Check nearby libraries
Buy this book
The account of Stoll stalking a methodical "hacker" who was prowling the nation's computer networks to gain unauthorized access to American files.
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Soviet Espionage, Computer crimes, Classified Defense information, Databases, Bases de datos, Espionaje ruso, Información clasificada (Defensa de la nación), Computadoras, Control de acceso, Crimes par ordinateur, Espionnage soviétique, Secret-défense, Bases de données, Bases de dato, Informaciâon clasificada (Defensa de la naciâon), Computerkriminalita t, Erlebnisbericht, New York Times reviewed, Fiction, mystery & detective, general, Espionage, soviet, Defense information, classified, It-säkerhet, Dataskydd, Spionage, Espionage, russian, Internet, security measures, ComputersPeople
Markus Hess, Clifford StollShowing 3 featured editions. View all 15 editions?
| Edition | Availability |
|---|---|
|
1
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
October 3, 2000, Pocket
Paperback
in English
- 1 edition
0743411463 9780743411462
|
eeee
|
| 2 |
eeee
|
|
3
The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
1989, Doubleday
Hardcover
in English
- 1st ed.
0385249462 9780385249461
|
aaaa
|
Book Details
Edition Notes
Bibliography: p. 325-326.
Classifications
The Physical Object
Edition Identifiers
Work Identifiers
Source records
- Scriblio MARC record
- Ithaca College Library MARC record
- Internet Archive item record
- marc_openlibraries_sanfranciscopubliclibrary MARC record
- Internet Archive item record
- amazon.com record
- Library of Congress MARC record
- Internet Archive item record
- Internet Archive item record
- marc_scms MARC record
- marc_columbia MARC record
- Harvard University record
- Harvard University record
Work Description
In the days when the presence of a computer did NOT presume the presence of a network (they used to be freestanding units that could not easily communicate with another system), accounts to use the computer were expensive to maintain and heavily scrutinized by management. When the Accounting staff of Stoll's university employer discovered 75 cents' worth of time used with which no user was associated, they called him and demanded that he locate the "phantom" user. Stoll wasn't even a computing pro - he was an astronomer that used the computer to run programs that pointed telescopes properly. But he was a member of a club that exists today - that person elected to do network administration because he drew the short straw. Stoll tells the ensuing circa 1985 tale of analysis when people worldwide were only just discovering what networks could reveal... and hide. Rather like today.
Links outside Open Library
Community Reviews (0)
History
- Created April 1, 2008
- 25 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
| July 22, 2025 | Edited by MARC Bot | import existing book |
| March 10, 2025 | Edited by MARC Bot | import existing book |
| July 24, 2024 | Edited by MARC Bot | import existing book |
| November 11, 2022 | Edited by MARC Bot | import existing book |
| April 1, 2008 | Created by an anonymous user | Imported from Scriblio MARC record |



