{"id":33820,"date":"2023-02-03T12:06:30","date_gmt":"2023-02-03T11:06:30","guid":{"rendered":"https:\/\/ihedn.fr\/?p=33820"},"modified":"2023-02-03T12:06:30","modified_gmt":"2023-02-03T11:06:30","slug":"la-cyberdefense-politique-de-lespace-numerique-2e-edition","status":"publish","type":"post","link":"https:\/\/ihedn.fr\/en\/nos-lectures\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/","title":{"rendered":"Cyber defence: digital space policy (2<sup>e<\/sup> edition)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"33820\" class=\"elementor elementor-33820\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-5d6f96b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d6f96b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ffe5ed\" data-id=\"8ffe5ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1334bf9 elementor-widget elementor-widget-text-editor\" data-id=\"1334bf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the advent of global digitisation and a world constantly on the move, contemporary conflicts are beset by new challenges and threats, forcing governments to adapt their security policies and defence strategies. This book brings together the thoughts of a number of specialists on crisis management in the digital space, as well as an update on technological advances in cyber defence and digital conflict.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-307dca8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"307dca8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-acdef6f\" data-id=\"acdef6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd0ae7c elementor-widget elementor-widget-text-editor\" data-id=\"bd0ae7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>TAILLAT St\u00e9phane, CATTARUZZA Ama\u00ebl, DANET Didier, <a href=\"https:\/\/www.librairie-gallimard.com\/livre\/9782200634223-la-cyberdefense-politique-de-l-espace-numerique-2e-edition-stephane-taillat-amael-cattaruzza-didier-danet\/\"><strong><em>Cyber defence<\/em><\/strong><strong><em>\u00a0Digital space policy (2<sup>e<\/sup> edition)<\/em><\/strong><\/a>Armand Colin - U Science Politique, 2023.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>A l\u2019aune de la digitalisation globale et dans un monde constamment en mouvement, les conflits contemporains sont en proie \u00e0 de nouveaux enjeux et menaces imposant aux \u00c9tats une adaptation de leurs politiques de s\u00e9curit\u00e9 et de leurs strat\u00e9gies de d\u00e9fense. Cet ouvrage propose une r\u00e9flexion de plusieurs sp\u00e9cialistes sur la gestion de crises dans [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":33821,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92],"tags":[],"class_list":["post-33820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nos-lectures"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La cyberd\u00e9fense : politique de l\u2019espace num\u00e9rique (2e \u00e9dition) - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ihedn.fr\/en\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La cyberd\u00e9fense : politique de l\u2019espace num\u00e9rique (2e \u00e9dition) - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"og:description\" content=\"A l\u2019aune de la digitalisation globale et dans un monde constamment en mouvement, les conflits contemporains sont en proie \u00e0 de nouveaux enjeux et menaces imposant aux \u00c9tats une adaptation de leurs politiques de s\u00e9curit\u00e9 et de leurs strat\u00e9gies de d\u00e9fense. Cet ouvrage propose une r\u00e9flexion de plusieurs sp\u00e9cialistes sur la gestion de crises dans [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ihedn.fr\/en\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/\" \/>\n<meta property=\"og:site_name\" content=\"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ihedn\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T11:06:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/02\/la-cyberdefense.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"339\" \/>\n\t<meta property=\"og:image:height\" content=\"508\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:site\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/\"},\"author\":{\"name\":\"dev\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/7a40155595e4efb35323447cb8c8c5a4\"},\"headline\":\"La cyberd\u00e9fense : politique de l\u2019espace num\u00e9rique (2e \u00e9dition)\",\"datePublished\":\"2023-02-03T11:06:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/\"},\"wordCount\":117,\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/la-cyberdefense.jpg\",\"articleSection\":[\"nos lectures\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/\",\"name\":\"La cyberd\u00e9fense : politique de l\u2019espace num\u00e9rique (2e \u00e9dition) - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/la-cyberdefense.jpg\",\"datePublished\":\"2023-02-03T11:06:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/la-cyberdefense.jpg\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/la-cyberdefense.jpg\",\"width\":339,\"height\":508},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/publications\\\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/ihedn.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La cyberd\u00e9fense : politique de l\u2019espace num\u00e9rique (2e \u00e9dition)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"name\":\"IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale |\",\"description\":\"Site officiel de l&#039;IHEDN plac\u00e9 sous la tutelle du Premier ministre.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ihedn.