{"id":10615,"date":"2014-04-09T09:30:38","date_gmt":"2014-04-09T12:30:38","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=10615"},"modified":"2014-04-09T06:43:19","modified_gmt":"2014-04-09T09:43:19","slug":"lusurpation-didentite","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/lusurpation-didentite\/","title":{"rendered":"L&#8217;usurpation d&#8217;identit\u00e9"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-10616\" alt=\"L'usurpation d'identit\u00e9\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/04\/lusurpation-didentite.jpg\" width=\"145\" height=\"222\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/04\/lusurpation-didentite.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/04\/lusurpation-didentite-97x150.jpg 97w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Guy de Felcourt<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Editor CNRS<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Descripci\u00f3n:<\/strong><\/span> Fraudes sur l\u2019\u00e9tat-civil, vols de donn\u00e9es personnelles sur Internet, prise de contr\u00f4le \u00e0 distance des ordinateurs, escroqueries par t\u00e9l\u00e9phone, hame\u00e7onnage, plagiat, leurre, falsification\u2026 A l\u2019heure de la mondialisation, l\u2019usurpation d\u2019identit\u00e9 menace chaque jour davantage les citoyens, la vie des entreprises et la s\u00e9curit\u00e9 des Etats. Avec, pour les victimes, des cons\u00e9quences \u00e9motionnelles et psychologiques souvent tr\u00e8s lourdes. Comment conna\u00eetre, comprendre et d\u00e9jouer cette d\u00e9linquance de plus en plus sophistiqu\u00e9e ?<br \/>\nVoici le livre de r\u00e9f\u00e9rence sur la fraude identitaire, le guide utile qui vous apprendra \u00e0 rep\u00e9rer les pi\u00e8ges tendus par les cybercriminels et autres voleurs de donn\u00e9es. Des r\u00e9ponses concr\u00e8tes existent pour lutter contre ce fl\u00e9au : am\u00e9lioration de la coordination entre les Etats, s\u00e9curisation des r\u00e9seaux, coop\u00e9ration effective entre secteurs public et priv\u00e9, harmonisation des documents d\u2019identit\u00e9 \u00e0 l\u2019\u00e9chelle internationale, g\u00e9n\u00e9ralisation des puces \u00e9lectroniques introduisant une s\u00e9curit\u00e9 cryptographique\u2026Un \u00e9tat des lieux inqui\u00e9tant, mais aussi l\u2019exploration de nouveaux rem\u00e8des, visant \u00e0 endiguer une menace criminelle qui nous concerne tous.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guy de Felcourt Editor CNRS Descripci\u00f3n: Fraudes sur l\u2019\u00e9tat-civil, vols de donn\u00e9es personnelles sur Internet, prise de contr\u00f4le \u00e0 distance des ordinateurs, escroqueries par t\u00e9l\u00e9phone, hame\u00e7onnage, plagiat, leurre, falsification\u2026 A l\u2019heure de la mondialisation, l\u2019usurpation d\u2019identit\u00e9 menace chaque jour davantage les citoyens, la vie des entreprises et la s\u00e9curit\u00e9 des Etats. Avec, pour les victimes, des cons\u00e9quences \u00e9motionnelles et psychologiques souvent tr\u00e8s lourdes. Comment conna\u00eetre, comprendre et d\u00e9jouer cette d\u00e9linquance&hellip; <\/p>\n","protected":false},"author":3,"featured_media":10616,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[109,15,6],"tags":[],"class_list":["post-10615","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-francais","category-fraude-e-investigacao","category-livros"],"views":235,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/10615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=10615"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/10615\/revisions"}],"predecessor-version":[{"id":10617,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/10615\/revisions\/10617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/10616"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=10615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=10615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=10615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}