The cuckoo's egg : tracking a spy through the maze of computer espionage / Cliff Stoll. [print]
Material type: TextPublication details: New York : Pocket Books, (c)2005.Description: 399 pages ; 21 cmContent type:- text
- unmediated
- volume
- 9781416507789
- UB271.S875.C835 2005
- COPYRIGHT NOT covered - Click this link to request copyright permission:
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Circulating Book (checkout times vary with patron status) | G. Allen Fleece Library CIRCULATING COLLECTION | Non-fiction | UB271.R92H477 2005 (Browse shelf(Opens below)) | Available | 31923001476668 |
Browsing G. Allen Fleece Library shelves, Shelving location: CIRCULATING COLLECTION, Collection: Non-fiction Close shelf browser (Hides shelf browser)
U766.H55 2010 The military marriage manual : tactics for successful relationships / | UA840.I455 2003 India and Pakistan : opposing viewpoints / | UB271.R9K47 1989x Spy vs. spy : the shocking true story of the FBI's secret war against Soviet agents in America / | UB271.R92H477 2005 The cuckoo's egg : tracking a spy through the maze of computer espionage / | UB403.H55 2011 Special needs families in the military : a resource guide / | UB403.K38 2002 Heroes at home : help & hope for America's military families / | UB416.P373.A885 2012 Attitudes aren't free : thinking deeply about diversity in the US armed forces / |
"With a new afterword by the author"--Cover.
This is the true story of how a systems manager at Lawrence Berkeley Lab singlehandedly tracked down and helped capture a computer hacker who had been breaking into U.S. computer systems and stealing sensitive military and security information. Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mystery invader hiding inside a twisting electronic labyrinth, breaking into U.S. computer systems and stealing sensitive military and security information. Stoll began a one-man hunt of his own, spying on the spy --
COPYRIGHT NOT covered - Click this link to request copyright permission:
There are no comments on this title.