{"id":345,"date":"2016-03-16T22:44:34","date_gmt":"2016-03-16T21:44:34","guid":{"rendered":"http:\/\/werle.pro\/?page_id=345"},"modified":"2016-10-15T16:52:52","modified_gmt":"2016-10-15T15:52:52","slug":"livres","status":"publish","type":"page","link":"https:\/\/werle.pro\/index.php\/livres\/","title":{"rendered":"Livres"},"content":{"rendered":"<h3>Liste de livres consacr\u00e9s \u00e0 la SSI et \u00e0 la protection des DCP (ISBN)<\/h3>\n<h4>Soci\u00e9t\u00e9, r\u00e9flexion citoyenne &amp; philosophique<\/h4>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.linkedin.com\/pulse\/lhomme-nu-la-dictature-invisible-du-num%C3%A9rique-philippe-werle\">L&rsquo;Homme nu, la dictature invisible du num\u00e9rique<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.linkedin.com\/pulse\/dada-100-ans-vive-data-philippe-werle\">ARTE : Dada data<\/a><\/p>\n<h4>S\u00e9curit\u00e9 du SI &amp; Gestion des risques<\/h4>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/multimedia.fnac.com\/multimedia\/editorial\/pdf\/9782212125931.pdf\" target=\"_blank\">La Gestion des Risques en S\u00e9curit\u00e9 du SI &#8211; ISBN 9782212125931<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.editions-ellipses.fr\/product_info.php?products_id=7364\" target=\"_blank\">Firewalls : La s\u00e9curit\u00e9 sur Internet &#8211; ISBN 9782841770182<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.unitheque.com\/Livre\/eyrolles\/Tableaux_de_bord_de_la_securite_reseau-36100.html\" target=\"_blank\">Tableau de bord de la s\u00e9curit\u00e9 r\u00e9seau &#8211; ISBN 9782212128215<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/books.google.fr\/books\/reader?id=O6wBZs7fODIC&amp;hl=fr&amp;printsec=frontcover&amp;output=reader&amp;source=gbs_atb_hover\" target=\"_blank\">The Tao of Network Security Monitoring: Beyond Intrusion Detection &#8211; ISBN 9780321246772<\/a><\/p>\n<p class=\"booktitle\" style=\"padding-left: 30px;\"><a href=\"https:\/\/books.google.fr\/books?id=hutSAAAAMAAJ&amp;q=ISBN+9780321349965&amp;dq=ISBN+9780321349965&amp;hl=fr&amp;sa=X&amp;ved=0ahUKEwiwlJjotuvLAhXCcBoKHZFlDCUQ6AEIKjAA\" target=\"_blank\"><span class=\"fn\"><span dir=\"ltr\">Extrusion Detection<\/span><\/span>: <\/a><span class=\"subtitle\"><span dir=\"ltr\"><a href=\"https:\/\/books.google.fr\/books?id=hutSAAAAMAAJ&amp;q=ISBN+9780321349965&amp;dq=ISBN+9780321349965&amp;hl=fr&amp;sa=X&amp;ved=0ahUKEwiwlJjotuvLAhXCcBoKHZFlDCUQ6AEIKjAA\" target=\"_blank\">Security Monitoring for Internal Intrusions &#8211; ISBN 9780321349965<\/a><br \/>\n<\/span><\/span><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/books.google.fr\/books?id=Fh3drQEACAAJ&amp;dq=ISBN+9780321240699&amp;hl=fr&amp;sa=X&amp;ved=0ahUKEwiMrryft-vLAhUDVxoKHS2oCr0Q6AEIKzAA\" target=\"_blank\"><span class=\"fn\"><span dir=\"ltr\">Real digital forensics<\/span><\/span>: <\/a><span class=\"subtitle\"><span dir=\"ltr\"><a href=\"https:\/\/books.google.fr\/books?id=Fh3drQEACAAJ&amp;dq=ISBN+9780321240699&amp;hl=fr&amp;sa=X&amp;ved=0ahUKEwiMrryft-vLAhUDVxoKHS2oCr0Q6AEIKzAA\" target=\"_blank\">computer security and incident response &#8211; ISBN 9780321240699<\/a><\/span><\/span><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/books.google.fr\/books?id=xHNcXhBlS3YC&amp;pg=PR7&amp;dq=ISBN+9782212128208&amp;hl=fr&amp;sa=X&amp;ved=0ahUKEwjg3tGUtuvLAhWGlxoKHXUrBXwQ6AEIKzAA#v=onepage&amp;q=ISBN%209782212128208&amp;f=false\" target=\"_blank\">Management de la continuit\u00e9 