{"version":"1.0","provider_name":"ISTE Group","provider_url":"https:\/\/www.istegroup.com\/fr","author_name":"Vincent Cordonnier","author_url":"https:\/\/www.istegroup.com\/fr\/profile\/v-cordonnier\/","title":"Cybers\u00e9curit\u00e9 - ISTE Group","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3oCMbFt2JM\"><a href=\"https:\/\/www.istegroup.com\/fr\/series\/cybersecurite\/\">Cybers\u00e9curit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.istegroup.com\/fr\/series\/cybersecurite\/embed\/#?secret=3oCMbFt2JM\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cybers\u00e9curit\u00e9\u00a0\u00bb &#8212; ISTE Group\" data-secret=\"3oCMbFt2JM\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.istegroup.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/02\/series-scaled.jpg","thumbnail_width":2560,"thumbnail_height":2560,"description":"La cybers\u00e9curit\u00e9 sera prioritairement trait\u00e9e sous l\u2019angle des sciences humaines et sociales (science politique, droit, sociologie, sciences de l\u2019information\u2026), tout en accordant une place \u00e0 la pluridisciplinarit\u00e9. La cybers\u00e9curit\u00e9 sera entendue de mani\u00e8re large afin d\u2019int\u00e9grer des r\u00e9flexions sur les multiples formes de violence dans le cyberespace (cybercriminalit\u00e9, conflit arm\u00e9, terrorisme\u2026), sur les politiques s\u00e9curitaires, [&hellip;]"}