Página Inicial da Biblioteca Digital Mundial Introduction Cet ouvrage n'est pas le mode d'emploi d'Internet ou de divers outils documentaires. C'est un outil de formation à l'information scientifique qui sert de support aux cours de méthodologie documentaire et de littérature scientifique de Gembloux Agro-Bio Tech (Université de Liège). Il peut largement être utilisé dans tous les enseignements et formations qui touchent à la littérature scientifique en sciences exactes et appliquées. Basé sur plus de vingt ans d'expérience, cet ouvrage a été construit par la fusion et la mise à jour des livres Méthodologie documentaire. Diffusé sous licence Creative Commons[], en libre accès donc, il est publié sur plusieurs supports : une version imprimée (édition des Presses agronomiques de Gembloux), un site Web, un fichier PDF et un fichier E-Pub (format livre électronique) mais avec une source (XML)[] unique et donc avec un contenu identique pour les quatre supports cités. Recherche et littérature scientifique Figure 1.
Amazon Standard Identification Number The Amazon Standard Identification Number (ASIN) is a 10-character alphanumeric unique identifier assigned by Amazon.com and its partners for product identification within the Amazon.com organization.[1] Amazon.ca,[1] Amazon.co.uk,[2] Amazon.de,[3] Amazon.fr,[4] Amazon.it,[5] Amazon.co.jp,[6] Amazon.cn,[7] and Amazon.es[8] also use ASINs. Although ASINs used to be unique worldwide, global expansion has changed so that ASINs are only guaranteed unique within a marketplace. The same product may be referred to by several ASINs though, and different national sites may use a different ASIN for the same product. In general, ASINs are likely to be different between the country sites unless they are for a class of product where the ASIN is based on an externally defined and internationally consistent identifier, such as ISBN for books. Each product sold on Amazon.com is given a unique ASIN. ASIN in Amazon URLs[edit] References[edit]
Researcher cracks Wi-Fi passwords with Amazon cloud A security researcher has tapped Amazon's cloud computing service to crack Wi-Fi passwords in a fraction of the time and for a fraction of the cost of using his own gear. Thomas Roth of Cologne, Germany told Reuters he used custom software running on Amazon's Elastic Compute Cloud service to break into a WPA-PSK protected network in about 20 minutes. With refinements to his program, he said he could shave the time to about six minutes. With EC2 computers available for 28 cents per minute, the cost of the crack came to just $1.68. “People tell me there is no possible way to break WPA, or, if it were possible, it would cost you a ton of money to do so,” Roth told the news service. Roth is the same researcher who in November used Amazon's cloud to brute force SHA-1 hashes. As the term suggests, brute force cracks are among the least sophisticated means of gaining unauthorized access to a network.
CNRS Jean Rouch, l'ethnologue-cinéaste De sa rencontre avec l’Afrique, en 1941, à son dernier voyage au Niger, en 2004, en passant par son entrée au CNRS à la fin des années 1940, le parcours de Jean Rouch continue d’intriguer, de passionner, d’influencer, de susciter des vocations. Il filmait les rites de possession sans pouvoir les comprendre tout à fait, il brisait des interdits et des tabous, tant techniques que sociaux, il cherchait à faire comprendre ce qu’il voyait. Voir le dossier Exoplanètes, à la recherche de nouveaux mondes? En octobre 1995, une équipe d’astrophysiciens, dirigée par Michel Mayor et Didier Queloz à l’observatoire de Haute-Provence, détecte pour la première fois de façon formelle une exoplanète : 51 Pégasi b, un Jupiter chaud. Voir le dossier Exoplanets, the search for new worlds? Eric Karsenti, l'aventurier du vivant Éric Karsenti est le lauréat 2015 de la médaille d’or du CNRS. Voir le dossier Eric Karsenti, Explorer of the living world (English version) Voir le dossier
PlayStation Network hack launched from Amazon EC2 High performance access to file storage The hackers who breached the security of Sony's PlayStation Network and gained access to sensitive data for 77 million subscribers used Amazon's web services cloud to launch the attack, Bloomberg News reported. The attackers rented a server from Amazon's EC2 service and penetrated the popular network from there, the news outlet said, citing an unnamed person with knowledge of the matter. The hackers supplied fake information to Amazon. The account has now been closed. Neither Sony nor Amazon commented on the claims. Bloomberg doesn't say how Amazon's cloud service was used to mount the attack. German security researcher Thomas Roth earlier this year showed how tapping the EC2 service allowed him to crack Wi-Fi passwords in a fraction of the time and for a fraction of the cost of using his own computing gear. In both cases, those tapping the Amazon cloud did so as paid customers. The Bloomberg article is here
