Terrorisme informatique : Quels sont les risques ?




Bibliographie

[BLANCH95] BLANCHARD Philippe
Pirates de l'informatique
Enquête sur les hackers français
Addison Wesley, 1995
 
[BONA94] BONANATE Luigi
Le terrorisme international
coll. XXe siècle
Casterman, Giunti, 1994
[BRANDT95] BRANDT Daniel
Infowar and Disinformation : From the Pentogone to the Net
Octobre 1995
http://www.cs.albany.edu/~ault/security/infowar.html
 
[CARTER92] CARTER David L.
Computer Crime Categories:
How Techno-criminals Operate
FBI Law Enforcement Bulletin, 1992
http://nsi.org/Library/Compsec/crimecom.html
 
[COHEN93] COHEN Frederick B.
Information Warfare Considerations
http://all.net/books/iw/iwardoc.html
 
[COHEN95] COHEN Frederick B.
Protection and Security on the Information Superhighway
John Wiley & Sons, Inc. , 1995
 
[CLOUGH93] CLOUGH Bryan, MUNGO Paul
La Délinquance Assistée par Ordinateur
DunodTech, 1993
 
[DEVOST1] DEVOST Matthew G.
The Digital Threat : United Statee National Security and Computers
http://deercamp.net/matt/hackers4.html
 
[DEVOST95] DEVOST Matthew G.
Political Aspects of Class III Information Warfare
Global Conflict and Terrorism
Janvier 1995
http://deercamp.net/matt/montreal.html
 
[DORAN96] DORAN Serge le, ROSÉ Phillipe
Cyber Thrillers, 35 histoires vraies de la délinquance informatique
Albin Michel, 1996
 
[ENCYCL89] Encyclopaedia Universalis
1989
 
[FANNING95] FANNING Paul
Terrorism: Past Present, and Future
http://www.acsp.uic.edu/oicj/pubs/cja/080501.htm
 
[GARIG1] GARIGUE R.
Information Warfare, Developing a Conceptual Framework
http://www.cse.dnd.ca/~formis/overview/iw

R. Garigue's home page
 
[GUISNEL95] GUISNEL Jean
Guerres dans le cyberespace. Services secrets et Internet
La Découverte, 1995
 
[HAENI95] HAENI Reto
An Introduction to Information Warfare
Décembre 1995
http://www.seas.gwu.edu/student/reto/infowar/info-war.html
 
[ICOVE95] ICOVE David, SEGER Karl, Von STORCH William
Computer Crime : A Crimefighter Handbook
O'Reilly, 1995
http://www.ora.com/gnn/bus/ora/features/crime/crime1.html
 
[JONES96] JONES Frank
Nowhere to run... Nowhere to hide... The vulnerability of CRT's, CPU's
and peripherals to TEMPEST monitoring in the real world
1996
http://www.thecodex.com/c_tempest.html
 
[LAB90_1] Legal Advisory Board,
Commision of the European Communities
Access to public-sector information,
data protection and computer crime.
janvier-février 1990
 
[LAB90_4] Legal Advisory Board,
Commision of the European Communities
Computer crime in the Netherlands
avril 1990
 
[LAROUS83] Petit Larousse illustré
1983
 
[LIBICKI95] LIBICKI Martin
What is Information Warfare ?
Août 1995
http://www.ndu.edu/ndu/inss/actpubs/act003/a003cont.html
 
[MUNRO95] MUNRO Neil
The Pentagone's New Nightmare : An Electronic Pearl Harbor
Washington Post, Juillet 95
http://vislab-www.nps.navy.mil/~sdjames/pentagon_nightmare.html
 
[RAND95] Information Warfare: A Two-Edged Sword
RAND Corp. , 1995
http://www.rand.org/publications/RRR/RRR.fall95.cyber/infowar.html
 
[RISKS1062] Severed Phone Line Disrupts Chicago Zone
The New York Times, 16 octobre 1990
Risks Forum Digest, 10.62
http://catless.ncl.ac.uk/Risks
 
[ROUSH92] ROUSH Wade
Hackers: Taking a Byte Out of Computer Crime
1995
http://web.mit.edu/afs/athena/org/t/techreview/www/articles/apr95/Roush.html
 
[SCHWAR93] SCHWARTAU Winn
Terminal Compromise
1993
ftp://ftp.ircom.fr/pub/misc/novel/termcomp.1 .2 .3 .4
 
[SELINE89] SELINE Christopher
Eavesdropping On The Electromagnetic Emanations of Digital Equipements:
The Laws of Canada, England and United States
1989
http://csrc.ncsl.nist.gov/secpubs/tempest.txt
 
[STERLING92] STERLING Bruce
The Hacker Crackdown,
Law and Disorder on the Electronic Frontier
1992
http://gopher.well.sf.ca.us:70/1/Publications/authors/Sterling/hc
 
[SZAFR1] SZAFRANSKI Richard, Colonel USAF
A Theory of Information Warfare
http://www.cdsar.af.mil/apj/szfran.html
 
[THOMP84] THOMPSON Ken
Reflections on Trusting Trust
Communication of the ACM, Vol 27, No 8, Août 1984
http://www.acm.org/classics/sep95/
 
[THOMPM95] THOMPSON Mark
If War Comes Home
A strategic exercise simulates an info attack on the U.S. and its allies
TIME Magazine, 21 août 1995, Vol. 146, No 8
 
[VOIR1] Guérilla électronique, la guerre du future
VOIR, 26 janvier 1995
http://www.lanternette.com/hugo/infowar.html
 
[WALLER95] WALLER Douglas
Onward Cyber Soldiers
TIME Magazine, vol 146, No 8, Août 95
http://ei.cs.vt.edu/~cs3604/fall.95/Hacking/Cyberwar.html
 



Comme principal outil de recherches sur Internet, j'ai utilisé :

Altavista


Table des matières

Envoyez vos suggestions, commentaires à

Patrick Galley (Patrick.Galley@theoffice.net)

Dernière mise à jour : 31 janvier 1997


Retour à la page sur la sécurité informatique
Retour à ma page principale