, Fr{\'e}d{\'e}rick},
journal={Bulletin de lassociation de g{\'e}ographes fran{\c{c}}ais. G{\'e}ographies},
volume={91},
number={91-2},
pages={138--149},
year={2014},
publisher={Association de g{\'e}ographes fran{\c{c}}ais},
keyword={Cyberstratégie, USA, Géopolitique}}
@article{douzet2014art,
title={Lart de la guerre revisit{\'e}. Cyberstrat{\'e}gie et cybermenace chinoises},
author={Douzet 1, Fr{\'e}d{\'e}rick},
journal={H{\'e}rodote},
number={1-2},
pages={161--173},
year={2014},
publisher={Cairn/Isako},
keyword={Cyberstratégie, Chine, Géopolitique}}
@book{étiquette,
author = {Dykstra, Josiah and Spafford Eugene and Metcalf Leigh},
title = {Cybersecurity myths and Misconceptions},
year = {2023},
publisher= {Pearson Education},
keyword={Cybersécurité}}
E
@book{étiquette,
author = {Elsberg, Marc},
title = {Black-out : demain il sera trop tard},
year = {2016},
publisher= {LGF},
ISBN= {9782253098690 },
note= {roman, anticipation},
keyword={Roman}}
F
@book{étiquette,
author = {Faillet, Caroline },
title = {L'art de la guerre digitale, survivre et dominer à l'ère du numérique},
year = {2016},
publisher = {Dunod},
isbn = {9782100748280},
keyword={Cyberguerre, Cyberstratégie, Géopolitique}}
@book{étiquette,
author = {Foster, James},
title = {Digital influence mercenaries, profits and power through information warfare},
year = {2022},
publisher = {US Naval Institute Press},
note = {Étude sur les acteurs d'influence privés avec une présentation de leurs méthodes et effets sur la population ciblée},
isbn = {9781682477229},
keyword={Cyberguerre, Guerre Hybride, Guerre de l'information}}
@book{étiquette,
author = {Freyssinet, Eric},
title = {La cybercriminalité en mouvement},
year = {2012},
publisher = {Hermes Science Publications},
isbn = {274623288X},
keyword={Cybercriminalité, Cybersécurité}}
@book{étiquette,
author = {Futter, Andrew},
title = {Hacking The Bomb: Cyber Threats and Nuclear Weapons},
year = {2018},
publisher = {Georgetown University Press},
isbn = {9781626165649 }}
G
@book{étiquette,
author = {Galeotti, Mark},
title = {The Weaponisation of Everything: A Field Guide to the New Way of War},
year = {2022},
publisher= {Yale University Press}}
@book{étiquette,
author = {Gastineau, Pierre and Vasset, Philippe},
title = {Armes de déstabilisation massive. Enquête sur le business des fuites de données},
year = {2017},
publisher= {Fayard},
note= {Enquête sur les groupes d'attaquants et entreprises privées spécialisées dans l'exfiltration de données et la publication ou revente de celles-ci à des fins lucratives ou de déstabilisation}}
@book{étiquette,
author = {Gergorin, Jean-Louis and Isacc-Dognin, Léo},
title = {Cyber, la guerre permanente},
year = {2018},
publisher= {Les éditions du Cerf}}
@article{giry2021fake,
title={Les fake news comme concept de sciences sociales: Essai de cadrage {\`a} partir de notions connexes: rumeurs, th{\'e}ories du complot, propagande et d{\'e}sinformation},
author={Giry, Julien},
journal={Questions de communication},
volume={38},
pages={371--394},
year={2021},
publisher={Cairn},
keyword={Désinformation, Fake News}}
@book{étiquette,
author = {Greenberg, Andy},
title = {Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers},
year = {2019},
isbn = {0385544405},
publisher= {Doubleday}}
@book{étiquette,
author = {Goldstein, Guy-Philippe},
title = {Babel minute zéro},
year = {2010},
isbn = {2070427501},
publisher= {Galimard}}
@book{étiquette,
author = {Guisnel, Jean},
title = {Guerres dans le cyberespace : services secrets et Internet},
year = {1995},
publisher = {La Découverte},
