@article{ title = {Sécurité informatique pour la gestion des risques}, type = {article}, pages = {1-22}, id = {9a25e437-594b-3473-8c6c-db29f44d9460}, created = {2011-12-15T13:48:26.000Z}, file_attached = {false}, profile_id = {181202e9-9e14-3446-b699-8df37a3580b5}, group_id = {36e61195-3063-323c-b879-d6d31394db8a}, last_modified = {2017-03-14T14:39:23.619Z}, tags = {sécurité gestion risque}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {TIbvg}, folder_uuids = {09f99306-3ffe-4f25-96ba-ea5f9cab090a}, private_publication = {false}, bibtype = {article}, author = {TI, undefined}, journal = {Techniques de l'Ingénieur} }