{"id":20941,"date":"2025-09-19T14:00:42","date_gmt":"2025-09-19T17:00:42","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/?p=20941"},"modified":"2025-09-19T04:00:05","modified_gmt":"2025-09-19T07:00:05","slug":"securite-dentreprise-le-defi-des-menaces-asymetriques","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/livros\/securite-dentreprise-le-defi-des-menaces-asymetriques\/","title":{"rendered":"S\u00e9curit\u00e9 d&#8217;Entreprise : Le D\u00e9fi des Menaces Asym\u00e9triques"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-20942\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/09\/securite-dentreprise-le-defi-des-menaces-asymetriques.jpg\" alt=\"S\u00e9curit\u00e9 d'Entreprise : Le D\u00e9fi des Menaces Asym\u00e9triques\" width=\"145\" height=\"229\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/09\/securite-dentreprise-le-defi-des-menaces-asymetriques.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-content\/uploads\/2025\/09\/securite-dentreprise-le-defi-des-menaces-asymetriques-95x150.jpg 95w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Jacob Etienne<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Publisher L&#8217;harmattan<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Overview:<\/strong><\/span> Le Pentagone engage de nombreuses soci\u00e9t\u00e9s de s\u00e9curit\u00e9 priv\u00e9e pour des missions de soutien \u00e0 l&#8217;arri\u00e8re. Paradoxalement, les conflits ont mis en \u00e9vidence autant les archa\u00efsmes que les imperfections du secteur priv\u00e9 de la s\u00e9curit\u00e9. Les entreprises, celles qui \u00e9voluent \u00e0 l&#8217;international dans des zones \u00e0 risque \u00e9lev\u00e9, sont contraintes de r\u00e9ajuster leur politique de s\u00e9curit\u00e9 (renforcement des technologies de la s\u00e9curit\u00e9 et recours \u00e0 des agents de surveillance priv\u00e9e). Sur le continent africain \u00e9mergent des risques vari\u00e9s, autant pour les forces de s\u00e9curit\u00e9 \u00e9tatique que pour les entreprises.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jacob Etienne Publisher L&#8217;harmattan Overview: Le Pentagone engage de nombreuses soci\u00e9t\u00e9s de s\u00e9curit\u00e9 priv\u00e9e pour des missions de soutien \u00e0 l&#8217;arri\u00e8re. Paradoxalement, les conflits ont mis en \u00e9vidence autant les archa\u00efsmes que les imperfections du secteur priv\u00e9 de la s\u00e9curit\u00e9. Les entreprises, celles qui \u00e9voluent \u00e0 l&#8217;international dans des zones \u00e0 risque \u00e9lev\u00e9, sont contraintes de r\u00e9ajuster leur politique de s\u00e9curit\u00e9 (renforcement des technologies de la s\u00e9curit\u00e9 et recours \u00e0&hellip; <\/p>\n","protected":false},"author":3,"featured_media":20942,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,23,109,25],"tags":[],"class_list":["post-20941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-livros","category-enterprise-security-management","category-francais","category-seguranca-publica-e-defesa"],"views":110,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/20941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/comments?post=20941"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/20941\/revisions"}],"predecessor-version":[{"id":20943,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/posts\/20941\/revisions\/20943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media\/20942"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/media?parent=20941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/categories?post=20941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/en\/wp-json\/wp\/v2\/tags?post=20941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}