note = {Un des premiers livres français d'investigation sur le monde du hacking, particulièrement sur les groupes US Legion of Doom (LoD) et Masters of Deception (MoD)},
isbn = {978-2707125026}}
@book{étiquette,
author = {Guyaux, Jean},
title = {L'espion des sciences : les arcanes et les arnaques scientifiques du contre-espionnage},
year = {2002},
publisher = {Flammarion},
isbn = {2-08-068227-X},
note = {Le général Jean Guyaux a été détaché comme conseiller scientifique à la direction de la Surveillance du territoire (DST) de 1984 et 1995. Ces mémoires comprennent une partie parlant de la DST face à l'émergence de la piraterie informatique et la surveillance d'internshet.}}
H
@book{étiquette,
author = {Harrel, Yannick},
title = {La cyberstratégie russe},
year = {2013},
publisher = {NUVIS},
address = {https://www.eyrolles.com/Informatique/Livre/la-cyberstrategie-russe-9782363670519/},
isbn = {9782363670519}}
@book{étiquette,
author = {Hecker, Marc and Rid, Thomas},
title = {War 2.0: Irregular Warfare in the information Age},
year = {2009},
publisher= {Praeger}}
@book{étiquette,
author = {Henning, Lahmann},
title = {Unilateral Remedies to Cyber Operations},
year = {2020},
publisher = {Cambridge University Press},
isbn = {9781108807050}}
@book{étiquette,
author = {Hennion, Romain and Maklhouf, Anissa},
title = {La cybersécurité},
year = {2018},
publisher= {Eyrolles}}
@book{étiquette,
author = {Henrotin, Joseph},
title = {L'art de la guerre à l'age des réseaux},
year = {2017},
publisher= {ISTE éditions}}
@book{étiquette,
title={Intelligence Services in the Information Age},
author={Herman, Michael},
year={2002},
ISBN = {9780714681962},
publisher={Routledge},
keyword={Cybersécurité}}
@article{hoorickx2019etats,
title={Les {\'E}tats, acteurs cl{\'e}s de la cyberstrat{\'e}gie euro-atlantique 1},
author={Hoorickx, Estelle},
journal={Revue D{\'e}fense Nationale},
number={3},
pages={93--98},
year={2019},
publisher={Cairn/Inovcom}}
@book{hubbard2023measure,
title={How to measure anything in cybersecurity risk},
author={Hubbard, Douglas W and Seiersen, Richard},
year={2023},
publisher={John Wiley \& Sons},
keyword={Cybersécurité}}
@book{étiquette,
author = {Huyghe, François-Bernard and Kempf, Olivier and Mazzucchi, Nicolas},
title = {Gagner les cyberconflits, au-delà du technique},
year = {2015},
publisher= {Economica}}
@book{étiquette,
author = {Huyghe, François-Bernard},
title = {La désinformation, les armes du faux},
year = {2016},
ISBN = {2200601360},
publisher = {Armand Colin}}
@book{étiquette,
author = {Hypponen, Mikko},
title = {If it's smart, it's vulnerable},
year = {2022},
publisher = {Wiley},
isbn = {1119895189}}
I
J
@book{étiquette,
author = {Janczewsky, Lech and Andrew, Colarik},
title = {Cyber warfare and Cyberterrorism},
year = {2007},
publisher= {Information Science Reference}}
@book{étiquette,
author= {Jankowicz, Nina},
title = {How to lose the Information War},
year = {2020},
publisher= {Bloomsbury}}
K
@book{étiquette,
author = {Kaplan, Fred},
title = {Dark Territory: The Secret History of Cyber War},
year = {2016},
publisher= {Simon and Schuster}}
@book{étiquette,
author = {Kempf, Olivier},
title = {Introduction à la cyberstratégie},
year = {2012},
publisher= {Economica}}
@article{kempf2012cyberstrategie,
title={Cyberstrat{\'e}gie {\`a} la fran{\c{c}}aise},
author={Kempf, Olivier},
journal={Revue internationale et strategique},
volume={87},
number={3},
pages={121--129},
year={2012},
publisher={IRIS {\'e}ditions}}
@article{kempf2014cyberstrategie,
title={La cyberstrat{\'e}gie française},
author={Kempf, Olivier},
journal={Recherches Internationales},
