[BLANCH95] |
BLANCHARD Philippe Pirates de l'informatique Enquête sur les hackers français Addison Wesley, 1995 |
|
[BONA94] |
BONANATE Luigi Le terrorisme international coll. XXe siècle Casterman, Giunti, 1994 |
|
[BRANDT95] |
BRANDT Daniel Infowar and Disinformation : From the Pentogone to the Net Octobre 1995 http://www.cs.albany.edu/~ault/security/infowar.html |
|
[CARTER92] |
CARTER David L. Computer Crime Categories: How Techno-criminals Operate FBI Law Enforcement Bulletin, 1992 http://nsi.org/Library/Compsec/crimecom.html |
|
[COHEN93] |
COHEN Frederick B. Information Warfare Considerations http://all.net/books/iw/iwardoc.html |
|
[COHEN95] |
COHEN Frederick B. Protection and Security on the Information Superhighway John Wiley & Sons, Inc. , 1995 |
|
[CLOUGH93] |
CLOUGH Bryan, MUNGO Paul La Délinquance Assistée par Ordinateur DunodTech, 1993 |
|
[DEVOST1] |
DEVOST Matthew G. The Digital Threat : United Statee National Security and Computers http://deercamp.net/matt/hackers4.html |
|
[DEVOST95] |
DEVOST Matthew G. Political Aspects of Class III Information Warfare Global Conflict and Terrorism Janvier 1995 http://deercamp.net/matt/montreal.html |
|
[DORAN96] |
DORAN Serge le, ROSÉ Phillipe Cyber Thrillers, 35 histoires vraies de la délinquance informatique Albin Michel, 1996 |
|
[ENCYCL89] |
Encyclopaedia Universalis 1989 |
|
[FANNING95] |
FANNING Paul Terrorism: Past Present, and Future http://www.acsp.uic.edu/oicj/pubs/cja/080501.htm |
|
[GARIG1] |
GARIGUE R. Information Warfare, Developing a Conceptual Framework http://www.cse.dnd.ca/~formis/overview/iw R. Garigue's home page |
|
[GUISNEL95] |
GUISNEL Jean Guerres dans le cyberespace. Services secrets et Internet La Découverte, 1995 |
|
[HAENI95] |
HAENI Reto An Introduction to Information Warfare Décembre 1995 http://www.seas.gwu.edu/student/reto/infowar/info-war.html |
|
[ICOVE95] |
ICOVE David, SEGER Karl, Von STORCH William
Computer Crime : A Crimefighter Handbook O'Reilly, 1995 http://www.ora.com/gnn/bus/ora/features/crime/crime1.html |
|
[JONES96] |
JONES Frank Nowhere to run... Nowhere to hide... The vulnerability of CRT's, CPU's and peripherals to TEMPEST monitoring in the real world 1996 http://www.thecodex.com/c_tempest.html |
|
[LAB90_1] |
Legal Advisory Board, Commision of the European Communities Access to public-sector information, data protection and computer crime. janvier-février 1990 |
|
[LAB90_4] |
Legal Advisory Board, Commision of the European Communities Computer crime in the Netherlands avril 1990 |
|
[LAROUS83] |
Petit Larousse illustré 1983 |
|
[LIBICKI95] |
LIBICKI Martin What is Information Warfare ? Août 1995 http://www.ndu.edu/ndu/inss/actpubs/act003/a003cont.html |
|
[MUNRO95] |
MUNRO Neil The Pentagone's New Nightmare : An Electronic Pearl Harbor Washington Post, Juillet 95 http://vislab-www.nps.navy.mil/~sdjames/pentagon_nightmare.html |
|
[RAND95] |
Information Warfare: A Two-Edged Sword
RAND Corp. , 1995 http://www.rand.org/publications/RRR/RRR.fall95.cyber/infowar.html |
|
[RISKS1062] |
Severed Phone Line Disrupts Chicago
Zone The New York Times, 16 octobre 1990 Risks Forum Digest, 10.62 http://catless.ncl.ac.uk/Risks |
|
[ROUSH92] |
ROUSH Wade Hackers: Taking a Byte Out of Computer Crime 1995 http://web.mit.edu/afs/athena/org/t/techreview/www/articles/apr95/Roush.html |
|
[SCHWAR93] |
SCHWARTAU Winn Terminal Compromise 1993 ftp://ftp.ircom.fr/pub/misc/novel/termcomp.1 .2 .3 .4 |
|
[SELINE89] |
SELINE Christopher Eavesdropping On The Electromagnetic Emanations of Digital Equipements: The Laws of Canada, England and United States 1989 http://csrc.ncsl.nist.gov/secpubs/tempest.txt |
|
[STERLING92] |
STERLING Bruce The Hacker Crackdown, Law and Disorder on the Electronic Frontier 1992 http://gopher.well.sf.ca.us:70/1/Publications/authors/Sterling/hc |
|
[SZAFR1] |
SZAFRANSKI Richard, Colonel USAF A Theory of Information Warfare http://www.cdsar.af.mil/apj/szfran.html |
|
[THOMP84] |
THOMPSON Ken Reflections on Trusting Trust Communication of the ACM, Vol 27, No 8, Août 1984 http://www.acm.org/classics/sep95/ |
|
[THOMPM95] |
THOMPSON Mark If War Comes Home A strategic exercise simulates an info attack on the U.S. and its allies TIME Magazine, 21 août 1995, Vol. 146, No 8 |
|
[VOIR1] |
Guérilla électronique, la
guerre du future VOIR, 26 janvier 1995 http://www.lanternette.com/hugo/infowar.html |
|
[WALLER95] |
WALLER Douglas Onward Cyber Soldiers TIME Magazine, vol 146, No 8, Août 95 http://ei.cs.vt.edu/~cs3604/fall.95/Hacking/Cyberwar.html |
Patrick Galley (Patrick.Galley@theoffice.net)
Dernière mise à jour : 31 janvier 1997