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\",\"name\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"width\":500,\"height\":237,\"caption\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ihedn\\\/\",\"https:\\\/\\\/x.com\\\/IHEDN\",\"https:\\\/\\\/www.instagram.com\\\/ihedn\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/ihedn\\\/\",\"https:\\\/\\\/fr.wikipedia.org\\\/wiki\\\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/7a40155595e4efb35323447cb8c8c5a4\",\"name\":\"dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g\",\"caption\":\"dev\"},\"sameAs\":[\"https:\\\/\\\/ihedn.concilium.click\"],\"url\":\"https:\\\/\\\/ihedn.fr\\\/en\\\/author\\\/dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber defence: digital space policy (2nd edition) - IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ihedn.fr\/en\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/","og_locale":"en_GB","og_type":"article","og_title":"La cyberd\u00e9fense : politique de l\u2019espace num\u00e9rique (2e \u00e9dition) - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","og_description":"A l\u2019aune de la digitalisation globale et dans un monde constamment en mouvement, les conflits contemporains sont en proie \u00e0 de nouveaux enjeux et menaces imposant aux \u00c9tats une adaptation de leurs politiques de s\u00e9curit\u00e9 et de leurs strat\u00e9gies de d\u00e9fense. Cet ouvrage propose une r\u00e9flexion de plusieurs sp\u00e9cialistes sur la gestion de crises dans [&hellip;]","og_url":"https:\/\/ihedn.fr\/en\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/","og_site_name":"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","article_publisher":"https:\/\/www.facebook.com\/ihedn\/","article_published_time":"2023-02-03T11:06:30+00:00","og_image":[{"width":339,"height":508,"url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/02\/la-cyberdefense.jpg","type":"image\/jpeg"}],"author":"dev","twitter_card":"summary_large_image","twitter_creator":"@IHEDN","twitter_site":"@IHEDN","twitter_misc":{"Written by":"dev","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/#article","isPartOf":{"@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/"},"author":{"name":"dev","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/7a40155595e4efb35323447cb8c8c5a4"},"headline":"La cyberd\u00e9fense : politique de l\u2019espace num\u00e9rique (2e \u00e9dition)","datePublished":"2023-02-03T11:06:30+00:00","mainEntityOfPage":{"@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/"},"wordCount":117,"publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"image":{"@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/02\/la-cyberdefense.jpg","articleSection":["nos lectures"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/","url":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/","name":"Cyber defence: digital space policy (2nd edition) - IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","isPartOf":{"@id":"https:\/\/ihedn.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/#primaryimage"},"image":{"@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/02\/la-cyberdefense.jpg","datePublished":"2023-02-03T11:06:30+00:00","breadcrumb":{"@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/#primaryimage","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/02\/la-cyberdefense.jpg","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2023\/02\/la-cyberdefense.jpg","width":339,"height":508},{"@type":"BreadcrumbList","@id":"https:\/\/ihedn.fr\/publications\/la-cyberdefense-politique-de-lespace-numerique-2e-edition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ihedn.fr\/"},{"@type":"ListItem","position":2,"name":"La cyberd\u00e9fense : politique de l\u2019espace num\u00e9rique (2e \u00e9dition)"}]},{"@type":"WebSite","@id":"https:\/\/ihedn.fr\/#website","url":"https:\/\/ihedn.fr\/","name":"IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Institute for Higher National Defence Studies)","description":"Official website of the IHEDN under the supervision of the Prime Minister.","publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ihedn.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ihedn.fr\/#organization","name":"IHEDN - Institute for Higher National Defence Studies","url":"https:\/\/ihedn.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","width":500,"height":237,"caption":"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale"},"image":{"@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ihedn\/","https:\/\/x.com\/IHEDN","https:\/\/www.instagram.com\/ihedn\/","https:\/\/www.linkedin.com\/school\/ihedn\/","https:\/\/fr.wikipedia.org\/wiki\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale"]},{"@type":"Person","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/7a40155595e4efb35323447cb8c8c5a4","name":"dev","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=mm&r=g","caption":"dev"},"sameAs":["https:\/\/ihedn.concilium.click"],"url":"https:\/\/ihedn.fr\/en\/author\/dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-08 19:56:02","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/33820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/comments?post=33820"}],"version-history":[{"count":7,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/33820\/revisions"}],"predecessor-version":[{"id":33828,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/33820\/revisions\/33828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media\/33821"}],"wp:attachment":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media?parent=33820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/categories?post=33820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/tags?post=33820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}