- Gratuit : téléchargez l'application Amazon pour iPhone, iPad, Android ou Windows Phone ou découvrez la nouvelle application Amazon pour Tablette Android !
- Publiez votre livre sur Kindle Direct Publishing en format papier ou numérique : C'est simple et gratuit et vous pourrez toucher des millions de lecteurs. En savoir plus ici .
- Plus de 10 000 ebooks indés à moins de 3 euros à télécharger en moins de 60 secondes .
The Cuckoo's Egg Poche – 1990
|Neuf à partir de||Occasion à partir de|
Offres spéciales et liens associés
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.
Détails sur le produit
En savoir plus sur l'auteur
Dans ce livre(En savoir plus)
Parcourir et rechercher une autre édition de ce livre.
Commentaires en ligne
Meilleurs commentaires des clients
En chemin, le héro, astronome découvre un appareil d'état et policier complètement paralysé et devient un expert référent d'un domaine qui ne l'avait jamais concerné.
L'amateurisme de tous les acteurs est loin de la réalité d'aujourd'hui 20ans aprés avec les Titan Rain, Aurora et autres, mais c'est une exploration passionante de comment tout cela a commencé.
Ah .... et c'est un thriller passionant.
Commentaires client les plus utiles sur Amazon.com (beta)
I knew Stoll's work through the more technical article "Stalking the Wily Hacker" and was pleasantly surprised to see how well Stoll was able to translate the technical side into a book-length narrative. IMO, this is significantly better than other more recent books about computer crime and still worth a read today (both for information and entertainment). Highly recommended.
Dealing with the CCC (Chaos Computer Club), Hunter (the main hacker), and the different networks will really make you think and keep you on your toes. Read it and see for yourself just how intense the experience will be. I advise you to get some sleep before you start because you probably won't be getting any anytime soon.
Science is precise, and therefore Stoll began an investigation that ended up changing the intelligence community. His extensive testing and experiments revealed not only unauthorized access, but also the flaws of computer security. He studied the methods, the data path, and the signals (both false and true) through an electronic maze that eventually led him to "Hunter."
Early in his exploration, he discovered a six-second-time delay between transmission and receipt. It took three seconds for the data link from New York to reach Berkeley. What happened to the extra three seconds? Stoll reevaluated his findings, and eventually found the three missing seconds. It was the transmission time from Europe to New York.
The Cuckoo's Egg is Stoll's incredible story that eventually led to Hunter, a group of computer hackers and spies who were connected with the KGB and operating out of Germany. They had used our own services to piggyback onto valid signals. They jumped from system to system randomly to meet their goal. They obtained entrance to highly classified government sites.
This is the suspenseful, true story of one scientist's ingenious methods that brought down a spy ring. I read this book when it was first released and treasure my copy. Clifford Stoll had included his e-mail address, and graciously responded to my questions.
This book is not out-of-date. It opened the door to the world of computer investigations. The story is fascinating, and the writing is excellent. Five stars.
I first read TCE 20 years ago when it was first published, but I was a high school student who couldn't appreciate the content. Now, as an IR team leader, I recognize that Cliff probably shares 25 IR lessons in the first 50 pages! I plan to write a separate article explaining these, and I encourage my team to read the book. I think TCE would form an excellent text for a semester-long course on IR, and I might teach such a course at some point.
TCE is an important book because it is a first-hand account of an intrusion, from the victim's discovery of the event to the prosecution of the offender. Two and a half decades since the events took place, some aspects of intrusions have changed and others have stayed the same. I don't see another author stepping forward to explain all of the personal and professional heartache and obstacles suffered while defending his enterprise against persistent adversaries. Today the threat of a lawsuit and the desire to protect company and professional interests would likely preclude such a story, and probably with good reason!
On a human note, I found Cliff Stoll to possess the single most important characteristic of a good incident responder: he took the intrusion personally, and it made him angry! All the best security professionals I know take compromise personally and react emotionally to the thought of intruders violating their enterprise. Cliff Stoll was effective because he was smart, yes, but he was exceptionally effective because he cared.