Pulse en una miniatura para ir a Google Books.
Cargando... El huevo del cuco (1989)por Clifford Stoll
Cargando...
Inscríbete en LibraryThing para averiguar si este libro te gustará.
I found this to be an enjoyable true story of tracking a hacker in the early days if the Internet, setting up alarms, putting in traps, and working with numerous agencies and telcos. It was a bit drawn out at times but I still enjoyed it. Good storytelling from a first person perspective of the hunt. Maybe a little too concerned with narrating every single step in the process, even the many, many failed attempts that lead nowhere. This comes at the expense of excitement in the middle sections of the book. But that's a minor complaint, overall this was a really cracking story. I'm really impressed by how well Stoll explained topics in computer science, networking, and security to readers who may very well have never been on a network before, and who may be hearing about hacking for the first time. He did a good job choosing what to simplify, and how, to let readers understand what was going on, while not overwhelming them or talking down to them. Even more impressive given that these intrusion detection techniques were things he invented, so he had no examples to draw from, and not many people around to give him advice. This book was all the rage in the BBS scene in the 90s, and I didn't read it then. I'm glad I finally got around to it. Maybe the longest time between putting a book on my "to read" pile and then actually reading it: about 30 years. sin reseñas | añadir una reseña
Listas de sobresalientes
Before the Internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a seventy-five cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"-a mysterious invader who managed to break into US computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases-a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB. No se han encontrado descripciones de biblioteca. |
Debates activosNingunoCubiertas populares
Google Books — Cargando... GénerosSistema Decimal Melvil (DDC)364.1680973Social sciences Social problems and services; associations Criminology Crimes and Offenses Crimes of propertyClasificación de la Biblioteca del CongresoValoraciónPromedio:
¿Eres tú?Conviértete en un Autor de LibraryThing. |
Very good. Even years later this book is thought provoking. In addition, it gives a historical view of computing at beginning of the widespread use of the Internet. ( )