volume={100},
number={1},
pages={135--151},
year={2014},
publisher={Pers{\'e}e-Portail des revues scientifiques en SHS}}
@article{kempf2013cyberstrategie,
title={La cyberstrat{\'e}gie de lUnion Europ{\'e}enne},
author={Kempf, Olivier},
journal={S{\'e}curit{\'e} globale},
number={2},
pages={25--40},
year={2013},
publisher={Cairn/Softwin}}
@book{étiquette,
author = {Kitchin, Rob},
title = {The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences},
year = {2014},
publisher = {SAGE},
address = {},
note = {},
isbn = {978-1-4739-0826-0}}
@book{étiquette,
author = {Klimburg, Alexander},
title = {The Darkening Web: The War for Cyberspace},
year = {2017},
publisher= {Penguin Press}}
@book{étiquette,
author = {Kramer, Franklin and Starr, Stuart and Wentz, Larry},
title = {Cyberpower and National Security. National Defense},
year = {2009},
publisher= {University Press and potomac books}}
L
@book{etiquette,
author = {Lamy, Stéphanie}
title = {Agora toxica},
year = {2022}
publisher = {éditions du détour},
isbn = {979-10-97079-87-1}
@book{laurent2021conflits,
title={Conflits, crimes et r{\'e}gulations dans le cyberespace},
author={Laurent, S{\'e}bastien-Yves},
volume={4},
year={2021},
publisher={ISTE Group}}
@article{lee2021blockchain,
title={Blockchain as a cyber defense: opportunities, applications, and challenges},
author={Lee, Suhyeon and Kim, Seungjoo},
journal={IEEE Access},
volume={10},
pages={2602--2618},
year={2021},
publisher={IEEE}}
@book{étiquette,
author = {Le Dez, Arnaud},
title = {Tactique cyber, le combat numérique},
year = {2019},
publisher= {Economica},
note = {Préface du Général Olivier BONNET DE PAILLERETS},
isbn = {978-2-7178-7060-2}}
@book{étiquette,
author = {Leonetti, Xavier and Féral-Schull, Christiane},
title = {Cybersécurité Mode d'emploi},
year = {2022},
publisher= {PUF},
isbn = {978-2-13-083369-7}}
@book{lessig2009code,
title={Code: And other laws of cyberspace},
author={Lessig, Lawrence},
year={2009},
publisher={ReadHowYouWant. com}}
@book{étiquette,
author = {Levine, Yasha},
title = {Surveillance Valley, The Secret Military History of the Internet},
year = {2018},
publisher= {Public Affairs}}
@book{étiquette,
author = {Liang, Qiao and Xiangsui, Wang},
title = {La guerre hors limites},
year = {1999},
publisher= {Les éditions du Cerf},
isbn= {978-2743615178},
note = {Incontournable (entre autres) sur la pensée cyber chinoise.}}
@book{étiquette,
author = {Libicki, Martin},
title = {Cyberdeterrence and Cyberwar},
year = {2009},
publisher= {RAND Project Air force}}
@book{étiquette,
author = {Libicki, Martin},
title = {Conquest in cyberspace: national security and information},
year = {2007},
publisher= {Cambridge University Press}}
@book{étiquette,
author = {Lilly, Bilyana},
title = {Russian Information Warfare},
year = {2022},
ISBN = {1682477193},
publisher= {Naval Institute Press }}
@book{étiquette,
author = {Limonier, Kevin},
title = {Ru.net},
year = {2018},
ISBN = {2355970327},
publisher= {Inventaire Eds De L'}}
@book{étiquette,
author = {Lonsdale, David},
title = {The Nature of War in the Information Age},
year = {2004},
publisher= {Frank Cass}}
M
@book{étiquette,
author = {Maurer, Tim},
title = {Cyber Mercenaries : The State, Hackers, and Power},
year = {2018},
publisher= {Cambridge University Press}}
@book{étiquette,
author = {Menn, Joseph},
title = {Cult of the Dead Cow},
year = {2019},
publisher = {PublicAffairs},
isbn = {9781541724426}}
@book{étiquette,
author = {Mercier, Arnaud et Pignard-Cheynel, Nathalie},
title = {Commenter et partager l'actualité sur Twitter et Facebook},
year = {2018},
