Pagina principaleGruppiConversazioniAltroStatistiche
Cerca nel Sito
Questo sito utilizza i cookies per fornire i nostri servizi, per migliorare le prestazioni, per analisi, e (per gli utenti che accedono senza fare login) per la pubblicità. Usando LibraryThing confermi di aver letto e capito le nostre condizioni di servizio e la politica sulla privacy. Il tuo uso del sito e dei servizi è soggetto a tali politiche e condizioni.

Risultati da Google Ricerca Libri

Fai clic su di un'immagine per andare a Google Ricerca Libri.

Sto caricando le informazioni...

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (1989)

di Clifford Stoll

UtentiRecensioniPopolaritàMedia votiConversazioni / Citazioni
2,761455,231 (4.09)1 / 29
Before the Internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.… (altro)
Aggiunto di recente dabiblioteca privata, fidothe, Howardz, mac2mac, BruceBeary, prengel90, lukegail
Sto caricando le informazioni...

Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro.

» Vedi le 29 citazioni

Inglese (42)  Danese (1)  Ebraico (1)  Tedesco (1)  Tutte le lingue (45)
1-5 di 45 (prossimo | mostra tutto)
Worth reading!

Very good. Even years later this book is thought provoking. In addition, it gives a historical view of computing at beginning of the widespread use of the Internet. ( )
  Lewis.Noles | Mar 23, 2024 |
An interesting story but about 150 pages too long for this non-computer guy. I am a proud owner of one of Stoll's Klein bottles. ( )
  podocyte | Feb 25, 2024 |
USA, Californien, 1986
Clifford Stoll er astronom, men hans bevilling er tørret ud og han får i stedet arbejde som systemadministrator på Lawrence Berkeley National Laboratory. En dag i 1986 bemærker han at nogen laver numre med afdelingens VAX installation.

??? ( )
  bnielsen | Oct 15, 2023 |
I found this to be an enjoyable true story of tracking a hacker in the early days if the Internet, setting up alarms, putting in traps, and working with numerous agencies and telcos. It was a bit drawn out at times but I still enjoyed it. Good storytelling from a first person perspective of the hunt. ( )
  gianouts | Jul 5, 2023 |
Maybe a little too concerned with narrating every single step in the process, even the many, many failed attempts that lead nowhere. This comes at the expense of excitement in the middle sections of the book.

But that's a minor complaint, overall this was a really cracking story. I'm really impressed by how well Stoll explained topics in computer science, networking, and security to readers who may very well have never been on a network before, and who may be hearing about hacking for the first time. He did a good job choosing what to simplify, and how, to let readers understand what was going on, while not overwhelming them or talking down to them. Even more impressive given that these intrusion detection techniques were things he invented, so he had no examples to draw from, and not many people around to give him advice.

This book was all the rage in the BBS scene in the 90s, and I didn't read it then. I'm glad I finally got around to it. Maybe the longest time between putting a book on my "to read" pile and then actually reading it: about 30 years. ( )
  adamhindman | Jan 12, 2023 |
nessuna recensione | aggiungi una recensione
Devi effettuare l'accesso per contribuire alle Informazioni generali.
Per maggiori spiegazioni, vedi la pagina di aiuto delle informazioni generali.
Titolo canonico
Titolo originale
Titoli alternativi
Data della prima edizione
Personaggi
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Luoghi significativi
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Eventi significativi
Film correlati
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Epigrafe
Dedica
Incipit
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Me, a wizard?
Citazioni
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
1 11 21 1211 111221 31221 13112211 1113212221 31131211221211 13211311122122111221
Ultime parole
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Nota di disambiguazione
Redattore editoriale
Elogi
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Lingua originale
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
DDC/MDS Canonico
LCC canonico

Risorse esterne che parlano di questo libro

Wikipedia in inglese (4)

Before the Internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Non sono state trovate descrizioni di biblioteche

Descrizione del libro
Riassunto haiku

Discussioni correnti

Nessuno

Copertine popolari

Link rapidi

Voto

Media: (4.09)
0.5
1 4
1.5
2 14
2.5 5
3 98
3.5 32
4 259
4.5 21
5 211

Sei tu?

Diventa un autore di LibraryThing.

 

A proposito di | Contatto | LibraryThing.com | Privacy/Condizioni d'uso | Guida/FAQ | Blog | Negozio | APIs | TinyCat | Biblioteche di personaggi celebri | Recensori in anteprima | Informazioni generali | 205,700,750 libri! | Barra superiore: Sempre visibile