05917 am 2201345 n 450 9910350183403321201903072-85892-517-810.4000/books.msha.5055(CKB)4110000000009061(FrMaCLE)OB-msha-5055(oapen)https://directory.doabooks.org/handle/20.500.12854/60111(PPN)241655390(EXLCZ)99411000000000906120191114j|||||||| ||| 0freuu||||||m||||txtrdacontentcrdamediacrrdacarrierStratégies du changement dans les systèmes et les territoires EUTIC 2009 - Bordeaux Enjeux et usages des technologies de l’information et de la communication /Lise Viera, Nathalie PinèdePessac Maison des Sciences de l’Homme d’Aquitaine20191 online resource (580 p.) 2-85892-400-7 Le principe de changement se trouve au cœur de nos sociétés dont l'évolution dépend désormais largement du déploiement des TIC. Cependant, ces dernières ne s'insèrent pas spontanément dans les pratiques : les conditions instrumentales et humaines, les capacités d'acculturation et de maturation psychologique influent sur les dynamiques d'adhésion ou de résistance au changement. En s'adressant aussi bien aux universitaires qu'aux acteurs de terrain, cet ouvrage renouvelle le questionnement sur la pertinence de l'usage des TIC et envisage leurs apports en matière de coopération ou de médiation au plan humain tout en essayant de discerner leur potentialité d'ouverture, de désenclavement et de valorisation des territoires de toutes sortes. Les analyses ici proposées permettent d'aboutir à des préconisations utiles à l'action et aux visées stratégiques des institutions. Regroupées autour de cinq axes de réflexion, elles témoignent de l'objectif d'ouverture internationale et de l'approche transversale au fondement du réseau international EUTIC, ainsi que de la prise en compte de la diversité des contextes culturels et socio-politiques.Stratégies du changement dans les systèmes et les territoires Library, Information & Communication sciencesSociology & Anthropologystratégiecommunicationcondition instrumentaleouvertureapproche transversaleapproche transversaleouverturecommunicationcondition instrumentalestratégieLibrary, Information & Communication sciencesSociology & Anthropologystratégiecommunicationcondition instrumentaleouvertureapproche transversaleAgostinelli Serge1292831Akam Noble1232152Alassaf Abir1297456Amato Étienne Armand1297457Amri Mahdi1297458Angelini Julien1297459Ardourel Yves1297460Badra Lamia1297461Baptiste-Jessel Nadine1297462Bogui Jean-Jacques Maomra1297463Briant François1297464Bryon-Portet Céline1297465Canu Roland1297466Canut Marie-Françoise1297467Casel Nicolas1297468Chevalier Yves162551Choquet Isabelle1292949Colin Françoise1297469Daghmi Fathallah1297470Datchary Caroline1275562Debos Franck1297471Derfoufi Ilham1297472Deru Matthieu1297473Doyle Liam1297474Draetta Laura1297475Fitouri Aida1297476Folon Jacques1152778Foucaran Alain1297477Fourrier Christelle1297478Fraysse Patrick1158940Giannakoulopoulos Andreas P1297479Grellety Patricia1297480Hassoun Mohamed1297481Hoang Anh Ngoc1297482Humbert Pierre348964Iribarne Alain d’1297483Kra Raymond K1297484Labarthe Fabien955394Laborde Aurélie1297485Lena Jean-Yves1297486Le Saec Olivier1297487Liétart Armand1297488Lodombe Olga1297489Martin Marcienne1297490Metge Marielle1292832Montagut-Lobjoit Myriam1297491Moretti Christophe1297492Morillon Laurent1297493Omrane Dorsaf1297494Paquelin Didier1297495Pascal Catherine1284610Piponnier Anne1297496Réné Lydie1297497Ross Eve1297498Smyrnaios Nikos1297499Tchuente Dieudonné1297500Tomé Irène1297501Toumi Farid1297502Varlamis Iraklis1297503Venturini Marie-Michèle1297504Vidal Geneviève1289158Watin Michel1288512Wolff Éliane541428Viera Lise1297505Pinède Nathalie1297506FR-FrMaCLEBOOK9910350183403321Stratégies du changement dans les systèmes et les territoires3024488UNINA00928oam 2200325z- 450 991015549770332120230912161814.097807766232450776623249(CKB)4340000000015915(BIP)052755730(Perlego)667407(EXLCZ)99434000000001591520180430d2016 uy |engur|||||||||||txtrdacontentcrdamediacrrdacarrierDouble-Voicing the Canadian Short StoryUniversity of Ottawa Press1 online resource (240 p.) Double-Voicing the Canadian Short StoryCanadian Literature Collection 813/.0109054Kruk Laurie955721BOOK9910155497703321Double-Voicing the Canadian Short Story2162793UNINA04560nam 22008055 450 991029925220332120251107173428.03-319-14039-610.1007/978-3-319-14039-1(CKB)3710000000394705(EBL)2096909(SSID)ssj0001500982(PQKBManifestationID)11852696(PQKBTitleCode)TC0001500982(PQKBWorkID)11523030(PQKB)11288936(DE-He213)978-3-319-14039-1(MiAaPQ)EBC2096909(PPN)185490158(MiAaPQ)EBC3109340(EXLCZ)99371000000039470520150409d2015 u| 0engur|n|---|||||txtccrCyber Warfare Building the Scientific Foundation /edited by Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (326 p.)Advances in Information Security,2512-2193 ;56Description based upon print version of record.3-319-14038-8 Includes bibliographical references.Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberfare -- Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust & Intelligent Defense -- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War -- Active Discovery of Hidden Profiles in Social Networks using Malware -- A Survery of Community Detection Algorithms Based on Analysis-Intent -- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks -- Graph Mining for Cyber Security -- Programming language theoretic security in the real world: a mirage or the future?.This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.Advances in Information Security,2512-2193 ;56Data protectionCryptographyData encryption (Computer science)Computer networksApplication softwareData and Information SecurityCryptologyComputer Communication NetworksComputer and Information Systems ApplicationsData protection.Cryptography.Data encryption (Computer science).Computer networks.Application software.Data and Information Security.Cryptology.Computer Communication Networks.Computer and Information Systems Applications.004004.6005.7005.8005.82Jajodia Sushiledthttp://id.loc.gov/vocabulary/relators/edtShakarian Pauloedthttp://id.loc.gov/vocabulary/relators/edtSubrahmanian V.Sedthttp://id.loc.gov/vocabulary/relators/edtSwarup Vipinedthttp://id.loc.gov/vocabulary/relators/edtWang Cliffedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910299252203321Cyber Warfare2519887UNINA