publisher = {Fondation maison des sciences de l'homme},
isbn = {978-2-7351-2398-8}}
@book{étiquette,
author = {Mitnick, Kevin},
title = {The Art of Deception - Controlling the Human Element of Security },
year = {2003},
publisher = {John Wiley \& Sons},
isbn = {9780764542800}}
@book{étiquette,
author = {Mitnick, Kevin},
title = {The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers},
year = {2005},
publisher = {John Wiley \& Sons},
isbn = {9780471782667}}
@book{étiquette,
author = {Mitnick, Kevin},
title = {Ghost in the Wires: My Adventures as the World's Most Wanted Hacker},
year = {2012},
publisher = {Back Bay Books},
isbn = {9780316212182}}
@book{étiquette,
author = {Monte, Matthew},
title = {Network Attacks and Exploitation},
year = {2015},
publisher= {Wiley}}
@book{étiquette,
author = {Moore, Daniel},
title = {Offensive Cyber Operations},
year = {2022},
note = {https://www.hurstpublishers.com/book/offensive-cyber-operations/},
isbn = {9781787385610}
publisher= {Hurst}}
@book{étiquette,
author = {Morel, Camille},
title = {},
year = {},
publisher = {},
address = {},
note = {},
isbn = {}}
@book{étiquette,
author = {Motte, Martin},
title = {La mesure de la force},
year = {2018},
publisher= {Taillandier}}
N
@book{étiquette,
author = {Nye, Joseph},
title = {Cyberpower},
year = {2010},
publisher= {Harvard University}}
P
@book{étiquette,
author = {Patino, Bruno},
title = {La civilisation du poisson rouge. Petit traité sur le marché de l'attention},
year = {2019},
publisher = {Grasset et Fasquelle},
isbn = {978-2-253-10125-3}}
@book{étiquette,
author = {Patino, Bruno},
title = {Tempête dans le bocal, la nouvelle civilisation du poisson rouge},
year = {2022},
publisher = {Grasset et Fasquelle},
isbn = {978-2-246-82896-9}}
@book{étiquette,
author = {Groupe Pandoras},
title = {cybersécurité - méthode de gestion de crise},
year = {2021},
publisher= {VA-EDITIONS}}
@book{étiquette,
author = {Payne, Kenneth},
title = {I, Warbot: The Dawn of Artificially Intelligent Conflict},
year = {2021},
publisher= {Hurst Publishers}}
@book{étiquette,
author = {Pelroth, Nicole},
title = {This is How they Tell me the World Ends: the Cyberweapons Arms Race},
year = {2021},
publisher= {Bloomsburry Publishing}}
@book{étiquette,
author = {Penalba, Pierre},
title = {Cyber crimes: un flic 2.0 raconte},
year = {2021},
publisher = {Albin Michel},
isbn = {978-2226445957}}
@book{étiquette,
author = {Perkovich, George and Ariel, Levite},
title = {Understanding Cyber conflict: 14 analogies},
year = {2017},
publisher = {Georgetown University Press}}
@book{étiquette,
author = {Pernet, Cédric},
title = {Sécurité et espionnage informatique},
year = {2014},
publisher= {Eyrolles},
isbn = {9782212139655}}
@book{étiquette,
author = {Pharo, Patrick},
title = {Les data contre la liberté},
year = {2022},
publisher = {PUF},
isbn = {978-2-13-083304-8}}
@book{étiquette,
author = {Porche, Isaac},
title = {Cyberwarfare: An Introduction to Information-Age Conflict },
year = {2019},
ISBN = {978-1630815769},
publisher= {Artech House}}
Q
@book{étiquette,
author = {Quemener, Myriam and Ferry, Joël},
title = {Cybercriminalité : défi mondial et réponse},
year = {2007},
publisher= {Economica}}
R
@book{étiquette,
author = {Raimondo, Laurane},
title = {Les fondamentaux de la gestion de crise cyber},
year = {2022},
publisher= {Ellipses}}
@book{étiquette,
author = {Rascagnères, Paul AND Larinier, Sébastien},
title = {Cybersécurité et Malwares. Détection, analyse et Threat Intelligence},
year = {2022},
publisher = {ENI},
note = {4ème édition (2022) d'un livre de référence sur le sujet},
isbn = {978-2409038105}}
