Acheter d'occasion
EUR 3,81
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
État: D'occasion: Bon
Commentaire: Book ships from USA, takes 4-14 days for delivery. Used book in average shape. Quick shipping, friendly service. Your satisfaction is guaranteed!
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

The Cuckoo's Egg Poche – 1990

4.8 étoiles sur 5 4 commentaires client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Relié
"Veuillez réessayer"
EUR 31,21 EUR 1,92
Poche
"Veuillez réessayer"
EUR 3,81
Cassette
"Veuillez réessayer"
EUR 58,96

Livres scolaires, manuels scolaires Livres scolaires, manuels scolaires

click to open popover

Offres spéciales et liens associés

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit

Commentaires en ligne

4.8 étoiles sur 5
5 étoiles
3
4 étoiles
1
3 étoiles
0
2 étoiles
0
1 étoile
0
Voir les 4 commentaires client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Broché
I saw the TV program on this story before reading the book. Coming from a UNIX background it was fun to see a system I recognized. It could have been titled "The story of Ping" oops that title has been taken. I remember being billed for time on the computer and could only gain access at 2 AM. Many of these skills are now lost to people that do not have a shell account. I especially like how they kept the intruder on the line ling enough to track. The hunt was intriguing and it makes you wonder what is happening today. While this book deals with such things as passwords, the many new avenues created on today's Internet may afford for a newer mystery. Until then this is the classic.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché
ce livre est une excellente histoire vrai à propos d'une personne n'etant pas destinée à faire de l'informatique. Et qui pourtant se retrouve à tracer les pirates dans l'ancetre d'internet. une histoire passionnante!
Remarque sur ce commentaire Une personne a trouvé cela utile. Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché
I saw the TV program on this story before reading the book. Coming from a UNIX background it was fun to see a system I recognized. It could have been titled "The story of Ping" oops that title has been taken. I remember being billed for time on the computer and could only gain access at 2 AM. Many of these skills are now lost to people that do not have a shell account. I especially like how they kept the intruder on the line ling enough to track. The hunt was intriguing and it makes you wonder what is happening today. While this book deals with such things as passwords, the many new avenues created on today's Internet may afford for a newer mystery. Until then this is the classic.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché
Un récit à la première personne, précis et drole de la première traque documentée d'opération d'espionnage cybernétique.

En chemin, le héro, astronome découvre un appareil d'état et policier complètement paralysé et devient un expert référent d'un domaine qui ne l'avait jamais concerné.

L'amateurisme de tous les acteurs est loin de la réalité d'aujourd'hui 20ans aprés avec les Titan Rain, Aurora et autres, mais c'est une exploration passionante de comment tout cela a commencé.

Ah .... et c'est un thriller passionant.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.6 étoiles sur 5 404 commentaires
55 internautes sur 59 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The unintentional counterespionage agent 24 septembre 2002
Par frumiousb - Publié sur Amazon.com
Format: Broché Achat vérifié
_The Cuckoo's Egg_ has everything most fictional detective novels wish that they had: a personable detective who does not mean to get involved as deeply as he does, federal agencies who cannot seem to take action, and a criminal mastermind who has everybody stumped until he encounters our detective. The best part of this whole book is that it really happened-- a feat that fictional mysteries can never match.