6 lois à connaître pour mieux organiser son temps de travail Nous avons beau rédiger nos planning en heures de travail, nous sommes forcés de constater qu’une heure de travail ne ressemble pas à une autre. Outre la nature de l’activité, plusieurs facteurs entrent en jeu : le stress, le plaisir, l’apprentissage, l’enrichissement personnel que l’on en tire, le niveau d’énergie, la frustration ou l’insatisfaction. En fait ce n’est pas tant la quantité de temps passée qui compte mais sa qualité. Beaucoup d’entre nous gèrent leur temps de travail de manière désastreuse. Nous sommes comme submergés par nos tâches. Nous avons du mal à les prioriser ou à tenir nos délais. Comment s’organiser de façon à tirer le meilleur de chacune de nos heures de travail? 1. En 1949, Edouard A. Depuis, cette loi est généralement exprimée par : “si quelque chose peut mal tourner, alors cette chose finira infailliblement par mal tourner”. 2. Voici plusieurs pistes pour éviter les interruptions : 3. Nous pouvons tirer partie de cette loi de plusieurs manières : 4. 5. 6.
Sony hit with attacks in Greece and Japan - Faster Forward Posted at 09:53 AM ET, 05/24/2011 May 24, 2011 01:53 PM EDT TheWashingtonPost Hackers said they breached the Japanese site to embarrass Sony. (Kiyoshi Ota - BLOOMBERG) More bad news for Sony as the embattled electronics company struggles to reassure its customers that its systems are safe after a major hacker attack brought down the Sony PlayStation Network and Online Entertainment for three weeks. Reports surfaced Sunday and Monday that the company has suffered another breach, this time through its music services in Greece and Japan. The security company Sophos and the Hacker News identified two attacks on Sony’s music sites in Greece and Japan. The Japanese attack, believed to have occurred Monday by the group Lulz Security, accessed user databases on the sites. “Stupid Sony, so very stupid,” the message said before linking to two unprotected Sony databases. According to Sophos, the leaked database information does not contain names, passwords or other personally identifiable information.
How to Write Guide: Sections of the Paper | Table of Contents | FAQs | PDF Version | | Rationale | Sections | Section Headings | Title | Authors and Affiliation | Abstract| Introduction| Methods| Results| Discussion | Acknowledgments| Literature Cited | Appendices Why a Scientific Format? The scientific format may seem confusing for the beginning science writer due to its rigid structure which is so different from writing in the humanities. One reason for using this format is that it is a means of efficiently communicating scientific findings to the broad community of scientists in a uniform manner. Another reason, perhaps more important than the first, is that this format allows the paper to be read at several different levels. "A Paired t-test was used to compare mean flight duration before and after applying stablizers to the glider's wings." Problematic Example: This is a very long and wordy description of a common, simple procedure. Top of Page RESULTS 1. 3. NOTE: Do not label this section "Bibliography". 2.
Risk REPORT Governo dos EUA alerta falha de segurança na Siemens O governo dos Estados Unidos alertou clientes da Siemens de que sistemas de gestão de controle industrial que compraram da empresa apresentam uma falha de segurança que, de acordo com um pesquisador, poderia permitir que hackers prejudiquem infraestrutura essencial. A Siemens ainda está se recuperando das consequências da descoberta do vírus Stuxnet, no ano passado, um worm criado especificamente para atacar seus sistemas de controle industrial. Ataques aos sistemas da empresa poderiam ter impacto amplo. O conglomerado alemão, que minimizou a importância das falhas depois que estas foram reveladas na semana passada pela NSS Labs, uma empresa de segurança na computação, afirmou na terça-feira que está desenvolvendo atualizações de software para resolver os mais recentes problemas de segurança em seus sistemas de controle industrial.