d&rsquo;activit\u00e9 &#8211; Assurer la p\u00e9rennit\u00e9 de l&rsquo;entreprise &#8211; ISBN 9782212128208<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.abebooks.fr\/9782212088403\/r%C3%A9seaux-Guy-Pujolle-221208840X\/plp\" target=\"_blank\">Les r\u00e9seaux &#8211; ISBN 9782212088403<\/a><\/p>\n<p class=\"booktitle\" style=\"padding-left: 30px;\"><span class=\"subtitle\"><span dir=\"ltr\">&#8230; r\u00e9daction en cours &#8230;<br \/>\n<\/span><\/span><\/p>\n<h4>Informatique &amp; libert\u00e9s<\/h4>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.lexisnexis.fr\/communiques\/01-2014\/cp_Le_correspondant_informatique_et_libertx_LexisNexis.pdf\" target=\"_blank\">Le Correspondant Informatique et Libert\u00e9s &#8211; ISBN 9782711018864<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.decitre.fr\/livres\/informatique-et-libertes-9782721215826.html\" target=\"_blank\">Informatique et libert\u00e9s &#8211; Enjeux, risques, solutions et outils de gestion &#8211; ISBN 9782721215826<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.decitre.fr\/livres\/les-valeurs-de-la-recherche-9782841865796.html\" target=\"_blank\">Les valeurs de la recherche &#8211; Enqu\u00eate sur les donn\u00e9es personnelles en \u00e9pid\u00e9miologie (Prix de la CNIL) &#8211; ISBN 9782841865796<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.decitre.fr\/livres\/traitement-des-donnees-personnelles-9782212135947.html\" target=\"_blank\">Traitement des donn\u00e9es personnelles &#8211; Le guide juridique &#8211; ISBN 9782212135947<\/a><\/p>\n<p style=\"padding-left: 30px;\"><span class=\"subtitle\"><span dir=\"ltr\">&#8230; r\u00e9daction en cours &#8230;<\/span><\/span><\/p>\n<h4>Architecture informatique<\/h4>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.openisbn.com\/isbn\/9780131858589\/\" target=\"_blank\">Service-Oriented Architecture (SOA): Concepts, Technology, And Design &#8211; ISBN 9780131858589<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.openisbn.com\/isbn\/0132344823\/\" target=\"_blank\">SOA &#8211; Principles of service design &#8211; ISBN 9780132344823<\/a><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.openisbn.com\/isbn\/9780672323164\/\" target=\"_blank\">Understanding and Deploying LDAP Directory Services &#8211; ISBN 9780672323164<\/a><\/p>\n<p style=\"padding-left: 30px;\"><span class=\"subtitle\"><span dir=\"ltr\">&#8230; r\u00e9daction en cours &#8230;<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Liste de livres consacr\u00e9s \u00e0 la SSI et \u00e0 la protection des DCP (ISBN) Soci\u00e9t\u00e9, r\u00e9flexion citoyenne &amp; philosophique L&rsquo;Homme nu, la dictature invisible du num\u00e9rique ARTE : Dada data S\u00e9curit\u00e9 du SI &amp; Gestion des risques La Gestion des Risques en S\u00e9curit\u00e9 du SI &#8211; ISBN 9782212125931 Firewalls : La s\u00e9curit\u00e9 sur Internet &#8211; &#8230; <a title=\"Livres\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/livres\/\" aria-label=\"Read more about Livres\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P7ALXt-5z","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/345"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":17,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/345\/revisions"}],"predecessor-version":[{"id":855,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/345\/revisions\/855"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}