I knew Stoll's work through the more technical article "Stalking the Wily Hacker" and was pleasantly surprised to see how well Stoll was able to translate the technical side into a book-length narrative. IMO, this is significantly better than other more recent books about computer crime and still worth a read today (both for information and entertainment). Highly recommended.
26 internautes sur 28 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent book. 13 novembre 1997
Par Brendan Murray - Publié sur Amazon.com
Format: Poche
This book suceeds on many levels. Its a well written suspenseful spy novel that evolves very smoothly and engages the reader very early on. It is also an excellent description of computer / telecommunications technology that most anyone can understand, since he goes to the trouble to stop and explain, in laymens terms, UNIX utilities, daemon outputs, satellite technology, and microwave-oven protocol (check out the sneaker-melting fiasco on p 269). Stoll proves to be hell-bent on capturing the rogue user despite the lack of support from superiors and government agencies, and the toll it takes on his personal life. His frustrated accounts of his treatment at the hands of federal agencies as he petitions assistance from the FBI, the CIA, the NSA (among others) in capturing this potentially dangerous mole are testaments to the power of beaucracy in this country. However, he still manages to humanize the employees of these otherwise caricatured federal agencies by describing them as real people who want to help, rather than just surly trench-coated spies. I especially enjoyed reading about Stoll's low-tech solutions to slowing the hacker as he rifled through delicate documents by jangling keys over the connector to resemble static (simply cutting the line would have tipped the hacker off). This is a very enjoyable book, and I'd also recommend the reader try to find a videocassette copy of the NOVA TV special on PBS. Although it loses a lot of the book's details in the attempt to condense into one hour, it allows the viewer to see and hear the author, one of the quirkiest, most entertaining techno-goobers you'll come across.
42 internautes sur 48 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Now it's time for the Hunter to become the hunted! 14 décembre 1999
Par Nick - Publié sur Amazon.com
Format: Poche
This was the second computer security book I read and it was like adding flame to a fire because it increased my curiosity and prompted me to want to know more about it, so I ended up reading Cyberpunk by Katie Hafner and John Markoff to get a more inside look. If you start reading it then you'll probably finish it the same day. It talks a scientist that stumbles on a mistake in the accounting part of his job as a scientist at Lawrence Berkely Lab and he makes the mistake into a chase through cyberspace. In the book the author takes on the role as a modern day Sherlock Holmes and in the end he realizes that it was only elementary.
Dealing with the CCC (Chaos Computer Club), Hunter (the main hacker), and the different networks will really make you think and keep you on your toes. Read it and see for yourself just how intense the experience will be. I advise you to get some sleep before you start because you probably won't be getting any anytime soon.
28 internautes sur 32 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 What is a seventy-five cents worth? 30 octobre 2001
Par Victoria Tarrani - Publié sur Amazon.com
Format: Broché
Cliff Stoll was an astronomer, but he became the systems manager at Lawrence Berkeley Lab. When he took the position, he discovered a 75-cent accounting error that indicated there was either (1) a bug within the code of the accounting program, or (2) unauthorized users on his system.
Science is precise, and therefore Stoll began an investigation that ended up changing the intelligence community. His extensive testing and experiments revealed not only unauthorized access, but also the flaws of computer security. He studied the methods, the data path, and the signals (both false and true) through an electronic maze that eventually led him to "Hunter."
Early in his exploration, he discovered a six-second-time delay between transmission and receipt. It took three seconds for the data link from New York to reach Berkeley. What happened to the extra three seconds? Stoll reevaluated his findings, and eventually found the three missing seconds. It was the transmission time from Europe to New York.
The Cuckoo's Egg is Stoll's incredible story that eventually led to Hunter, a group of computer hackers and spies who were connected with the KGB and operating out of Germany. They had used our own services to piggyback onto valid signals. They jumped from system to system randomly to meet their goal. They obtained entrance to highly classified government sites.
This is the suspenseful, true story of one scientist's ingenious methods that brought down a spy ring. I read this book when it was first released and treasure my copy. Clifford Stoll had included his e-mail address, and graciously responded to my questions.
This book is not out-of-date. It opened the door to the world of computer investigations. The story is fascinating, and the writing is excellent. Five stars.
Victoria Tarrani
10 internautes sur 10 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The best real-life digital incident detection and response book ever written 18 juillet 2010
Par Richard Bejtlich - Publié sur Amazon.com
Format: Broché
Cliff Stoll's "The Cuckoo's Egg" (TCE) is the best real-life digital incident detection and response book ever written. I know something about this topic; I've written books on the subject and have taught thousands of students since 2000. I've done detection and IR since 1998, starting in the military, then as a consultant and defense contractor, and now as director of IR for a Fortune 5 company. If you're not an incident detector/responder, you're probably going to read TCE as a general enthusiast or maybe an IT professional. You'll like the book. If you're a security professional, you'll love it.

I first read TCE 20 years ago when it was first published, but I was a high school student who couldn't appreciate the content. Now, as an IR team leader, I recognize that Cliff probably shares 25 IR lessons in the first 50 pages! I plan to write a separate article explaining these, and I encourage my team to read the book. I think TCE would form an excellent text for a semester-long course on IR, and I might teach such a course at some point.

TCE is an important book because it is a first-hand account of an intrusion, from the victim's discovery of the event to the prosecution of the offender. Two and a half decades since the events took place, some aspects of intrusions have changed and others have stayed the same. I don't see another author stepping forward to explain all of the personal and professional heartache and obstacles suffered while defending his enterprise against persistent adversaries. Today the threat of a lawsuit and the desire to protect company and professional interests would likely preclude such a story, and probably with good reason!

On a human note, I found Cliff Stoll to possess the single most important characteristic of a good incident responder: he took the intrusion personally, and it made him angry! All the best security professionals I know take compromise personally and react emotionally to the thought of intruders violating their enterprise. Cliff Stoll was effective because he was smart, yes, but he was exceptionally effective because he cared.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?