{"id":38887,"date":"2021-04-10T10:15:40","date_gmt":"2021-04-10T09:15:40","guid":{"rendered":"https:\/\/www.istegroup.com\/?post_type=product&#038;p=38887"},"modified":"2024-01-03T13:44:05","modified_gmt":"2024-01-03T13:44:05","slug":"la-cybersecurite-en-sciences-humaines-et-sociales","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/en\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","title":{"rendered":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales"},"content":{"rendered":"<p class=\"qtranxs-available-languages-message qtranxs-available-languages-message-en\">Sorry, this entry is only available in <a href=\"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product\/38887\" class=\"qtranxs-available-language-link qtranxs-available-language-link-fr\" title=\"FR\">FR<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in FR.<\/p>\n","protected":false},"featured_media":38898,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[3262],"product_tag":[],"class_list":{"0":"post-38887","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-non-classe","8":"first","9":"instock","10":"shipping-taxable","11":"purchasable","12":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group<\/title>\n<meta name=\"description\" content=\"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T13:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"451\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\",\"url\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\",\"name\":\"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg\",\"datePublished\":\"2021-04-10T09:15:40+00:00\",\"dateModified\":\"2024-01-03T13:44:05+00:00\",\"description\":\"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg\",\"width\":300,\"height\":451,\"caption\":\"Livre scientifique - La cybers\u00e9curit\u00e9 en sciences humaines et sociales - Hugo Loiseau, Daniel Ventre, Hartmut Aden\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"La cybers\u00e9curit\u00e9 en sciences humaines et sociales\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"Publishing Knowledge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group","description":"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","og_locale":"en_US","og_type":"article","og_title":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group","og_description":"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.","og_url":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","og_site_name":"ISTE Group","article_modified_time":"2024-01-03T13:44:05+00:00","og_image":[{"width":300,"height":451,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","url":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/","name":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","datePublished":"2021-04-10T09:15:40+00:00","dateModified":"2024-01-03T13:44:05+00:00","description":"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","width":300,"height":451,"caption":"Livre scientifique - La cybers\u00e9curit\u00e9 en sciences humaines et sociales - Hugo Loiseau, Daniel Ventre, Hartmut Aden"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"Publishing Knowledge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product\/38887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media\/38898"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media?parent=38887"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_brand?post=38887"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_cat?post=38887"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_tag?post=38887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}