@book{étiquette,
author = {Rattray, Gregory},
title = {Strategic warfare in cyberspace},
year = {2001},
publisher= {Mass MIT Press}}
@book{étiquette,
author = {Raufast, Pierre},
title = {Habemus piratam},
year = {2022},
publisher = {Forges Vulcain},
isbn = {9782373051193},
note = {Un très bon roman français dans le domaine Cyber/Hacking, auteur membre de l'équipe SSI chez Michelin}}
@book{étiquette,
author = {Rid, Thomas},
title = {Cyber War will not take place},
year = {2013},
publisher= {Oxford University Press}}
@book{étiquette,
author = {Rid, Thomas},
title = {Active Measures: The Secret History of Disinformation and Political Warfare},
year = {2020},
publisher= {Profile Books Ltd}}
@book{étiquette,
author = {Roux, Thierry},
title = {L'art de la guerre cyber : vers une intelligence des crises},
year = {2020},
publisher = {Nunkee Editions},
isbn = {978-2492639005}}
S
@book{étiquette,
author = {Salamon, Yann},
title = {Cybersécurité et Cyberdéfense : enjeux stratégiques},
year = {2020},
publisher= {Ellipses},
note = {Sadressant à un panel de publics divers, cet ouvrage balaie un large panorama de sujets structurants liés à la sécurité numérique. Prenant comme point de départ la compréhension du cyberespace, il en décrit quelques propriétés importantes : tendances, enjeux, caractéristiques « topologiques », acteurs en présence.}}
@book{étiquette,
author = {Sanger, David},
title = {Confront and Conceal: Obamas secret wars},
year = {2012},
publisher= {Crown}}
@book{étiquette,
author = {Sanger, David},
title = {The Perfect Weapon: War, Sabotage and Fear in the Cyber Age},
year = {2019},
publisher= {Crown},
isbn = {978-0451497901}}
@book{étiquette,
author = {Schmitt, Michael N. and Vihul, Liis},
title = {Tallinn manual 2.0 on the international law applicable to cyber operations},
year = {2017},
publisher = {Cambridge university press},
address = {Cambridge, Royaume-Uni},
isbn = {978-1-316-63037-2}}
@book{étiquette,
author = {Schneier, Bruce},
title = {Applied Cryptography},
year = {1996},
publisher= {John Wiley \& Sons}}
@book{étiquette,
author = {Schneier, Bruce},
title = {Secrets and Lies: Digital Security in a Networked World},
year = {2004},
publisher= {John Wiley \& Sons},
isbn = {0471453803}}
@book{étiquette,
author = {Schneier, Bruce},
title = {Cryptography Engineering},
year = {2010},
publisher= {John Wiley \& Sons}}
@book{étiquette,
author = {Schradie, Jen},
title = {L'illusion de la démocratie numérique. Internet est-il de droite ?},
year = {2022},
publisher= {Quanto},
isbn = 978-288915-454-8}}
@book{étiquette,
author = {Séjean, Michel},
title = {Code de la Cybersécurité},
year = {2022},
publisher= {Lefevre Dalloz}}
@book{étiquette,
author = {Shimomura,Tsutomu AND Markoff, John},
title = {Cybertraque. La chasse au pirate informatique le plus célèbre des Etats-Unis},
year = {1998},
publisher = {Plon},
note = {Traduction FR de "Katching Kevin", récit du hack et de la traque de Kevin Mitnick en 1995},
isbn = {978-2259184021}}
@book{étiquette,
author = {Shirky, Clay},
title = {Cognitive Surplus: Creativity and Generosity in a Connected Age},
year = {2010},
publisher= {Penguin Press},
isbn = {9780141041605},
note = {In Cognitive Surplus, Internet guru Clay Shirky forecasts the thrilling changes we will all enjoy as new digital technology puts our untapped resources of talent and goodwill to use at last. }}
@book{étiquette,
author = {Sikorski, Michael and Honig, Andrew},
title = {Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software},
year = {2012},
publisher= {No Starch Press}}
@book{étiquette,
