C. Altheide and H. Carvey, Digital Forensics with Open Source Tools, 2011.
DOI : 10.1016/b978-1-59749-586-8.00001-7

G. Avoine, P. Junod, P. Oechslin, and S. Pasini, Sécurité informatique, cours et exercices corrigés, 2015.

M. Canet, A. Kumar, and C. Lauradoux, Mary-Andréa Rakotomanga, and Reihaneh Safavi-Naini. Decompression Quines and AntiViruses, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp.23-34, 2017.

S. Jana and V. Shmatikov, Abusing File Processing in Malware Detectors for Fun and Profit, IEEE Symposium on Security and Privacy, SP 2012, pp.80-94, 2012.

D. Stinson, S. Vaudenay, G. Avoine, and P. Junod, Cryptographie -Théorie et pratique / 2` emé edition, French translation of: Cryptography Theory and Practice, 2002.

A. Takanen, J. Demott, and C. Miller, Fuzzing for Software Security Testing and Quality Assurance, 2008.

D. Vergnaud, Exercices etprobì emes de cryptographie, Sciences Sup. Dunod, 2012.