author = {Singer, P.W and Cole, August},
title = {La flotte fantôme},
year = {2022},
publisher= {Folio},
isbn = {978-2-07-297935-4},
Keyword={Roman, Cyberguerre}}
@book{étiquette,
author = {Smeets, Max},
title = {No Shortcuts. Why States Struggle to Develop a Military Cyber-Force},
year = {2022},
publisher= {Hurst}}
@book{étiquette,
author = {Stamboliyska, Rayna},
title = {La face cachée d'internet : hackers},
year = {2017},
publisher= {Larousse}}
@book{stevens2016cyber,
title={Cyber security and the politics of time},
author={Stevens, Tim},
year={2016},
publisher={Cambridge University Press},
keyword={Cybersécurité}}
@book{étiquette,
author = {Stoll, Clifford},
title = {The Cuckoo's Egg},
year = {1989},
publisher= {New York: Doubleday}}
T
@book{étiquette,
author = {Tarissan, Fabien},
title = {Au coeur des réseaux, des sciences aux citoyens},
year = {2019},
publisher = {Le Pommier},
isbn = {978-2-7465-1666-3}}
@book{étiquette,
author = {Triffault, Alexandre},
title = {The Little Black Book of Lockpicking: Lock opening and Bypass techniques for Security Professionals},
year = {2021},
isbn = {979-8544602156}
publisher= {publication indépendante}}
@book{étiquette,
author = {Triandafillidou, Olga},
title = {Cybermenaces, un état de siège},
year = {2019},
publisher = {alsyse-news.com},
isbn = {978-1706499497}}
@book{étiquette,
author = {Troia, Vinny},
title = {Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques},
year = {2020},
publisher= {Sybex Inc}}
U
V
@book{étiquette,
author = {Van Puyvelde, Damien and Brantly, Aaron F.},
title = {Cybersecurity. Politics, Governance and Conflict in Cyberspace},
year = {2019},
publisher= {Polity}}
@book{étiquette,
author = {Ventre, Daniel},
title = {Cyberattaque et cyberdéfense},
year = {2011},
publisher= {Lavoisier}}
@book{étiquette,
author = {Ventre, Daniel},
title = {Cyberguerre et guerre de linformation. Stratégie,règles et enjeux},
year = {2010},
publisher= {Lavoisier}}
@book{étiquette,
author = {Ventre, Daniel},
title = {La guerre de l'information},
year = {2007},
isbn = {978-2-7462-1883-3 }
publisher= {Lavoisier}}
@book{volkoff2004desinformation,
title={La d{\'e}sinformation: arme de guerre},
author={Volkoff, Vladimir},
year={2004},
publisher={l'Age d'homme},
keyword = {Désinformation},
note = {}
}
W
X
Y
Z
@book{étiquette,
author = {Zalewski, Michal},
title = {Menaces sur le réseau, Sécurité informatique : guide pratique des attaques passives et indirectes},
year = {2008},
publisher= {Pearson},
isbn = {978-2-7440-2226-5},
note = {Superbe livre pout s'initier à la sécurité informatique au niveau réseau / protocolaire. Version FR du livre publié en 2005 "Silence on the Wire"}}
@book{étiquette,
author = {Zalewski, Michal},
title = {The Tangled Web: A Guide to Securing Modern Web Applications},
year = {2011},
publisher = {No Starch Press},
isbn = {9781593273880}}
@book{étiquette,
author = {Zegart, Amy},
title = {Spies, Lies, and Algorithms: The History and Future of American Intelligence},
year = {2022},
publisher= {Princeton},
isbn = {9780691147130}}
@book{étiquette,
author = {Zetter, Kim},
title = {Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon},
year = {2014},
publisher= {Crown},
isbn = {077043617X},
note = {The story behind the virus that sabotaged Irans nuclear efforts and shows how its existence has ushered in a new age of warfare}}
@book{étiquette,
author = {Zuboff, Shoshana},
title = {The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power},
year = {2019},
publisher= {Profile Books Ltd},
isbn = {1781256853},
note = {The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control us. }}